[Checkins] SVN: Products.PluggableAuthService/trunk/ Nuke trailing white space.

Maurits van Rees m.van.rees at zestsoftware.nl
Tue Jan 3 10:55:46 UTC 2012


Log message for revision 123909:
  Nuke trailing white space.

Changed:
  U   Products.PluggableAuthService/trunk/Products/PluggableAuthService/Extensions/upgrade.py
  U   Products.PluggableAuthService/trunk/Products/PluggableAuthService/PluggableAuthService.py
  U   Products.PluggableAuthService/trunk/Products/PluggableAuthService/PropertiedUser.py
  U   Products.PluggableAuthService/trunk/Products/PluggableAuthService/compatibility.zcml
  U   Products.PluggableAuthService/trunk/Products/PluggableAuthService/events.zcml
  U   Products.PluggableAuthService/trunk/Products/PluggableAuthService/exportimport.py
  U   Products.PluggableAuthService/trunk/Products/PluggableAuthService/interfaces/authservice.py
  U   Products.PluggableAuthService/trunk/Products/PluggableAuthService/interfaces/plugins.py
  U   Products.PluggableAuthService/trunk/Products/PluggableAuthService/interfaces/propertysheets.py
  U   Products.PluggableAuthService/trunk/Products/PluggableAuthService/interfaces/request.py
  U   Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/DelegatingMultiPlugin.py
  U   Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/DomainAuthHelper.py
  U   Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/DynamicGroupsPlugin.py
  U   Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/RecursiveGroupsPlugin.py
  U   Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/SearchPrincipalsPlugin.py
  U   Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/ZODBGroupManager.py
  U   Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/ZODBRoleManager.py
  U   Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/ZODBUserManager.py
  U   Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/tests/test_ChallengeProtocolChooser.py
  U   Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/tests/test_CookieAuthHelper.py
  U   Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/tests/test_LocalRolePlugin.py
  U   Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/tests/test_RecursiveGroupsPlugin.py
  U   Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/tests/test_RequestTypeSniffer.py
  U   Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/tests/test_ZODBGroupManager.py
  U   Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/tests/test_ZODBRoleManager.py
  U   Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/tests/test_exportimport.py
  U   Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/www/bpActivateInterfaces.zpt
  U   Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/www/caAdd.zpt
  U   Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/www/cpcAdd.zpt
  U   Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/www/cpcEdit.zpt
  U   Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/www/daAdd.zpt
  U   Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/www/daGeneric.zpt
  U   Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/www/daMatches.zpt
  U   Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/www/dgpAdd.zpt
  U   Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/www/dgpGroups.zpt
  U   Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/www/dmpAdd.zpt
  U   Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/www/hbAdd.zpt
  U   Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/www/iaAdd.zpt
  U   Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/www/lrpAdd.zpt
  U   Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/www/rgpAdd.zpt
  U   Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/www/rtsAdd.zpt
  U   Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/www/saAdd.zpt
  U   Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/www/spAdd.zpt
  U   Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/www/spEditInterfaces.zpt
  U   Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/www/sppAdd.zpt
  U   Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/www/zgAdd.zpt
  U   Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/www/zgGroups.zpt
  U   Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/www/zrAdd.zpt
  U   Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/www/zrRoles.zpt
  U   Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/www/zuAdd.zpt
  U   Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/www/zuUsers.zpt
  U   Products.PluggableAuthService/trunk/Products/PluggableAuthService/tests/test_PluggableAuthService.py
  U   Products.PluggableAuthService/trunk/Products/PluggableAuthService/tests/test_PropertiedUser.py
  U   Products.PluggableAuthService/trunk/Products/PluggableAuthService/www/pasAddForm.zpt
  U   Products.PluggableAuthService/trunk/Products/PluggableAuthService/www/pasSearch.zpt
  U   Products.PluggableAuthService/trunk/Products/PluggableAuthService/www/two_lists.zpt
  U   Products.PluggableAuthService/trunk/setup.py

-=-
Modified: Products.PluggableAuthService/trunk/Products/PluggableAuthService/Extensions/upgrade.py
===================================================================
--- Products.PluggableAuthService/trunk/Products/PluggableAuthService/Extensions/upgrade.py	2012-01-03 10:54:48 UTC (rev 123908)
+++ Products.PluggableAuthService/trunk/Products/PluggableAuthService/Extensions/upgrade.py	2012-01-03 10:55:45 UTC (rev 123909)
@@ -2,8 +2,8 @@
 #
 # Copyright (c) 2004 Zope Foundation and Contributors.
 #
-# This software is subject to the provisions of the Zope Visible Source 
-# License, Version 1.0 (ZVSL).  A copy of the ZVSL should accompany this 
+# This software is subject to the provisions of the Zope Visible Source
+# License, Version 1.0 (ZVSL).  A copy of the ZVSL should accompany this
 # distribution.
 #
 # THIS SOFTWARE IS PROVIDED "AS IS" AND ANY AND ALL EXPRESS OR IMPLIED

Modified: Products.PluggableAuthService/trunk/Products/PluggableAuthService/PluggableAuthService.py
===================================================================
--- Products.PluggableAuthService/trunk/Products/PluggableAuthService/PluggableAuthService.py	2012-01-03 10:54:48 UTC (rev 123908)
+++ Products.PluggableAuthService/trunk/Products/PluggableAuthService/PluggableAuthService.py	2012-01-03 10:55:45 UTC (rev 123909)
@@ -605,9 +605,9 @@
 
                         except _SWALLOWABLE_PLUGIN_EXCEPTIONS:
                             reraise(auth)
-                            msg = 'AuthenticationPlugin %s error' % ( 
+                            msg = 'AuthenticationPlugin %s error' % (
                                     authenticator_id, )
-                            logger.debug(msg, exc_info=True) 
+                            logger.debug(msg, exc_info=True)
                             continue
 
                         if user_id is not None:

