Author: gseitz
Date: Mon Oct 15 15:52:42 2007
New Revision: 584962

URL: http://svn.apache.org/viewvc?rev=584962&view=rev
Log:
WICKET-1078

Modified:
    wicket/trunk/jdk-1.5/wicket-auth-roles/.settings/org.eclipse.jdt.core.prefs
    wicket/trunk/jdk-1.5/wicket-auth-roles/.settings/org.eclipse.jdt.ui.prefs
    
wicket/trunk/jdk-1.5/wicket-auth-roles/src/main/java/org/apache/wicket/authentication/AuthenticatedWebApplication.java
    
wicket/trunk/jdk-1.5/wicket-auth-roles/src/main/java/org/apache/wicket/authentication/AuthenticatedWebSession.java
    
wicket/trunk/jdk-1.5/wicket-auth-roles/src/main/java/org/apache/wicket/authentication/pages/SignOutPage.java
    
wicket/trunk/jdk-1.5/wicket-auth-roles/src/main/java/org/apache/wicket/authentication/panel/SignInPanel.java
    
wicket/trunk/jdk-1.5/wicket-auth-roles/src/main/java/org/apache/wicket/authorization/strategies/role/AbstractRoleAuthorizationStrategy.java
    
wicket/trunk/jdk-1.5/wicket-auth-roles/src/main/java/org/apache/wicket/authorization/strategies/role/IRoleCheckingStrategy.java
    
wicket/trunk/jdk-1.5/wicket-auth-roles/src/main/java/org/apache/wicket/authorization/strategies/role/Roles.java
    
wicket/trunk/jdk-1.5/wicket-auth-roles/src/main/java/org/apache/wicket/authorization/strategies/role/annotations/AnnotationsRoleAuthorizationStrategy.java
    
wicket/trunk/jdk-1.5/wicket-auth-roles/src/main/java/org/apache/wicket/authorization/strategies/role/annotations/AuthorizeAction.java
    
wicket/trunk/jdk-1.5/wicket-auth-roles/src/main/java/org/apache/wicket/authorization/strategies/role/annotations/AuthorizeActions.java
    
wicket/trunk/jdk-1.5/wicket-auth-roles/src/main/java/org/apache/wicket/authorization/strategies/role/annotations/AuthorizeInstantiation.java
    
wicket/trunk/jdk-1.5/wicket-auth-roles/src/main/java/org/apache/wicket/authorization/strategies/role/metadata/ActionPermissions.java
    
wicket/trunk/jdk-1.5/wicket-auth-roles/src/main/java/org/apache/wicket/authorization/strategies/role/metadata/InstantiationPermissions.java
    
wicket/trunk/jdk-1.5/wicket-auth-roles/src/main/java/org/apache/wicket/authorization/strategies/role/metadata/MetaDataRoleAuthorizationStrategy.java
    
wicket/trunk/jdk-1.5/wicket-auth-roles/src/test/java/org/apache/wicket/authorization/strategies/role/annotations/AnnotationsRoleTest.java
    
wicket/trunk/jdk-1.5/wicket-auth-roles/src/test/java/org/apache/wicket/authorization/strategies/role/metadata/ActionPermissionsTest.java
    
wicket/trunk/jdk-1.5/wicket-auth-roles/src/test/java/org/apache/wicket/util/license/ApacheLicenceHeaderTest.java

Modified: 
wicket/trunk/jdk-1.5/wicket-auth-roles/.settings/org.eclipse.jdt.core.prefs
URL: 
http://svn.apache.org/viewvc/wicket/trunk/jdk-1.5/wicket-auth-roles/.settings/org.eclipse.jdt.core.prefs?rev=584962&r1=584961&r2=584962&view=diff
==============================================================================
--- wicket/trunk/jdk-1.5/wicket-auth-roles/.settings/org.eclipse.jdt.core.prefs 
(original)
+++ wicket/trunk/jdk-1.5/wicket-auth-roles/.settings/org.eclipse.jdt.core.prefs 
Mon Oct 15 15:52:42 2007
@@ -53,9 +53,11 @@
 org.eclipse.jdt.core.formatter.brace_position_for_method_declaration=next_line
 org.eclipse.jdt.core.formatter.brace_position_for_switch=next_line
 org.eclipse.jdt.core.formatter.brace_position_for_type_declaration=next_line
+org.eclipse.jdt.core.formatter.comment.clear_blank_lines=false
 org.eclipse.jdt.core.formatter.comment.clear_blank_lines_in_block_comment=false
 
org.eclipse.jdt.core.formatter.comment.clear_blank_lines_in_javadoc_comment=false
 org.eclipse.jdt.core.formatter.comment.format_block_comments=true
+org.eclipse.jdt.core.formatter.comment.format_comments=true
 org.eclipse.jdt.core.formatter.comment.format_header=false
 org.eclipse.jdt.core.formatter.comment.format_html=true
 org.eclipse.jdt.core.formatter.comment.format_javadoc_comments=true
@@ -65,7 +67,7 @@
 org.eclipse.jdt.core.formatter.comment.indent_root_tags=true
 org.eclipse.jdt.core.formatter.comment.insert_new_line_before_root_tags=insert
 org.eclipse.jdt.core.formatter.comment.insert_new_line_for_parameter=insert
-org.eclipse.jdt.core.formatter.comment.line_length=80
+org.eclipse.jdt.core.formatter.comment.line_length=100
 org.eclipse.jdt.core.formatter.compact_else_if=true
 org.eclipse.jdt.core.formatter.continuation_indentation=2
 org.eclipse.jdt.core.formatter.continuation_indentation_for_array_initializer=2
@@ -152,7 +154,7 @@
 org.eclipse.jdt.core.formatter.insert_space_after_postfix_operator=do not 
insert
 org.eclipse.jdt.core.formatter.insert_space_after_prefix_operator=do not insert
 
org.eclipse.jdt.core.formatter.insert_space_after_question_in_conditional=insert
-org.eclipse.jdt.core.formatter.insert_space_after_question_in_wildcard=do not 
insert
+org.eclipse.jdt.core.formatter.insert_space_after_question_in_wildcard=insert
 org.eclipse.jdt.core.formatter.insert_space_after_semicolon_in_for=insert
 org.eclipse.jdt.core.formatter.insert_space_after_unary_operator=do not insert
 org.eclipse.jdt.core.formatter.insert_space_before_and_in_type_parameter=insert
@@ -238,7 +240,7 @@
 org.eclipse.jdt.core.formatter.insert_space_before_postfix_operator=do not 
insert
 org.eclipse.jdt.core.formatter.insert_space_before_prefix_operator=do not 
insert
 
org.eclipse.jdt.core.formatter.insert_space_before_question_in_conditional=insert
-org.eclipse.jdt.core.formatter.insert_space_before_question_in_wildcard=do not 
insert
+org.eclipse.jdt.core.formatter.insert_space_before_question_in_wildcard=insert
 org.eclipse.jdt.core.formatter.insert_space_before_semicolon=do not insert
 org.eclipse.jdt.core.formatter.insert_space_before_semicolon_in_for=do not 
insert
 org.eclipse.jdt.core.formatter.insert_space_before_unary_operator=do not insert
@@ -255,12 +257,12 @@
 org.eclipse.jdt.core.formatter.keep_imple_if_on_one_line=false
 org.eclipse.jdt.core.formatter.keep_then_statement_on_same_line=false
 org.eclipse.jdt.core.formatter.lineSplit=100
-org.eclipse.jdt.core.formatter.never_indent_block_comments_on_first_column=false
-org.eclipse.jdt.core.formatter.never_indent_line_comments_on_first_column=false
+org.eclipse.jdt.core.formatter.never_indent_block_comments_on_first_column=true
+org.eclipse.jdt.core.formatter.never_indent_line_comments_on_first_column=true
 
org.eclipse.jdt.core.formatter.number_of_blank_lines_at_beginning_of_method_body=0
 org.eclipse.jdt.core.formatter.number_of_empty_lines_to_preserve=2
 org.eclipse.jdt.core.formatter.put_empty_statement_on_new_line=true
 org.eclipse.jdt.core.formatter.tabulation.char=tab
 org.eclipse.jdt.core.formatter.tabulation.size=4
 org.eclipse.jdt.core.formatter.use_tabs_only_for_leading_indentations=false
-org.eclipse.jdt.core.formatter.wrap_before_binary_operator=true
+org.eclipse.jdt.core.formatter.wrap_before_binary_operator=false

Modified: 
wicket/trunk/jdk-1.5/wicket-auth-roles/.settings/org.eclipse.jdt.ui.prefs
URL: 
http://svn.apache.org/viewvc/wicket/trunk/jdk-1.5/wicket-auth-roles/.settings/org.eclipse.jdt.ui.prefs?rev=584962&r1=584961&r2=584962&view=diff
==============================================================================
--- wicket/trunk/jdk-1.5/wicket-auth-roles/.settings/org.eclipse.jdt.ui.prefs 
(original)
+++ wicket/trunk/jdk-1.5/wicket-auth-roles/.settings/org.eclipse.jdt.ui.prefs 
Mon Oct 15 15:52:42 2007
@@ -2,4 +2,53 @@
 eclipse.preferences.version=1
 formatter_profile=_Wicket
 formatter_settings_version=11
+editor_save_participant_org.eclipse.jdt.ui.postsavelistener.cleanup=true
 internal.default.compliance=default
+org.eclipse.jdt.ui.text.custom_code_templates=<?xml version\="1.0" 
encoding\="UTF-8" standalone\="no"?><templates><template autoinsert\="false" 
context\="gettercomment_context" deleted\="false" description\="Comment for 
getter method" enabled\="true" 
id\="org.eclipse.jdt.ui.text.codetemplates.gettercomment" 
name\="gettercomment">/**\r\n * Gets ${bare_field_name}.\r\n * @return 
${bare_field_name}\r\n */</template><template autoinsert\="false" 
context\="settercomment_context" deleted\="false" description\="Comment for 
setter method" enabled\="true" 
id\="org.eclipse.jdt.ui.text.codetemplates.settercomment" 
name\="settercomment">/**\r\n * Sets ${bare_field_name}.\r\n * @param ${param} 
${bare_field_name}\r\n */</template><template autoinsert\="false" 
context\="constructorcomment_context" deleted\="false" description\="Comment 
for created constructors" enabled\="true" 
id\="org.eclipse.jdt.ui.text.codetemplates.constructorcomment" 
name\="constructorcomment">/**\r\n * Construct.\r\n
  * ${tags}\r\n */</template><template autoinsert\="false" 
context\="filecomment_context" deleted\="false" description\="Comment for 
created Java files" enabled\="true" 
id\="org.eclipse.jdt.ui.text.codetemplates.filecomment" 
name\="filecomment"/><template autoinsert\="false" 
context\="typecomment_context" deleted\="false" description\="Comment for 
created types" enabled\="true" 
id\="org.eclipse.jdt.ui.text.codetemplates.typecomment" 
name\="typecomment">/**\r\n * @author ${user}\r\n * ${tags}\r\n 
*/</template><template autoinsert\="true" context\="fieldcomment_context" 
deleted\="false" description\="Comment for fields" enabled\="true" 
id\="org.eclipse.jdt.ui.text.codetemplates.fieldcomment" 
name\="fieldcomment">/**\r\n * \r\n */</template><template autoinsert\="true" 
context\="methodcomment_context" deleted\="false" description\="Comment for 
non-overriding methods" enabled\="true" 
id\="org.eclipse.jdt.ui.text.codetemplates.methodcomment" 
name\="methodcomment">/**\r\n * ${tags}
 \r\n */</template><template autoinsert\="false" 
context\="overridecomment_context" deleted\="false" description\="Comment for 
overriding methods" enabled\="true" 
id\="org.eclipse.jdt.ui.text.codetemplates.overridecomment" 
name\="overridecomment">/**\r\n * ${see_to_overridden}\r\n 
*/</template><template autoinsert\="false" context\="newtype_context" 
deleted\="false" description\="Newly created files" enabled\="true" 
id\="org.eclipse.jdt.ui.text.codetemplates.newtype" name\="newtype">/*\r\n * 
Licensed to the Apache Software Foundation (ASF) under one or more\r\n * 
contributor license agreements.  See the NOTICE file distributed with\r\n * 
this work for additional information regarding copyright ownership.\r\n * The 
ASF licenses this file to You under the Apache License, Version 2.0\r\n * (the 
"License"); you may not use this file except in compliance with\r\n * the 
License.  You may obtain a copy of the License at\r\n *\r\n *      
http\://www.apache.org/licenses/LICENSE-2.0\r\
 n *\r\n * Unless required by applicable law or agreed to in writing, 
software\r\n * distributed under the License is distributed on an "AS IS" 
BASIS,\r\n * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or 
implied.\r\n * See the License for the specific language governing permissions 
and\r\n * limitations under the License.\r\n 
*/\r\n${filecomment}\r\n${package_declaration}\r\n\r\n${typecomment}\r\n${type_declaration}</template><template
 autoinsert\="false" context\="catchblock_context" deleted\="false" 
description\="Code in new catch blocks" enabled\="true" 
id\="org.eclipse.jdt.ui.text.codetemplates.catchblock" name\="catchblock">throw 
new RuntimeException(${exception_var});</template><template autoinsert\="false" 
context\="methodbody_context" deleted\="false" description\="Code in created 
method stubs" enabled\="true" 
id\="org.eclipse.jdt.ui.text.codetemplates.methodbody" 
name\="methodbody">${body_statement}</template><template autoinsert\="false" 
context\="c
 onstructorbody_context" deleted\="false" description\="Code in created 
constructor stubs" enabled\="true" 
id\="org.eclipse.jdt.ui.text.codetemplates.constructorbody" 
name\="constructorbody">${body_statement}</template><template 
autoinsert\="true" context\="getterbody_context" deleted\="false" 
description\="Code in created getters" enabled\="true" 
id\="org.eclipse.jdt.ui.text.codetemplates.getterbody" 
name\="getterbody">return ${field};</template><template autoinsert\="true" 
context\="setterbody_context" deleted\="false" description\="Code in created 
setters" enabled\="true" id\="org.eclipse.jdt.ui.text.codetemplates.setterbody" 
name\="setterbody">${field} \= ${param};</template><template autoinsert\="true" 
context\="classbody_context" deleted\="false" description\="Code in new class 
type bodies" enabled\="true" 
id\="org.eclipse.jdt.ui.text.codetemplates.classbody" 
name\="classbody">\r\n</template><template autoinsert\="true" 
context\="interfacebody_context" deleted\="false" 
 description\="Code in new interface type bodies" enabled\="true" 
id\="org.eclipse.jdt.ui.text.codetemplates.interfacebody" 
name\="interfacebody">\r\n</template><template autoinsert\="true" 
context\="enumbody_context" deleted\="false" description\="Code in new enum 
type bodies" enabled\="true" 
id\="org.eclipse.jdt.ui.text.codetemplates.enumbody" 
name\="enumbody">\r\n</template><template autoinsert\="true" 
context\="annotationbody_context" deleted\="false" description\="Code in new 
annotation type bodies" enabled\="true" 
id\="org.eclipse.jdt.ui.text.codetemplates.annotationbody" 
name\="annotationbody">\r\n</template><template autoinsert\="true" 
context\="delegatecomment_context" deleted\="false" description\="Comment for 
delegate methods" enabled\="true" 
id\="org.eclipse.jdt.ui.text.codetemplates.delegatecomment" 
name\="delegatecomment">/**\r\n * ${tags}\r\n * ${see_to_target}\r\n 
*/</template></templates>
+sp_cleanup.add_default_serial_version_id=true
+sp_cleanup.add_generated_serial_version_id=false
+sp_cleanup.add_missing_annotations=true
+sp_cleanup.add_missing_deprecated_annotations=true
+sp_cleanup.add_missing_nls_tags=false
+sp_cleanup.add_missing_override_annotations=true
+sp_cleanup.add_serial_version_id=false
+sp_cleanup.always_use_blocks=true
+sp_cleanup.always_use_parentheses_in_expressions=false
+sp_cleanup.always_use_this_for_non_static_field_access=false
+sp_cleanup.always_use_this_for_non_static_method_access=false
+sp_cleanup.convert_to_enhanced_for_loop=false
+sp_cleanup.format_source_code=true
+sp_cleanup.make_local_variable_final=false
+sp_cleanup.make_parameters_final=false
+sp_cleanup.make_private_fields_final=true
+sp_cleanup.make_variable_declarations_final=true
+sp_cleanup.never_use_blocks=false
+sp_cleanup.never_use_parentheses_in_expressions=true
+sp_cleanup.on_save_use_additional_actions=true
+sp_cleanup.organize_imports=true
+sp_cleanup.qualify_static_field_accesses_with_declaring_class=false
+sp_cleanup.qualify_static_member_accesses_through_instances_with_declaring_class=true
+sp_cleanup.qualify_static_member_accesses_through_subtypes_with_declaring_class=true
+sp_cleanup.qualify_static_member_accesses_with_declaring_class=true
+sp_cleanup.qualify_static_method_accesses_with_declaring_class=false
+sp_cleanup.remove_private_constructors=true
+sp_cleanup.remove_trailing_whitespaces=true
+sp_cleanup.remove_trailing_whitespaces_all=true
+sp_cleanup.remove_trailing_whitespaces_ignore_empty=false
+sp_cleanup.remove_unnecessary_casts=true
+sp_cleanup.remove_unnecessary_nls_tags=true
+sp_cleanup.remove_unused_imports=true
+sp_cleanup.remove_unused_local_variables=false
+sp_cleanup.remove_unused_private_fields=true
+sp_cleanup.remove_unused_private_members=false
+sp_cleanup.remove_unused_private_methods=true
+sp_cleanup.remove_unused_private_types=true
+sp_cleanup.sort_members=false
+sp_cleanup.sort_members_all=false
+sp_cleanup.use_blocks=false
+sp_cleanup.use_blocks_only_for_return_and_throw=false
+sp_cleanup.use_parentheses_in_expressions=false
+sp_cleanup.use_this_for_non_static_field_access=true
+sp_cleanup.use_this_for_non_static_field_access_only_if_necessary=true
+sp_cleanup.use_this_for_non_static_method_access=true
+sp_cleanup.use_this_for_non_static_method_access_only_if_necessary=true