Modified: Products.PluggableAuthService/trunk/Products/PluggableAuthService/PropertiedUser.py
===================================================================
--- Products.PluggableAuthService/trunk/Products/PluggableAuthService/PropertiedUser.py	2012-01-03 10:54:48 UTC (rev 123908)
+++ Products.PluggableAuthService/trunk/Products/PluggableAuthService/PropertiedUser.py	2012-01-03 10:55:45 UTC (rev 123909)
@@ -102,7 +102,7 @@
         principal_ids = list( group_ids )
         principal_ids.insert( 0, user_id )
 
-        local ={} 
+        local ={}
         object = aq_inner( object )
 
         while 1:

Modified: Products.PluggableAuthService/trunk/Products/PluggableAuthService/compatibility.zcml
===================================================================
--- Products.PluggableAuthService/trunk/Products/PluggableAuthService/compatibility.zcml	2012-01-03 10:54:48 UTC (rev 123908)
+++ Products.PluggableAuthService/trunk/Products/PluggableAuthService/compatibility.zcml	2012-01-03 10:55:45 UTC (rev 123909)
@@ -3,7 +3,7 @@
    xmlns:five="http://namespaces.zope.org/five">
 
   <five:deprecatedManageAddDelete
-     class="Products.PluggableAuthService.PluggableAuthService.PluggableAuthService" 
+     class="Products.PluggableAuthService.PluggableAuthService.PluggableAuthService"
      />
 
   <five:deprecatedManageAddDelete

Modified: Products.PluggableAuthService/trunk/Products/PluggableAuthService/events.zcml
===================================================================
--- Products.PluggableAuthService/trunk/Products/PluggableAuthService/events.zcml	2012-01-03 10:54:48 UTC (rev 123908)
+++ Products.PluggableAuthService/trunk/Products/PluggableAuthService/events.zcml	2012-01-03 10:55:45 UTC (rev 123909)
@@ -1,7 +1,7 @@
 <configure
     xmlns="http://namespaces.zope.org/zope"
     >
- 
+
    <subscriber handler=".events.PASEventNotify" />
 
    <subscriber

Modified: Products.PluggableAuthService/trunk/Products/PluggableAuthService/exportimport.py
===================================================================
--- Products.PluggableAuthService/trunk/Products/PluggableAuthService/exportimport.py	2012-01-03 10:54:48 UTC (rev 123908)
+++ Products.PluggableAuthService/trunk/Products/PluggableAuthService/exportimport.py	2012-01-03 10:55:45 UTC (rev 123909)
@@ -45,7 +45,7 @@
         registry._setId(object_id)
         self.context._setObject(object_id, registry)
         return registry
-    
+
 class PAS_CF_Namer(object):
 
     implements(IContentFactoryName)

Modified: Products.PluggableAuthService/trunk/Products/PluggableAuthService/interfaces/authservice.py
===================================================================
--- Products.PluggableAuthService/trunk/Products/PluggableAuthService/interfaces/authservice.py	2012-01-03 10:54:48 UTC (rev 123908)
+++ Products.PluggableAuthService/trunk/Products/PluggableAuthService/interfaces/authservice.py	2012-01-03 10:55:45 UTC (rev 123909)
@@ -72,7 +72,7 @@
     """
 
     def addPropertysheet( id, data ):
-        
+
         """ Add a new property sheet to the user.
 
         The property sheet has to be a map or an IPropertySheet instance.

Modified: Products.PluggableAuthService/trunk/Products/PluggableAuthService/interfaces/plugins.py
===================================================================
--- Products.PluggableAuthService/trunk/Products/PluggableAuthService/interfaces/plugins.py	2012-01-03 10:54:48 UTC (rev 123908)
+++ Products.PluggableAuthService/trunk/Products/PluggableAuthService/interfaces/plugins.py	2012-01-03 10:55:45 UTC (rev 123909)
@@ -41,8 +41,8 @@
 
     def extractCredentials( request ):
 
-        """ request -> { 'login' : login 
-                       , 'password' : password 
+        """ request -> { 'login' : login
+                       , 'password' : password
                        , k1 : v1
                        ,   ...
                        , kN : vN
@@ -62,8 +62,8 @@
 
     def extractCredentials( request ):
 
-        """ request -> { 'login' : login 
-                       , 'password' : password 
+        """ request -> { 'login' : login
+                       , 'password' : password
                        , 'remote_host' : remote_host
                        , 'remote_addr' : remote_addr
                        , k1 : v1
@@ -90,7 +90,7 @@
 
         o 'credentials' will be a mapping, as returned by IExtractionPlugin.
 
-        o Return a  tuple consisting of user ID (which may be different 
+        o Return a  tuple consisting of user ID (which may be different
           from the login name) and login
 
         o If the credentials cannot be authenticated, return None.
@@ -237,7 +237,7 @@
 
         """ principal -> ( group_1, ... group_N )
 
-        o Return a sequence of group names to which the principal 
+        o Return a sequence of group names to which the principal
           (either a user or another group) belongs.
 
         o May assign groups based on values in the REQUEST object, if present
@@ -325,7 +325,7 @@
           plugin should return mappings for all users satisfying the criteria.
 
         o Minimal keys in the returned mappings:
-        
+
           'id' -- (required) the user ID, which may be different than
                   the login name
 
@@ -366,8 +366,8 @@
           return at most one mapping per supplied ID ('id' and 'login'
           may be sequences).
 