Modified: 
wicket/trunk/jdk-1.5/wicket-auth-roles/src/main/java/org/apache/wicket/authentication/AuthenticatedWebApplication.java
URL: 
http://svn.apache.org/viewvc/wicket/trunk/jdk-1.5/wicket-auth-roles/src/main/java/org/apache/wicket/authentication/AuthenticatedWebApplication.java?rev=584962&r1=584961&r2=584962&view=diff
==============================================================================
--- 
wicket/trunk/jdk-1.5/wicket-auth-roles/src/main/java/org/apache/wicket/authentication/AuthenticatedWebApplication.java
 (original)
+++ 
wicket/trunk/jdk-1.5/wicket-auth-roles/src/main/java/org/apache/wicket/authentication/AuthenticatedWebApplication.java
 Mon Oct 15 15:52:42 2007
@@ -45,7 +45,7 @@
                        IUnauthorizedComponentInstantiationListener
 {
        /** Subclass of authenticated web session to instantiate */
-       private final WeakReference<Class<? extends AuthenticatedWebSession>> 
webSessionClassRef;
+       private final WeakReference<Class< ? extends AuthenticatedWebSession>> 
webSessionClassRef;
 
        /**
         * Constructor
@@ -53,7 +53,8 @@
        public AuthenticatedWebApplication()
        {
                // Get web session class to instantiate
-               this.webSessionClassRef = new WeakReference<Class<? extends 
AuthenticatedWebSession>>(getWebSessionClass());
+               this.webSessionClassRef = new WeakReference<Class< ? extends 
AuthenticatedWebSession>>(
+                               getWebSessionClass());
        }
 
        @Override
@@ -110,31 +111,31 @@
        {
                try
                {
-                       return 
webSessionClassRef.get().getDeclaredConstructor(AuthenticatedWebApplication.class,
-                                       
Request.class).newInstance(AuthenticatedWebApplication.this, request);
+                       return webSessionClassRef.get().getDeclaredConstructor(
+                                       AuthenticatedWebApplication.class, 
Request.class).newInstance(
+                                       AuthenticatedWebApplication.this, 
request);
                }
                catch (Exception e)
                {
-                       throw new WicketRuntimeException(
-                                       "Unable to instantiate web session " + 
webSessionClassRef.get(), e);
+                       throw new WicketRuntimeException("Unable to instantiate 
web session " +
+                                       webSessionClassRef.get(), e);
                }
        }
 
        /**
-        * @return AuthenticatedWebSession subclass to use in this 
authenticated web
-        *         application.
+        * @return AuthenticatedWebSession subclass to use in this 
authenticated web application.
         */
-       protected abstract Class<? extends AuthenticatedWebSession> 
getWebSessionClass();
+       protected abstract Class< ? extends AuthenticatedWebSession> 
getWebSessionClass();
 
        /**
         * @return Subclass of sign-in page
         */
-       protected abstract Class<? extends WebPage> getSignInPageClass();
+       protected abstract Class< ? extends WebPage> getSignInPageClass();
 
        /**
-        * Called when an AUTHENTICATED user tries to navigate to a page that 
they
-        * are not authorized to access. You might want to override this to 
navigate
-        * to some explanatory page or to the application's home page.
+        * Called when an AUTHENTICATED user tries to navigate to a page that 
they are not authorized to
+        * access. You might want to override this to navigate to some 
explanatory page or to the
+        * application's home page.
         * 
         * @param page
         *            The page

Modified: 
wicket/trunk/jdk-1.5/wicket-auth-roles/src/main/java/org/apache/wicket/authentication/AuthenticatedWebSession.java
URL: 
http://svn.apache.org/viewvc/wicket/trunk/jdk-1.5/wicket-auth-roles/src/main/java/org/apache/wicket/authentication/AuthenticatedWebSession.java?rev=584962&r1=584961&r2=584962&view=diff
==============================================================================
--- 
wicket/trunk/jdk-1.5/wicket-auth-roles/src/main/java/org/apache/wicket/authentication/AuthenticatedWebSession.java
 (original)
+++ 
wicket/trunk/jdk-1.5/wicket-auth-roles/src/main/java/org/apache/wicket/authentication/AuthenticatedWebSession.java
 Mon Oct 15 15:52:42 2007
@@ -23,9 +23,8 @@
 
 
 /**
- * Basic authenticated web session. Subclasses must provide a method that
- * authenticates the session based on a username and password, and a method
- * implementation that gets the Roles
+ * Basic authenticated web session. Subclasses must provide a method that 
authenticates the session
+ * based on a username and password, and a method implementation that gets the 
Roles
  * 
  * @author Jonathan Locke
  */

Modified: 
wicket/trunk/jdk-1.5/wicket-auth-roles/src/main/java/org/apache/wicket/authentication/pages/SignOutPage.java
URL: 
http://svn.apache.org/viewvc/wicket/trunk/jdk-1.5/wicket-auth-roles/src/main/java/org/apache/wicket/authentication/pages/SignOutPage.java?rev=584962&r1=584961&r2=584962&view=diff
==============================================================================
--- 
wicket/trunk/jdk-1.5/wicket-auth-roles/src/main/java/org/apache/wicket/authentication/pages/SignOutPage.java
 (original)
+++ 
wicket/trunk/jdk-1.5/wicket-auth-roles/src/main/java/org/apache/wicket/authentication/pages/SignOutPage.java
 Mon Oct 15 15:52:42 2007
@@ -35,7 +35,7 @@
        {
                this(null);
        }
-       
+
        /**
         * Constructor
         * 

Modified: 
wicket/trunk/jdk-1.5/wicket-auth-roles/src/main/java/org/apache/wicket/authentication/panel/SignInPanel.java
URL: 
http://svn.apache.org/viewvc/wicket/trunk/jdk-1.5/wicket-auth-roles/src/main/java/org/apache/wicket/authentication/panel/SignInPanel.java?rev=584962&r1=584961&r2=584962&view=diff
==============================================================================
--- 
wicket/trunk/jdk-1.5/wicket-auth-roles/src/main/java/org/apache/wicket/authentication/panel/SignInPanel.java
 (original)
+++ 
wicket/trunk/jdk-1.5/wicket-auth-roles/src/main/java/org/apache/wicket/authentication/panel/SignInPanel.java
 Mon Oct 15 15:52:42 2007
@@ -30,11 +30,10 @@
 
 
 /**
- * Reusable user sign in panel with username and password as well as support 
for
- * cookie persistence of the both. When the SignInPanel's form is submitted, 
the
- * method signIn(String, String) is called, passing the username and password
- * submitted. The signIn() method should authenticate the user's session. The
- * default implementation calls AuthenticatedWebSession.get().signIn().
+ * Reusable user sign in panel with username and password as well as support 
for cookie persistence
+ * of the both. When the SignInPanel's form is submitted, the method 
signIn(String, String) is
+ * called, passing the username and password submitted. The signIn() method 
should authenticate the
+ * user's session. The default implementation calls 
AuthenticatedWebSession.get().signIn().
  * 
  * @author Jonathan Locke
  * @author Juergen Donnerstag
@@ -104,11 +103,11 @@
                {
                        if (signIn(getUsername(), getPassword()))
                        {
-                           onSignInSucceeded();
+                               onSignInSucceeded();
                        }
                        else
                        {
-                           onSignInFailed();
+                               onSignInFailed();
                        }
                }
        }

Modified: 
wicket/trunk/jdk-1.5/wicket-auth-roles/src/main/java/org/apache/wicket/authorization/strategies/role/AbstractRoleAuthorizationStrategy.java
URL: 
http://svn.apache.org/viewvc/wicket/trunk/jdk-1.5/wicket-auth-roles/src/main/java/org/apache/wicket/authorization/strategies/role/AbstractRoleAuthorizationStrategy.java?rev=584962&r1=584961&r2=584962&view=diff
==============================================================================
--- 
wicket/trunk/jdk-1.5/wicket-auth-roles/src/main/java/org/apache/wicket/authorization/strategies/role/AbstractRoleAuthorizationStrategy.java
 (original)
+++ 
wicket/trunk/jdk-1.5/wicket-auth-roles/src/main/java/org/apache/wicket/authorization/strategies/role/AbstractRoleAuthorizationStrategy.java
 Mon Oct 15 15:52:42 2007
@@ -64,9 +64,9 @@
        }
 
        /**
-        * Conducts a check to see if the roles object is empty. Since the roles
-        * object does not contain any null values and will always hold an empty
-        * string, an extra test is required beyond roles.isEmpty().
+        * Conducts a check to see if the roles object is empty. Since the 
roles object does not contain
+        * any null values and will always hold an empty string, an extra test 
is required beyond
+        * roles.isEmpty().
         * 
         * @param roles
         *            the Roles object to test

Modified: 
wicket/trunk/jdk-1.5/wicket-auth-roles/src/main/java/org/apache/wicket/authorization/strategies/role/IRoleCheckingStrategy.java
URL: 
http://svn.apache.org/viewvc/wicket/trunk/jdk-1.5/wicket-auth-roles/src/main/java/org/apache/wicket/authorization/strategies/role/IRoleCheckingStrategy.java?rev=584962&r1=584961&r2=584962&view=diff
==============================================================================
--- 
wicket/trunk/jdk-1.5/wicket-auth-roles/src/main/java/org/apache/wicket/authorization/strategies/role/IRoleCheckingStrategy.java
 (original)
+++ 
wicket/trunk/jdk-1.5/wicket-auth-roles/src/main/java/org/apache/wicket/authorization/strategies/role/IRoleCheckingStrategy.java
 Mon Oct 15 15:52:42 2007
@@ -17,11 +17,10 @@
 package org.apache.wicket.authorization.strategies.role;
 