-        o If 'exact_match' is False, then 'id' may be treated by 
-          the plugin as "contains" searches (more complicated searches 
+        o If 'exact_match' is False, then 'id' may be treated by
+          the plugin as "contains" searches (more complicated searches
           may be supported by some plugins using other keyword arguments).
 
         o If 'sort_by' is passed, the results will be sorted accordingly.
@@ -375,11 +375,11 @@
 
         o If 'max_results' is specified, it must be a positive integer,
           limiting the number of returned mappings.  If unspecified, the
-          plugin should return mappings for all groups satisfying the 
+          plugin should return mappings for all groups satisfying the
           criteria.
 
         o Minimal keys in the returned mappings:
-        
+
           'id' -- (required) the group ID
 
           'pluginid' -- (required) the plugin ID (as returned by getId())
@@ -417,8 +417,8 @@
           return at most one mapping per supplied ID ('id' and 'login'
           may be sequences).
 
-        o If 'exact_match' is False, then 'id' may be treated by 
-          the plugin as "contains" searches (more complicated searches 
+        o If 'exact_match' is False, then 'id' may be treated by
+          the plugin as "contains" searches (more complicated searches
           may be supported by some plugins using other keyword arguments).
 
         o If 'sort_by' is passed, the results will be sorted accordingly.
@@ -426,11 +426,11 @@
 
         o If 'max_results' is specified, it must be a positive integer,
           limiting the number of returned mappings.  If unspecified, the
-          plugin should return mappings for all roles satisfying the 
+          plugin should return mappings for all roles satisfying the
           criteria.
 
         o Minimal keys in the returned mappings:
-        
+
           'id' -- (required) the role ID
 
           'pluginid' -- (required) the plugin ID (as returned by getId())
@@ -464,7 +464,7 @@
     """
     def chooseProtocols( request ):
         """ -> ( protocol_1, ... protocol_N) | None
-        
+
         o If a set of protocols is returned, the first plugin with a
             protocol that is in the set will define the protocol to be
             used for the current request.

Modified: Products.PluggableAuthService/trunk/Products/PluggableAuthService/interfaces/propertysheets.py
===================================================================
--- Products.PluggableAuthService/trunk/Products/PluggableAuthService/interfaces/propertysheets.py	2012-01-03 10:54:48 UTC (rev 123908)
+++ Products.PluggableAuthService/trunk/Products/PluggableAuthService/interfaces/propertysheets.py	2012-01-03 10:55:45 UTC (rev 123909)
@@ -22,7 +22,7 @@
 class IPropertySheet( Interface ):
 
     """ Interface for queryable property sheets.
-    
+
     o Objects implementing this interface can play in read-only fashion
       in OFS.PropertySheets' framework.
     """

Modified: Products.PluggableAuthService/trunk/Products/PluggableAuthService/interfaces/request.py
===================================================================
--- Products.PluggableAuthService/trunk/Products/PluggableAuthService/interfaces/request.py	2012-01-03 10:54:48 UTC (rev 123908)
+++ Products.PluggableAuthService/trunk/Products/PluggableAuthService/interfaces/request.py	2012-01-03 10:55:45 UTC (rev 123909)
@@ -52,4 +52,4 @@
 
     """ FTP Request
     """
-    
+

Modified: Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/DelegatingMultiPlugin.py
===================================================================
--- Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/DelegatingMultiPlugin.py	2012-01-03 10:54:48 UTC (rev 123908)
+++ Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/DelegatingMultiPlugin.py	2012-01-03 10:55:45 UTC (rev 123909)
@@ -64,7 +64,7 @@
                                    , REQUEST=None
                                    ):
     """ Factory method to instantiate a DelegatingMultiPlugin """
-    # Make sure we really are working in our container (the 
+    # Make sure we really are working in our container (the
     # PluggableAuthService object)
     self = self.this()
 
@@ -219,7 +219,7 @@
                                , 'login' : user.getUserName()
                                , 'pluginid' : plugin_id
                                , 'editurl' : '%s' % edit_url
-                               } ) 
+                               } )
         else:
             l_results = []
             seen = []

Modified: Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/DomainAuthHelper.py
===================================================================
--- Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/DomainAuthHelper.py	2012-01-03 10:54:48 UTC (rev 123908)
+++ Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/DomainAuthHelper.py	2012-01-03 10:55:45 UTC (rev 123909)
@@ -228,14 +228,14 @@
 
         if not r_host and not r_address:
             return tuple(matches)
-        
+
         all_info = list(self._domain_map.get(login, []))
         all_info.extend(self._domain_map.get('', []))
-        
+
         if not r_host:
             try:
                 r_host = socket.gethostbyaddr(r_address)[0]
-            except socket.error: 
+            except socket.error:
                 pass
 
         if not r_address:
@@ -282,7 +282,7 @@
                            , 'roles' : match_info['roles']
                            , 'username' : match_info['username']
                            } )
-        
+
         return result
 
 

Modified: Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/DynamicGroupsPlugin.py
===================================================================
--- Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/DynamicGroupsPlugin.py	2012-01-03 10:54:48 UTC (rev 123908)
+++ Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/DynamicGroupsPlugin.py	2012-01-03 10:55:45 UTC (rev 123909)
@@ -370,7 +370,7 @@
         # This method changes the enumerateGroups return value
         view_name = createViewName('enumerateGroups')
         self.ZCacheable_invalidate(view_name=view_name)
-            
+
     security.declareProtected( ManageGroups, 'updateGroup' )
     def updateGroup( self
                    , group_id
@@ -408,7 +408,7 @@
         self.ZCacheable_invalidate(view_name=view_name)
         view_name = createViewName('enumerateGroups', group_id)
         self.ZCacheable_invalidate(view_name=view_name)
-            
+
     security.declareProtected( ManageGroups, 'removeGroup' )
     def removeGroup( self, group_id, REQUEST=None ):
 
@@ -513,7 +513,7 @@
             message = 'no+groups+selected'
 
         else:
-        
+
             for group_id in group_ids:
                 self.removeGroup( group_id )
 