 /**
- * Strategy for doing role checking. Normally, an implementation of this
- * strategy interface would look in the current session for credentials that
- * indicate what roles the current user can take on, but any kind of strategy 
is
- * possible. For example, you could have a role checking strategy that allowed
- * gave users the ADMIN role between 9AM and 5PM.
+ * Strategy for doing role checking. Normally, an implementation of this 
strategy interface would
+ * look in the current session for credentials that indicate what roles the 
current user can take
+ * on, but any kind of strategy is possible. For example, you could have a 
role checking strategy
+ * that allowed gave users the ADMIN role between 9AM and 5PM.
  * 
  * @author Eelco Hillenius
  * @author Jonathan Locke
@@ -29,14 +28,14 @@
 public interface IRoleCheckingStrategy
 {
        /**
-        * Whether any of the given roles matches. For example, if a user has 
role
-        * USER and the provided roles are {USER, ADMIN} this method should 
return
-        * true as the user has at least one of the roles that were provided.
+        * Whether any of the given roles matches. For example, if a user has 
role USER and the provided
+        * roles are {USER, ADMIN} this method should return true as the user 
has at least one of the
+        * roles that were provided.
         * 
         * @param roles
         *            the roles
-        * @return true if a user or whatever subject this implementation wants 
to
-        *         work with has at least on of the provided roles
+        * @return true if a user or whatever subject this implementation wants 
to work with has at
+        *         least on of the provided roles
         */
        boolean hasAnyRole(Roles roles);
 }

Modified: 
wicket/trunk/jdk-1.5/wicket-auth-roles/src/main/java/org/apache/wicket/authorization/strategies/role/Roles.java
URL: 
http://svn.apache.org/viewvc/wicket/trunk/jdk-1.5/wicket-auth-roles/src/main/java/org/apache/wicket/authorization/strategies/role/Roles.java?rev=584962&r1=584961&r2=584962&view=diff
==============================================================================
--- 
wicket/trunk/jdk-1.5/wicket-auth-roles/src/main/java/org/apache/wicket/authorization/strategies/role/Roles.java
 (original)
+++ 
wicket/trunk/jdk-1.5/wicket-auth-roles/src/main/java/org/apache/wicket/authorization/strategies/role/Roles.java
 Mon Oct 15 15:52:42 2007
@@ -31,10 +31,10 @@
 public final class Roles extends HashSet<String> implements IClusterable
 {
        private static final long serialVersionUID = 1L;
-       
+
        /** USER role (for use in annotations) */
        public static final String USER = "USER";
-       
+
        /** ADMIN role (for use in annotations) */
        public static final String ADMIN = "ADMIN";
 
@@ -116,8 +116,8 @@
         * 
         * @param roles
         *            the roles to check
-        * @return true if it contains all the roles or the provided roles 
object is
-        *         null, false otherwise
+        * @return true if it contains all the roles or the provided roles 
object is null, false
+        *         otherwise
         */
        public boolean hasAllRoles(Roles roles)
        {

Modified: 
wicket/trunk/jdk-1.5/wicket-auth-roles/src/main/java/org/apache/wicket/authorization/strategies/role/annotations/AnnotationsRoleAuthorizationStrategy.java
URL: 
http://svn.apache.org/viewvc/wicket/trunk/jdk-1.5/wicket-auth-roles/src/main/java/org/apache/wicket/authorization/strategies/role/annotations/AnnotationsRoleAuthorizationStrategy.java?rev=584962&r1=584961&r2=584962&view=diff
==============================================================================
--- 
wicket/trunk/jdk-1.5/wicket-auth-roles/src/main/java/org/apache/wicket/authorization/strategies/role/annotations/AnnotationsRoleAuthorizationStrategy.java
 (original)
+++ 
wicket/trunk/jdk-1.5/wicket-auth-roles/src/main/java/org/apache/wicket/authorization/strategies/role/annotations/AnnotationsRoleAuthorizationStrategy.java
 Mon Oct 15 15:52:42 2007
@@ -83,7 +83,7 @@
        public boolean isActionAuthorized(final Component component, final 
Action action)
        {
                // Get component's class
-               final Class<? extends Component> componentClass = 
component.getClass();
+               final Class< ? extends Component> componentClass = 
component.getClass();
 
                // Check for a single action
                if (!check(action, 
componentClass.getAnnotation(AuthorizeAction.class)))

Modified: 
wicket/trunk/jdk-1.5/wicket-auth-roles/src/main/java/org/apache/wicket/authorization/strategies/role/annotations/AuthorizeAction.java
URL: 
http://svn.apache.org/viewvc/wicket/trunk/jdk-1.5/wicket-auth-roles/src/main/java/org/apache/wicket/authorization/strategies/role/annotations/AuthorizeAction.java?rev=584962&r1=584961&r2=584962&view=diff
==============================================================================
--- 
wicket/trunk/jdk-1.5/wicket-auth-roles/src/main/java/org/apache/wicket/authorization/strategies/role/annotations/AuthorizeAction.java
 (original)
+++ 
wicket/trunk/jdk-1.5/wicket-auth-roles/src/main/java/org/apache/wicket/authorization/strategies/role/annotations/AuthorizeAction.java
 Mon Oct 15 15:52:42 2007
@@ -25,8 +25,7 @@
 
 /**
  * A mapping of 1..n roles to an action. This annotions must be embedded in the
- * [EMAIL PROTECTED] 
org.apache.wicket.authorization.strategies.role.annotations.AuthorizeActions}
- * annotation.
+ * [EMAIL PROTECTED] 
org.apache.wicket.authorization.strategies.role.annotations.AuthorizeActions} 
annotation.
  * 
  * @see org.apache.wicket.authorization.IAuthorizationStrategy
  * @see 
org.apache.wicket.authorization.strategies.role.annotations.AnnotationsRoleAuthorizationStrategy
@@ -42,9 +41,8 @@
 public @interface AuthorizeAction {
 
        /**
-        * The action that is allowed. The default actions that are supported by
-        * Wicket are <code>RENDER</code> and
-        * <code>ENABLE<code> as defined as constants
+        * The action that is allowed. The default actions that are supported 
by Wicket are
+        * <code>RENDER</code> and <code>ENABLE<code> as defined as constants
         * of [EMAIL PROTECTED] org.apache.wicket.Component}.
         * 
         * @see org.apache.wicket.Component#RENDER
@@ -57,16 +55,16 @@
        /**
         * The roles for this action.
         * 
-        * @return the roles for this action. The default is an empty string
-        *         (annotations do not allow null default values)
+        * @return the roles for this action. The default is an empty string 
(annotations do not allow
+        *         null default values)
         */
        String[] roles() default "";
 
        /**
         * The roles to deny for this action.
         * 
-        * @return the roles to deny for this action. The default is an empty 
string
-        *         (annotations do not allow null default values)
+        * @return the roles to deny for this action. The default is an empty 
string (annotations do not
+        *         allow null default values)
         */
        String[] deny() default "";
 }

Modified: 
wicket/trunk/jdk-1.5/wicket-auth-roles/src/main/java/org/apache/wicket/authorization/strategies/role/annotations/AuthorizeActions.java
URL: 
http://svn.apache.org/viewvc/wicket/trunk/jdk-1.5/wicket-auth-roles/src/main/java/org/apache/wicket/authorization/strategies/role/annotations/AuthorizeActions.java?rev=584962&r1=584961&r2=584962&view=diff
==============================================================================
--- 
wicket/trunk/jdk-1.5/wicket-auth-roles/src/main/java/org/apache/wicket/authorization/strategies/role/annotations/AuthorizeActions.java
 (original)
+++ 
wicket/trunk/jdk-1.5/wicket-auth-roles/src/main/java/org/apache/wicket/authorization/strategies/role/annotations/AuthorizeActions.java
 Mon Oct 15 15:52:42 2007
@@ -24,13 +24,12 @@
 import java.lang.annotation.Target;
 
 /**
- * Groups a set (technically an array) of [EMAIL PROTECTED] AuthorizeAction}s 
for
- * authorization. This annotation works on a class level, and can be used like
- * this:
+ * Groups a set (technically an array) of [EMAIL PROTECTED] AuthorizeAction}s 
for authorization. This
+ * annotation works on a class level, and can be used like this:
  * 
  * <pre>
  * // A panel that is only visible for users with role ADMIN
- * &#64;AuthorizeAction(action = &quot;RENDER&quot;, roles = { 
&quot;ADMIN&quot;, &quot;USER&quot; })
+ * &#064;AuthorizeAction(action = &quot;RENDER&quot;, roles = { 
&quot;ADMIN&quot;, &quot;USER&quot; })
  * public class ForAdminsAndUsers extends Panel
  * {
  *     public ForAdminsAndUsers(String id)

Modified: 
wicket/trunk/jdk-1.5/wicket-auth-roles/src/main/java/org/apache/wicket/authorization/strategies/role/annotations/AuthorizeInstantiation.java
URL: 
http://svn.apache.org/viewvc/wicket/trunk/jdk-1.5/wicket-auth-roles/src/main/java/org/apache/wicket/authorization/strategies/role/annotations/AuthorizeInstantiation.java?rev=584962&r1=584961&r2=584962&view=diff
==============================================================================
--- 
wicket/trunk/jdk-1.5/wicket-auth-roles/src/main/java/org/apache/wicket/authorization/strategies/role/annotations/AuthorizeInstantiation.java
 (original)
+++ 
wicket/trunk/jdk-1.5/wicket-auth-roles/src/main/java/org/apache/wicket/authorization/strategies/role/annotations/AuthorizeInstantiation.java
 Mon Oct 15 15:52:42 2007
@@ -24,14 +24,13 @@
 import java.lang.annotation.Target;
 
 /**
- * Annotation for configuring what roles are allowed for instantiation the
- * annotated component or package. This annotation can be used for classes and
- * packages, and can be used like this:
+ * Annotation for configuring what roles are allowed for instantiation the 
annotated component or
+ * package. This annotation can be used for classes and packages, and can be 
used like this:
  * 
  * <pre>
  *  // only users with role ADMIN are allowed to create instances of this 
page, whether it is
  *  // either bookmarkable or not
- *  &#64;AuthorizeInstantiation(&quot;ADMIN&quot;)
+ *  &#064;AuthorizeInstantiation(&quot;ADMIN&quot;)
  *  public class AdminAnnotationsBookmarkablePage extends WebPage
  * </pre>
  * 
@@ -51,8 +50,7 @@
        /**
         * Gets the roles that are allowed to take the action.
         * 
-        * @return the roles that are allowed. Returns a zero length array by
-        *         default
+        * @return the roles that are allowed. Returns a zero length array by 
default
         */
        String[] value() default {};
 }

Modified: 
wicket/trunk/jdk-1.5/wicket-auth-roles/src/main/java/org/apache/wicket/authorization/strategies/role/metadata/ActionPermissions.java
URL: 
http://svn.apache.org/viewvc/wicket/trunk/jdk-1.5/wicket-auth-roles/src/main/java/org/apache/wicket/authorization/strategies/role/metadata/ActionPermissions.java?rev=584962&r1=584961&r2=584962&view=diff
==============================================================================
--- 
wicket/trunk/jdk-1.5/wicket-auth-roles/src/main/java/org/apache/wicket/authorization/strategies/role/metadata/ActionPermissions.java
 (original)
+++ 
wicket/trunk/jdk-1.5/wicket-auth-roles/src/main/java/org/apache/wicket/authorization/strategies/role/metadata/ActionPermissions.java
 Mon Oct 15 15:52:42 2007
@@ -25,10 +25,9 @@
 
 
 /**
- * For each Action, holds a set of roles that can perform that action. Roles 
can
- * be granted access to a given action via authorize(Action, String role) and
- * denied access via unauthorize(Action, String role). All permissions can be
- * removed for a given action via authorizeAll(Action).
+ * For each Action, holds a set of roles that can perform that action. Roles 
can be granted access
+ * to a given action via authorize(Action, String role) and denied access via 
unauthorize(Action,
+ * String role). All permissions can be removed for a given action via 
authorizeAll(Action).
  * 
  * @author Eelco Hillenius
  * @author Jonathan Locke
@@ -49,7 +48,7 @@
         *            The roles
         */
        public final void authorize(final Action action, final Roles rolesToAdd)
-       {               
+       {
                if (action == null)
                {
                        throw new IllegalArgumentException("Argument action 
cannot be null");

Modified: 
wicket/trunk/jdk-1.5/wicket-auth-roles/src/main/java/org/apache/wicket/authorization/strategies/role/metadata/InstantiationPermissions.java
URL: 
http://svn.apache.org/viewvc/wicket/trunk/jdk-1.5/wicket-auth-roles/src/main/java/org/apache/wicket/authorization/strategies/role/metadata/InstantiationPermissions.java?rev=584962&r1=584961&r2=584962&view=diff
==============================================================================
--- 
wicket/trunk/jdk-1.5/wicket-auth-roles/src/main/java/org/apache/wicket/authorization/strategies/role/metadata/InstantiationPermissions.java
 (original)
+++ 
wicket/trunk/jdk-1.5/wicket-auth-roles/src/main/java/org/apache/wicket/authorization/strategies/role/metadata/InstantiationPermissions.java
 Mon Oct 15 15:52:42 2007
@@ -25,11 +25,10 @@
 
 
 /**
- * An internal data structure that maps a given component class to a set of 
role
- * strings. Permissions can be granted to instantiate a given component class
- * via authorize(Class, Roles roles) and denied via unauthorize(Class, Roles
- * roles). All authorization can be removed for a given class with
- * authorizeAll(Class).
+ * An internal data structure that maps a given component class to a set of 
role strings.
+ * Permissions can be granted to instantiate a given component class via 
authorize(Class, Roles
+ * roles) and denied via unauthorize(Class, Roles roles). All authorization 
can be removed for a
+ * given class with authorizeAll(Class).
  * 
  * @author Eelco Hillenius
  * @author Jonathan Locke
@@ -92,8 +91,8 @@
         * 
         * @param componentClass
         *            the component class
-        * @return the roles that have a binding with the given component 
class, or
-        *         null if no entries are found
+        * @return the roles that have a binding with the given component 
class, or null if no entries
+        *         are found
         */
        public Roles authorizedRoles(final Class< ? extends Component> 
componentClass)
        {