Modified: Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/RecursiveGroupsPlugin.py
===================================================================
--- Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/RecursiveGroupsPlugin.py	2012-01-03 10:54:48 UTC (rev 123908)
+++ Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/RecursiveGroupsPlugin.py	2012-01-03 10:55:45 UTC (rev 123909)
@@ -94,7 +94,7 @@
                 continue
             seen.append( test )
             new_groups = parent._getGroupsForPrincipal(
-                PropertiedUser( test ).__of__(parent), 
+                PropertiedUser( test ).__of__(parent),
                 ignore_plugins=( self.getId(), ) )
             if new_groups:
                 set.extend( new_groups )

Modified: Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/SearchPrincipalsPlugin.py
===================================================================
--- Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/SearchPrincipalsPlugin.py	2012-01-03 10:54:48 UTC (rev 123908)
+++ Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/SearchPrincipalsPlugin.py	2012-01-03 10:55:45 UTC (rev 123909)
@@ -12,7 +12,7 @@
 #
 ##############################################################################
 """ SearchPrincipalsPlugin   Plugin to delegate enumerateUsers
-                             and enumerateGroups requests to another 
+                             and enumerateGroups requests to another
                              PluggableAuthService
 """
 

Modified: Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/ZODBGroupManager.py
===================================================================
--- Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/ZODBGroupManager.py	2012-01-03 10:54:48 UTC (rev 123908)
+++ Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/ZODBGroupManager.py	2012-01-03 10:55:45 UTC (rev 123909)
@@ -159,7 +159,7 @@
 
         o Return one mapping per group, with the following keys:
 
-          - 'id' 
+          - 'id'
         """
         return self._groups.values()
 
@@ -289,7 +289,7 @@
 
         """ Remove a prinicpal from from a group.
 
-        o Return a boolean indicating whether the principal was already 
+        o Return a boolean indicating whether the principal was already
           a member of the group.
 
         o Raise KeyError if 'group_id' is unknown.
@@ -313,7 +313,7 @@
     #
     #   ZMI
     #
-    manage_options = ( ( { 'label': 'Groups', 
+    manage_options = ( ( { 'label': 'Groups',
                            'action': 'manage_groups', }
                          ,
                        )
@@ -430,7 +430,7 @@
     manage_addPrincipalsToGroup = postonly(manage_addPrincipalsToGroup)
 
     security.declareProtected( ManageGroups
-                             , 'manage_removePrincipalsFromGroup' 
+                             , 'manage_removePrincipalsFromGroup'
                              )
     def manage_removePrincipalsFromGroup( self
                                         , group_id

Modified: Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/ZODBRoleManager.py
===================================================================
--- Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/ZODBRoleManager.py	2012-01-03 10:54:48 UTC (rev 123908)
+++ Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/ZODBRoleManager.py	2012-01-03 10:55:45 UTC (rev 123909)
@@ -36,7 +36,7 @@
 from Products.PluggableAuthService.plugins.BasePlugin import BasePlugin
 from Products.PluggableAuthService.utils import classImplements
 
-import logging 
+import logging
 
 LOG = logging.getLogger('PluggableAuthService')
 
@@ -282,7 +282,7 @@
                 parent = aq_parent( self )
                 info = parent.searchPrincipals( id=k, exact_match=True )
 
-                if len(info) > 1:                    
+                if len(info) > 1:
                     message = ("Multiple groups or users exist with the "
                                "name '%s'. Remove one of the duplicate groups "
                                "or users." % (k))
@@ -347,7 +347,7 @@
     #
     #   ZMI
     #
-    manage_options = ( ( { 'label': 'Roles', 
+    manage_options = ( ( { 'label': 'Roles',
                            'action': 'manage_roles', }
                          ,
                        )

Modified: Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/ZODBUserManager.py
===================================================================
--- Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/ZODBUserManager.py	2012-01-03 10:54:48 UTC (rev 123908)
+++ Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/ZODBUserManager.py	2012-01-03 10:55:45 UTC (rev 123909)
@@ -108,7 +108,7 @@
 
         if reference is None:
             return None
-        
+
         if AuthEncoding.is_encrypted( reference ):
             if AuthEncoding.pw_validate( reference, password ):
                 return userid, login
@@ -205,7 +205,7 @@
                        , 'login' : self._userid_to_login[ user_id ]
                        , 'pluginid' : plugin_id
                        , 'editurl' : '%s?%s' % (e_url, qs)
-                       } 
+                       }
 
                 if not user_filter or user_filter( info ):
                     user_info.append( info )
@@ -253,7 +253,7 @@
 
         o Return one mapping per user, with the following keys:
 
-          - 'user_id' 
+          - 'user_id'
           - 'login_name'
         """
         return [ self.getUserInfo( x ) for x in self._user_passwords.keys() ]
@@ -349,7 +349,7 @@
     #
     #   ZMI
     #
-    manage_options = ( ( { 'label': 'Users', 
+    manage_options = ( ( { 'label': 'Users',
                            'action': 'manage_users', }
                          ,
                        )
@@ -383,7 +383,7 @@
             message = 'password+and+confirm+do+not+match'
 
         else:
-        
+
             if not login_name:
                 login_name = user_id
 
@@ -412,7 +412,7 @@
             message = 'password+and+confirm+do+not+match'
 
         else:
-        
+
             self.updateUserPassword( user_id, password )
 
             message = 'password+updated'
@@ -455,7 +455,7 @@
             message = 'no+users+selected'
 
         else:
-        
+
             for user_id in user_ids:
                 self.removeUser( user_id )
 
@@ -500,7 +500,7 @@
             message = 'password+and+confirm+do+not+match'
 
         else:
-        
+
             if not login_name:
                 login_name = user_id
 

Modified: Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/tests/test_ChallengeProtocolChooser.py
===================================================================
--- Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/tests/test_ChallengeProtocolChooser.py	2012-01-03 10:54:48 UTC (rev 123908)
+++ Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/tests/test_ChallengeProtocolChooser.py	2012-01-03 10:55:45 UTC (rev 123909)
@@ -21,7 +21,7 @@
     import IChallengeProtocolChooser_conformance
 
 class ChallengeProtocolChooser( unittest.TestCase
-                                , IChallengeProtocolChooser_conformance 
+                                , IChallengeProtocolChooser_conformance
                               ):
 