Modified: 
wicket/trunk/jdk-1.5/wicket-auth-roles/src/main/java/org/apache/wicket/authorization/strategies/role/metadata/MetaDataRoleAuthorizationStrategy.java
URL: 
http://svn.apache.org/viewvc/wicket/trunk/jdk-1.5/wicket-auth-roles/src/main/java/org/apache/wicket/authorization/strategies/role/metadata/MetaDataRoleAuthorizationStrategy.java?rev=584962&r1=584961&r2=584962&view=diff
==============================================================================
--- 
wicket/trunk/jdk-1.5/wicket-auth-roles/src/main/java/org/apache/wicket/authorization/strategies/role/metadata/MetaDataRoleAuthorizationStrategy.java
 (original)
+++ 
wicket/trunk/jdk-1.5/wicket-auth-roles/src/main/java/org/apache/wicket/authorization/strategies/role/metadata/MetaDataRoleAuthorizationStrategy.java
 Mon Oct 15 15:52:42 2007
@@ -26,11 +26,10 @@
 
 
 /**
- * Strategy that uses the Wicket metadata facility to check authorization. The
- * static <code>authorize</code> methods are for authorizing component actions
- * and component instantiation by role. This class is is the main entry point
- * for users wanting to use the roles-based authorization of the
- * wicket-auth-roles package based on wicket metadata.
+ * Strategy that uses the Wicket metadata facility to check authorization. The 
static
+ * <code>authorize</code> methods are for authorizing component actions and 
component
+ * instantiation by role. This class is is the main entry point for users 
wanting to use the
+ * roles-based authorization of the wicket-auth-roles package based on wicket 
metadata.
  * 
  * For instance, use like:
  * 
@@ -54,9 +53,8 @@
 public class MetaDataRoleAuthorizationStrategy extends 
AbstractRoleAuthorizationStrategy
 {
        /**
-        * Component meta data key for ations/ roles information. Typically, 
you do
-        * not need to use this meta data key directly, but instead use one of 
the
-        * bind methods of this class.
+        * Component meta data key for ations/ roles information. Typically, 
you do not need to use this
+        * meta data key directly, but instead use one of the bind methods of 
this class.
         */
        public static final MetaDataKey ACTION_PERMISSIONS = new 
MetaDataKey(ActionPermissions.class)
        {
@@ -64,9 +62,8 @@
        };
 
        /**
-        * Application meta data key for ations/ roles information. Typically, 
you
-        * do not need to use this meta data key directly, but instead use one 
of
-        * the bind methods of this class.
+        * Application meta data key for ations/ roles information. Typically, 
you do not need to use
+        * this meta data key directly, but instead use one of the bind methods 
of this class.
         */
        public static final MetaDataKey INSTANTIATION_PERMISSIONS = new 
MetaDataKey(
                        InstantiationPermissions.class)
@@ -78,15 +75,14 @@
        public static final String NO_ROLE = "wicket:NO_ROLE";
 
        /**
-        * Authorizes the given role to create component instances of type
-        * componentClass. This authorization is added to any previously 
authorized
-        * roles.
+        * Authorizes the given role to create component instances of type 
componentClass. This
+        * authorization is added to any previously authorized roles.
         * 
         * @param componentClass
         *            The component type that is subject for the authorization
         * @param roles
-        *            The comma separated roles that are authorized to create
-        *            component instances of type componentClass
+        *            The comma separated roles that are authorized to create 
component instances of
+        *            type componentClass
         */
        public static final void authorize(final Class< ? extends Component> 
componentClass,
                        final String roles)
@@ -103,8 +99,7 @@
        }
 
        /**
-        * Authorizes the given role to perform the given action on the given
-        * component.
+        * Authorizes the given role to perform the given action on the given 
component.
         * 
         * @param component
         *            The component that is subject to the authorization
@@ -127,8 +122,7 @@
        }
 
        /**
-        * Grants permission to all roles to create instances of the given 
component
-        * class.
+        * Grants permission to all roles to create instances of the given 
component class.
         * 
         * @param componentClass
         *            The component class
@@ -145,8 +139,7 @@
        }
 
        /**
-        * Grants permission to all roles to perform the given action on the 
given
-        * component.
+        * Grants permission to all roles to perform the given action on the 
given component.
         * 
         * @param component
         *            The component that is subject to the authorization
@@ -164,19 +157,17 @@
        }
 
        /**
-        * Removes permission for the given roles to create instances of the 
given
-        * component class. There is no danger in removing authorization by 
calling
-        * this method. If the last authorization grant is removed for a given
-        * componentClass, the internal role NO_ROLE will automatically be 
added,
-        * effectively denying access to all roles (if this was not done, all 
roles
-        * would suddenly have access since no authorization is equivalent to 
full
-        * access).
+        * Removes permission for the given roles to create instances of the 
given component class.
+        * There is no danger in removing authorization by calling this method. 
If the last
+        * authorization grant is removed for a given componentClass, the 
internal role NO_ROLE will
+        * automatically be added, effectively denying access to all roles (if 
this was not done, all
+        * roles would suddenly have access since no authorization is 
equivalent to full access).
         * 
         * @param componentClass
         *            The component type
         * @param roles
-        *            The comma separated list of roles that are no longer to be
-        *            authorized to create instances of type componentClass
+        *            The comma separated list of roles that are no longer to 
be authorized to create
+        *            instances of type componentClass
         */
        public static final void unauthorize(final Class< ? extends Component> 
componentClass,
                        final String roles)
@@ -190,21 +181,19 @@
        }
 
        /**
-        * Removes permission for the given role to perform the given action on 
the
-        * given component. There is no danger in removing authorization by 
calling
-        * this method. If the last authorization grant is removed for a given
-        * action, the internal role NO_ROLE will automatically be added,
-        * effectively denying access to all roles (if this was not done, all 
roles
-        * would suddenly have access since no authorization is equivalent to 
full
-        * access).
+        * Removes permission for the given role to perform the given action on 
the given component.
+        * There is no danger in removing authorization by calling this method. 
If the last
+        * authorization grant is removed for a given action, the internal role 
NO_ROLE will
+        * automatically be added, effectively denying access to all roles (if 
this was not done, all
+        * roles would suddenly have access since no authorization is 
equivalent to full access).
         * 
         * @param component
         *            The component
         * @param action
         *            The action
         * @param roles
-        *            The comma separated list of roles that are no longer 
allowed
-        *            to perform the given action
+        *            The comma separated list of roles that are no longer 
allowed to perform the given
+        *            action
         */
        public static final void unauthorize(final Component component, final 
Action action,
                        final String roles)
@@ -218,8 +207,8 @@
        }
 
        /**
-        * Grants authorization to instantiate the given class to just the role
-        * NO_ROLE, effectively denying all other roles.
+        * Grants authorization to instantiate the given class to just the role 
NO_ROLE, effectively
+        * denying all other roles.
         * 
         * @param componentClass
         *            The component class
@@ -231,8 +220,8 @@
        }
 