 
@@ -39,9 +39,9 @@
 
 if __name__ == "__main__":
     unittest.main()
-        
+
 def test_suite():
     return unittest.TestSuite((
         unittest.makeSuite( ChallengeProtocolChooser ),
         ))
-        
+

Modified: Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/tests/test_CookieAuthHelper.py
===================================================================
--- Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/tests/test_CookieAuthHelper.py	2012-01-03 10:54:48 UTC (rev 123908)
+++ Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/tests/test_CookieAuthHelper.py	2012-01-03 10:55:45 UTC (rev 123909)
@@ -104,7 +104,7 @@
         # http://www.zope.org/Collectors/PAS/43
         # Edge case: The ZPublisher sets a cookie's value to "deleted"
         # in the current request if expireCookie is called. If we hit
-        # extractCredentials in the same request after this, it would 
+        # extractCredentials in the same request after this, it would
         # blow up trying to deal with the invalid cookie value.
         helper = self._makeOne()
         response = FauxCookieResponse()
@@ -130,7 +130,7 @@
         self.assertEqual(len(response.headers), 3)
         self.failUnless(response.headers['Location'].endswith(urllib.quote(testURL)))
         self.assertEqual(response.headers['Cache-Control'], 'no-cache')
-        self.assertEqual(response.headers['Expires'], 'Sat, 01 Jan 2000 00:00:00 GMT')        
+        self.assertEqual(response.headers['Expires'], 'Sat, 01 Jan 2000 00:00:00 GMT')
 
     def test_challenge_with_vhm( self ):
         rc, root, folder, object = self._makeTree()
@@ -173,27 +173,27 @@
         helper.login()
         self.assertEqual(len(response.cookies), 0)
 
-    def test_extractCredentials_from_cookie_with_colon_in_password(self): 
+    def test_extractCredentials_from_cookie_with_colon_in_password(self):
         # http://www.zope.org/Collectors/PAS/51
         # Passwords with ":" characters broke authentication
-        from base64 import encodestring 
+        from base64 import encodestring
 
-        helper = self._makeOne() 
-        response = FauxCookieResponse() 
-        request = FauxSettableRequest(RESPONSE=response) 
+        helper = self._makeOne()
+        response = FauxCookieResponse()
+        request = FauxSettableRequest(RESPONSE=response)
 
         cookie_str = '%s:%s' % ('foo'.encode('hex'), 'b:ar'.encode('hex'))
         cookie_val = encodestring(cookie_str)
-        cookie_val = cookie_val.rstrip() 
-        request.set(helper.cookie_name, cookie_val) 
+        cookie_val = cookie_val.rstrip()
+        request.set(helper.cookie_name, cookie_val)
 
-        self.assertEqual(helper.extractCredentials(request), 
-                        {'login': 'foo', 
-                         'password': 'b:ar', 
-                         'remote_host': '', 
-                         'remote_address': ''}) 
+        self.assertEqual(helper.extractCredentials(request),
+                        {'login': 'foo',
+                         'password': 'b:ar',
+                         'remote_host': '',
+                         'remote_address': ''})
 
-    def test_extractCredentials_from_cookie_with_colon_that_is_not_ours(self): 
+    def test_extractCredentials_from_cookie_with_colon_that_is_not_ours(self):
         # http://article.gmane.org/gmane.comp.web.zope.plone.product-developers/5145
         from base64 import encodestring
 

Modified: Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/tests/test_LocalRolePlugin.py
===================================================================
--- Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/tests/test_LocalRolePlugin.py	2012-01-03 10:54:48 UTC (rev 123908)
+++ Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/tests/test_LocalRolePlugin.py	2012-01-03 10:55:45 UTC (rev 123909)
@@ -44,7 +44,7 @@
 class FauxRoot( FauxContainer ):
 
     isTopLevelPrincipiaApplicationObject = 1
-    
+
     def getPhysicalRoot( self ):
         return self
 
@@ -106,7 +106,7 @@
     def test_no_local_roles( self ):
 
         rc, root, folder, object = self._makeTree()
-        
+
         lrp = self._makeOne( 'no_roles' ).__of__(root)
 
         user = FauxUser( 'loser' ).__of__(root)
@@ -118,7 +118,7 @@
         rc, root, folder, object = self._makeTree()
 
         root.__ac_local_roles__ = { 'some_manager' : [ 'Manager' ] }
-        
+
         lrp = self._makeOne( 'roles' ).__of__(root)
 
         user = FauxUser( 'some_manager' ).__of__(root)
@@ -128,8 +128,8 @@
 if __name__ == "__main__":
     unittest.main()
 
-    
+
 def test_suite():
     return unittest.TestSuite((
         unittest.makeSuite( LocalRolePluginTestCase ),
-        ))               
+        ))

Modified: Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/tests/test_RecursiveGroupsPlugin.py
===================================================================
--- Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/tests/test_RecursiveGroupsPlugin.py	2012-01-03 10:54:48 UTC (rev 123908)
+++ Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/tests/test_RecursiveGroupsPlugin.py	2012-01-03 10:55:45 UTC (rev 123909)
@@ -24,7 +24,7 @@
 
     def __init__( self ):
         self._id = 'acl_users'
-        
+
     def _getGroupsForPrincipal( self, principal, request=None, plugins=None
                               , ignore_plugins=None ):
         all_groups = []
@@ -42,14 +42,14 @@
         return all_groups
 
 class DummyPrincipal:
-    
+
     def __init__( self, id, groups=() ):
         self._id = id
         self._groups = groups
-        
+
     def getId( self ):
         return self._id
-        
+
     def getGroups( self ):
         return self._groups
 