        /**
-        * Grants authorization to perform the given action to just the role
-        * NO_ROLE, effectively denying all other roles.
+        * Grants authorization to perform the given action to just the role 
NO_ROLE, effectively
+        * denying all other roles.
         * 
         * @param component
         *            the component that is subject to the authorization
@@ -257,8 +246,7 @@
        }
 
        /**
-        * Uses component level meta data to match roles for component action
-        * execution.
+        * Uses component level meta data to match roles for component action 
execution.
         * 
         * @see 
org.apache.wicket.authorization.IAuthorizationStrategy#isActionAuthorized(org.apache.wicket.Component,
         *      org.apache.wicket.authorization.Action)
@@ -283,8 +271,7 @@
        }
 
        /**
-        * Uses application level meta data to match roles for component
-        * instantiation.
+        * Uses application level meta data to match roles for component 
instantiation.
         * 
         * @see 
org.apache.wicket.authorization.IAuthorizationStrategy#isInstantiationAuthorized(java.lang.Class)
         */
@@ -299,8 +286,8 @@
                // as long as the interface does not use generics, we should 
check this
                if (!Component.class.isAssignableFrom(componentClass))
                {
-                       throw new IllegalArgumentException("argument 
componentClass must be of type "
-                                       + Component.class.getName());
+                       throw new IllegalArgumentException("argument 
componentClass must be of type " +
+                                       Component.class.getName());
                }
 
                final Roles roles = 
rolesAuthorizedToInstantiate(componentClass);
@@ -312,13 +299,12 @@
        }
 
        /**
-        * Gets the roles for creation of the given component class, or null if 
none
-        * were registered.
+        * Gets the roles for creation of the given component class, or null if 
none were registered.
         * 
         * @param componentClass
         *            the component class
-        * @return the roles that are authorized for creation of the 
componentClass,
-        *         or null if no specific authorization was configured
+        * @return the roles that are authorized for creation of the 
componentClass, or null if no
+        *         specific authorization was configured
         */
        private static Roles rolesAuthorizedToInstantiate(
                        final Class< ? extends Component> componentClass)

Modified: 
wicket/trunk/jdk-1.5/wicket-auth-roles/src/test/java/org/apache/wicket/authorization/strategies/role/annotations/AnnotationsRoleTest.java
URL: 
http://svn.apache.org/viewvc/wicket/trunk/jdk-1.5/wicket-auth-roles/src/test/java/org/apache/wicket/authorization/strategies/role/annotations/AnnotationsRoleTest.java?rev=584962&r1=584961&r2=584962&view=diff
==============================================================================
--- 
wicket/trunk/jdk-1.5/wicket-auth-roles/src/test/java/org/apache/wicket/authorization/strategies/role/annotations/AnnotationsRoleTest.java
 (original)
+++ 
wicket/trunk/jdk-1.5/wicket-auth-roles/src/test/java/org/apache/wicket/authorization/strategies/role/annotations/AnnotationsRoleTest.java
 Mon Oct 15 15:52:42 2007
@@ -38,9 +38,9 @@
  */
 public class AnnotationsRoleTest extends TestCase
 {
-    WicketTester tester;
+       WicketTester tester;
 
-    /**
+       /**
         * Construct.
         */
        public AnnotationsRoleTest()
@@ -58,14 +58,18 @@
                super(arg0);
        }
 
-    @Override
-    protected void setUp() throws Exception {
-        tester = new WicketTester();
-    }
-    @Override
-    protected void tearDown() throws Exception {
-        tester.destroy();
-    }
+       @Override
+       protected void setUp() throws Exception
+       {
+               tester = new WicketTester();
+       }
+
+       @Override
+       protected void tearDown() throws Exception
+       {
+               tester.destroy();
+       }
+
        /**
         * @throws Exception
         */
@@ -123,7 +127,8 @@
                        }
                }
                Listener listener = new Listener();
-               
tester.getApplication().getSecuritySettings().setUnauthorizedComponentInstantiationListener(listener);
+               tester.getApplication().getSecuritySettings()
+                               
.setUnauthorizedComponentInstantiationListener(listener);
 
                try
                {

Modified: 
wicket/trunk/jdk-1.5/wicket-auth-roles/src/test/java/org/apache/wicket/authorization/strategies/role/metadata/ActionPermissionsTest.java
URL: 
http://svn.apache.org/viewvc/wicket/trunk/jdk-1.5/wicket-auth-roles/src/test/java/org/apache/wicket/authorization/strategies/role/metadata/ActionPermissionsTest.java?rev=584962&r1=584961&r2=584962&view=diff
==============================================================================
--- 
wicket/trunk/jdk-1.5/wicket-auth-roles/src/test/java/org/apache/wicket/authorization/strategies/role/metadata/ActionPermissionsTest.java
 (original)
+++ 
wicket/trunk/jdk-1.5/wicket-auth-roles/src/test/java/org/apache/wicket/authorization/strategies/role/metadata/ActionPermissionsTest.java
 Mon Oct 15 15:52:42 2007
@@ -38,6 +38,7 @@
 
        /**
         * Construct.
+        * 
         * @param arg0
         */
        public ActionPermissionsTest(String arg0)

Modified: 
wicket/trunk/jdk-1.5/wicket-auth-roles/src/test/java/org/apache/wicket/util/license/ApacheLicenceHeaderTest.java
URL: 
http://svn.apache.org/viewvc/wicket/trunk/jdk-1.5/wicket-auth-roles/src/test/java/org/apache/wicket/util/license/ApacheLicenceHeaderTest.java?rev=584962&r1=584961&r2=584962&view=diff
==============================================================================
--- 
wicket/trunk/jdk-1.5/wicket-auth-roles/src/test/java/org/apache/wicket/util/license/ApacheLicenceHeaderTest.java
 (original)
+++ 
wicket/trunk/jdk-1.5/wicket-auth-roles/src/test/java/org/apache/wicket/util/license/ApacheLicenceHeaderTest.java
 Mon Oct 15 15:52:42 2007
@@ -16,12 +16,10 @@
  */
 package org.apache.wicket.util.license;
 
-import org.apache.wicket.util.license.ApacheLicenseHeaderTestCase;
 
 /**
- * Test that the license headers are in place in this project. The tests are 
run
- * from [EMAIL PROTECTED] ApacheLicenseHeaderTestCase}, but you can add 
project specific
- * tests here if needed.
+ * Test that the license headers are in place in this project. The tests are 
run from
+ * [EMAIL PROTECTED] ApacheLicenseHeaderTestCase}, but you can add project 
specific tests here if needed.
  * 
  * @author Frank Bille Jensen (frankbille)
  */
@@ -32,20 +30,16 @@
         */
        public ApacheLicenceHeaderTest()
        {
-//             addHeaders = true;
-               
+               // addHeaders = true;
+
                /*
                 * License header in test files lower the visibility of the 
test.
                 */
-               htmlIgnore = new String[] {
-                               "src/test/java"
-               };
-               
+               htmlIgnore = new String[] { "src/test/java" };
+
                /*
                 * Low level configuration files for logging. No license needed.
                 */
-               propertiesIgnore = new String[] {
-                               "src/test/java"
-               };
+               propertiesIgnore = new String[] { "src/test/java" };
        }
 }


Reply via email to