@@ -62,10 +62,10 @@
 
     def getId( self ):
         return self._id
-    
+
     def addGroup( self, group_id ):
         self._groups[group_id] = 1
-        
+
     def addPrincipalToGroup( self, prin, group_id ):
         prin_id = prin.getId()
         already_in = self._prin_to_group.get( prin_id, () )
@@ -92,7 +92,7 @@
         return self._getTargetClass()( id=id, *args, **kw )
 
     def test_simple_flattening( self ):
-        
+
         pas = FauxPAS()
         dgm = DummyGroupsManager( 'dummy' )
         rgp = self._makeOne( 'rgp' )
@@ -103,20 +103,20 @@
         dgm = pas._getOb( 'dgm' )
         dgm.addGroup( 'group1' )
         dgm.addGroup( 'group2' )
-        
+
         rgp = pas._getOb( 'rgp' )
 
         user = DummyPrincipal( 'user1', ( 'dummy:group1', ) )
-                
+
         dgm.addPrincipalToGroup( user, 'group1' )
         dgm.addPrincipalToGroup( DummyPrincipal( 'dummy:group1' ), 'group2' )
-        
+
         self.assertEqual( rgp.getGroupsForPrincipal( user )
-                        , ( 'dummy:group1', 'dummy:group2' ) 
+                        , ( 'dummy:group1', 'dummy:group2' )
                         )
 
     def test_complex_flattening( self ):
-        
+
         pas = FauxPAS()
         dgm = DummyGroupsManager( 'dummy' )
         odgm = DummyGroupsManager( 'other_dummy' )
@@ -135,16 +135,16 @@
         odgm.addGroup( 'group4' )
 
         rgp = pas._getOb( 'rgp' )
-        
+
         user = DummyPrincipal( 'user1', ( 'dummy:group1'
                                         , 'other_dummy:group3' ) )
-                
+
         dgm.addPrincipalToGroup( user, 'group1' )
         dgm.addPrincipalToGroup( DummyPrincipal( 'dummy:group1' ), 'group2' )
 
         odgm.addPrincipalToGroup( user, 'group3' )
         odgm.addPrincipalToGroup( DummyPrincipal( 'dummy:group2' ), 'group4' )
-        
+
         groups = rgp.getGroupsForPrincipal( user )
         self.assertEqual( len( groups ), 4 )
         self.failUnless( 'dummy:group1' in groups )
@@ -153,7 +153,7 @@
         self.failUnless( 'other_dummy:group4' in groups )
 
     def test_cross_nested_flattening( self ):
-        
+
         pas = FauxPAS()
         dgm = DummyGroupsManager( 'dummy' )
         odgm = DummyGroupsManager( 'other_dummy' )
@@ -170,17 +170,17 @@
         odgm.addGroup( 'group2' )
 
         rgp = pas._getOb( 'rgp' )
-        
+
         user = DummyPrincipal( 'user1', ( 'dummy:group1'
                                         , 'other_dummy:group2' ) )
-                
+
         dgm.addPrincipalToGroup( user, 'group1' )
         dgm.addPrincipalToGroup( DummyPrincipal( 'other_dummy:group1' )
                                , 'group1' )
 
         odgm.addPrincipalToGroup( user, 'group2' )
         odgm.addPrincipalToGroup( DummyPrincipal( 'dummy:group1' ), 'group2' )
-        
+
         groups = rgp.getGroupsForPrincipal( user )
         self.assertEqual( len( groups ), 2 )
         self.failUnless( 'dummy:group1' in groups )

Modified: Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/tests/test_RequestTypeSniffer.py
===================================================================
--- Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/tests/test_RequestTypeSniffer.py	2012-01-03 10:54:48 UTC (rev 123908)
+++ Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/tests/test_RequestTypeSniffer.py	2012-01-03 10:55:45 UTC (rev 123909)
@@ -21,7 +21,7 @@
     import IRequestTypeSniffer_conformance
 
 class RequestTypeSniffer( unittest.TestCase
-                          , IRequestTypeSniffer_conformance 
+                          , IRequestTypeSniffer_conformance
                         ):
 
 
@@ -39,9 +39,9 @@
 
 if __name__ == "__main__":
     unittest.main()
-        
+
 def test_suite():
     return unittest.TestSuite((
         unittest.makeSuite( RequestTypeSniffer ),
         ))
-        
+

Modified: Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/tests/test_ZODBGroupManager.py
===================================================================
--- Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/tests/test_ZODBGroupManager.py	2012-01-03 10:54:48 UTC (rev 123908)
+++ Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/tests/test_ZODBGroupManager.py	2012-01-03 10:55:45 UTC (rev 123909)
@@ -105,8 +105,8 @@
         zgm.updateGroup( 'group', description='group_description_changed_again')
         group_info = zgm.getGroupInfo( 'group' )
         self.assertEqual( group_info['title'], 'group_title_changed_again' )
-        
 
+
     def test_addPrincipalToGroup( self ):
         zgm = self._makeOne()
 
@@ -149,7 +149,7 @@
         zgm.addGroup( 'group' )
 
         user = DummyUser( 'userid' )
-        
+
         zgm.addPrincipalToGroup( user.getId(), 'group' )
         zgm.removePrincipalFromGroup( user.getId(), 'group' )
         groups = zgm.getGroupsForPrincipal( user )
@@ -161,7 +161,7 @@
         zgm.addGroup( 'group' )
 
         user = DummyUser( 'userid' )
-        
+
         zgm.addPrincipalToGroup( user.getId(), 'group' )
         zgm.removeGroup( 'group' )
         group_ids = zgm.listGroupIds()
@@ -172,13 +172,13 @@
     def test_multiplePrincipalsPerGroup( self ):
         pas = FauxPAS()
         zgm = self._makeOne().__of__( pas )
-        
+
         zgm.addGroup( 'group1' )
         zgm.addGroup( 'group2' )
 
         user1 = DummyUser( 'userid1' )
         user2 = DummyUser( 'userid2' )
-        
+
         zgm.addPrincipalToGroup( user1.getId(), 'group1' )
         zgm.addPrincipalToGroup( user1.getId(), 'group2' )
         zgm.addPrincipalToGroup( user2.getId(), 'group2' )

Modified: Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/tests/test_ZODBRoleManager.py
===================================================================
--- Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/tests/test_ZODBRoleManager.py	2012-01-03 10:54:48 UTC (rev 123908)
+++ Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/tests/test_ZODBRoleManager.py	2012-01-03 10:55:45 UTC (rev 123909)
@@ -193,7 +193,7 @@
             self.assertEqual( info_list[ i ][ 'properties_url' ]
                             , 'partial/manage_roles?role_id=%s' % sorted[ i ])
             self.assertEqual( info_list[ i ][ 'members_url' ]
-                            , 'partial/manage_roles?role_id=%s&assign=1' 
+                            , 'partial/manage_roles?role_id=%s&assign=1'
                                 % sorted[ i ])
             self.assertEqual( info_list[ i ][ 'title' ]
                             , 'Role %s' % sorted[ i ] )
@@ -424,20 +424,20 @@
     def test_listAssignedPrincipals_duplicate_principals( self ):
         from Products.PluggableAuthService.plugins.ZODBRoleManager \
             import MultiplePrincipalError
-        
+
         class FauxDuplicatePAS( FauxSmartPAS ):
             """Returns duplicate user ids when searched."""
 
             def searchPrincipals( self, **kw ):
                 return [ {'id':'foo', 'title':'User 1'},
                          {'id':'foo', 'title':'User 2'} ]
-        
+
         root = FauxDuplicatePAS()
         zrm = self._makeOne(id='assign_new').__of__(root)
-        
+
         zrm.addRole('test')
         zrm.assignRoleToPrincipal('test', 'foo')
-        
+
         self.assertRaises(MultiplePrincipalError,
                           zrm.listAssignedPrincipals, 'test' )
 

Modified: Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/tests/test_exportimport.py
===================================================================
--- Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/tests/test_exportimport.py	2012-01-03 10:54:48 UTC (rev 123908)
+++ Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/tests/test_exportimport.py	2012-01-03 10:55:45 UTC (rev 123909)
@@ -36,7 +36,7 @@
     from Products.GenericSetup.tests.common import BaseRegistryTests
     from Products.GenericSetup.tests.common import DummyExportContext
     from Products.GenericSetup.tests.common import DummyImportContext
-    
+
     from Products.PluggableAuthService.tests.utils import _setUpDefaultTraversable
 
     class _TestBase(BaseRegistryTests,
@@ -76,7 +76,7 @@
 
         def test_export_empty(self):
             _setUpDefaultTraversable()
-            
+
             plugin = self._makePlugin('empty').__of__(self.root)
             adapter = self._makeOne(plugin)
 
@@ -115,7 +115,7 @@
 
         def test_export_with_users(self):
             _setUpDefaultTraversable()
-            
+
             plugin = self._makePlugin('with_users').__of__(self.root)
             plugin.title = 'Plugin Title'
 
@@ -220,7 +220,7 @@
 
         def test_export_empty(self):
             _setUpDefaultTraversable()
-            
+
             plugin = self._makePlugin('empty').__of__(self.root)
             adapter = self._makeOne(plugin)
 
@@ -254,7 +254,7 @@
 
         def test_export_with_groups(self):
             _setUpDefaultTraversable()
-            
+
             plugin = self._makePlugin('with_groups').__of__(self.root)
             plugin.title = 'Plugin Title'
 
@@ -365,7 +365,7 @@
 
         def test_export_empty(self):
             _setUpDefaultTraversable()
-            
+
             plugin = self._makePlugin('empty').__of__(self.root)
             adapter = self._makeOne(plugin)
 
@@ -399,7 +399,7 @@
 
         def test_export_with_roles(self):
             _setUpDefaultTraversable()
-            
+
             plugin = self._makePlugin('with_roles').__of__(self.root)
             plugin.title = 'Plugin Title'
 
@@ -514,7 +514,7 @@
 
         def test_export_default(self):
             _setUpDefaultTraversable()
-            
+
             from Products.PluggableAuthService.plugins.CookieAuthHelper \
                 import CookieAuthHelper as CAH
             plugin = self._makePlugin('default').__of__(self.root)
@@ -549,7 +549,7 @@
 
         def test_export_explicitly_set(self):
             _setUpDefaultTraversable()
-            
+
             TITLE = 'Plugin Title'
             COOKIE_NAME = 'COOKIE_NAME'
             LOGIN_PATH = 'LOGIN_PATH'
@@ -648,7 +648,7 @@
 
         def test_export_empty(self):
             _setUpDefaultTraversable()
-            
+
             plugin = self._makePlugin('empty', None).__of__(self.root)
             adapter = self._makeOne(plugin)
 
@@ -690,7 +690,7 @@
 
         def test_export_with_map(self):
             _setUpDefaultTraversable()
-            
+
             TITLE = 'With Map'
             USER_ID = 'some_user_id'
             DOMAIN = 'host.example.com'
@@ -852,7 +852,7 @@
 
         def test_export_no_title(self):
             _setUpDefaultTraversable()
-            
+
             plugin = self._makePlugin('no_title', None).__of__(self.root)
             adapter = self._makeOne(plugin)
 
@@ -867,7 +867,7 @@
 
         def test_export_with_title(self):
             _setUpDefaultTraversable()
-            
+
             TITLE = 'Plugin Title'
             plugin = self._makePlugin('with_title', None).__of__(self.root)
             plugin.title = TITLE
@@ -947,7 +947,7 @@
 
         def test_export_default(self):
             _setUpDefaultTraversable()
-            
+
             plugin = self._makePlugin('default').__of__(self.root)
             adapter = self._makeOne(plugin)
 
@@ -974,7 +974,7 @@
 
         def test_export_explicitly_set(self):
             _setUpDefaultTraversable()
-            
+
             TITLE = 'Plugin Title'
             DELEGATE_PATH = 'path/to/delegate'
             plugin = self._makePlugin('explicit').__of__(self.root)
@@ -1057,7 +1057,7 @@
 
         def test_export_empty(self):
             _setUpDefaultTraversable()
-            
+
             plugin = self._makePlugin('empty', None).__of__(self.root)
             adapter = self._makeOne(plugin)
 
@@ -1094,7 +1094,7 @@
 
         def test_export_with_groups(self):
             _setUpDefaultTraversable()
-            
+
             plugin = self._makePlugin('with_groups').__of__(self.root)
             plugin.title = 'Plugin Title'
 

Modified: Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/www/bpActivateInterfaces.zpt
===================================================================
--- Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/www/bpActivateInterfaces.zpt	2012-01-03 10:54:48 UTC (rev 123908)
+++ Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/www/bpActivateInterfaces.zpt	2012-01-03 10:55:45 UTC (rev 123909)
@@ -2,7 +2,7 @@
 <h2 tal:replace="structure here/manage_tabs"> TABS </h2>
 
 <p class="form-help">
-  Choose the functionality this 
+  Choose the functionality this
   <span tal:replace="here/meta_type"> Foo Plugin </span>
   will perform.
 </p>
@@ -23,9 +23,9 @@
         tal:condition="python:here.testImplements(interface)">
         <input type="checkbox" name="interfaces:list" value=""
            tal:attributes="value interface_name;
-               checked python:here.getId() in act_ids and 'checked' or ''" 
+               checked python:here.getId() in act_ids and 'checked' or ''"
         />&nbsp;
-        <a href="" 
+        <a href=""
            tal:attributes="href string:${pau}?plugin_type=${info/id}">
           <span tal:replace="title/title"/></a>
         <i>(<span tal:replace="method"/>)</i>
@@ -36,8 +36,8 @@
     </td>
     <td align="left" valign="top">
     <div class="form-element">
-    <input class="form-element" type="submit" name="submit" 
-     value=" Update " /> 
+    <input class="form-element" type="submit" name="submit"
+     value=" Update " />
     </div>
     </td>
   </tr>

Modified: Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/www/caAdd.zpt
===================================================================
--- Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/www/caAdd.zpt	2012-01-03 10:54:48 UTC (rev 123908)
+++ Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/www/caAdd.zpt	2012-01-03 10:55:45 UTC (rev 123909)
@@ -5,10 +5,10 @@
 
 <p class="form-help">
 Cookie Auth Helpers manage the details of Cookie Authentication for
-Pluggable Auth Service functionality. 
+Pluggable Auth Service functionality.
 </p>
 
-<form action="addCookieAuthHelper" method="post" 
+<form action="addCookieAuthHelper" method="post"
  enctype="multipart/form-data">
 <table cellspacing="0" cellpadding="2" border="0">
   <tr>
@@ -46,8 +46,8 @@
     </td>
     <td align="left" valign="top">
     <div class="form-element">
-    <input class="form-element" type="submit" name="submit" 
-     value=" Add " /> 
+    <input class="form-element" type="submit" name="submit"
+     value=" Add " />
     </div>
     </td>
   </tr>

Modified: Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/www/cpcAdd.zpt
===================================================================
--- Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/www/cpcAdd.zpt	2012-01-03 10:54:48 UTC (rev 123908)
+++ Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/www/cpcAdd.zpt	2012-01-03 10:55:45 UTC (rev 123909)
@@ -10,7 +10,7 @@
 challenge based on the incoming request.
 </p>
 
-<form action="addChallengeProtocolChooserPlugin" method="post" 
+<form action="addChallengeProtocolChooserPlugin" method="post"
  enctype="multipart/form-data">
 <table cellspacing="0" cellpadding="2" border="0">
   <tr>
@@ -38,8 +38,8 @@
     </td>
     <td align="left" valign="top">
     <div class="form-element">
-    <input class="form-element" type="submit" name="submit" 
-     value=" Add " /> 
+    <input class="form-element" type="submit" name="submit"
+     value=" Add " />
     </div>
     </td>
   </tr>

Modified: Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/www/cpcEdit.zpt
===================================================================
--- Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/www/cpcEdit.zpt	2012-01-03 10:54:48 UTC (rev 123908)
+++ Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/www/cpcEdit.zpt	2012-01-03 10:55:45 UTC (rev 123909)
@@ -18,7 +18,7 @@
       </tr>
 
       <tr class="row-hilite"
-	  tal:repeat="entry info" 
+	  tal:repeat="entry info"
 	  tal:attributes="class python:repeat['entry'].odd() and 'row-normal' or default"
 	  >
 	<td class="form-label"

Modified: Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/www/daAdd.zpt
===================================================================
--- Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/www/daAdd.zpt	2012-01-03 10:54:48 UTC (rev 123908)
+++ Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/www/daAdd.zpt	2012-01-03 10:55:45 UTC (rev 123909)
@@ -5,10 +5,10 @@
 
 <p class="form-help">
 Domain Auth Helpers manage the details of Domain-based Authentication for
-Pluggable Auth Service functionality. 
+Pluggable Auth Service functionality.
 </p>
 
-<form action="manage_addDomainAuthHelper" method="post" 
+<form action="manage_addDomainAuthHelper" method="post"
  enctype="multipart/form-data">
 <table cellspacing="0" cellpadding="2" border="0">
   <tr>
@@ -36,8 +36,8 @@
     </td>
     <td align="left" valign="top">
     <div class="form-element">
-    <input class="form-element" type="submit" name="submit" 
-     value=" Add " /> 
+    <input class="form-element" type="submit" name="submit"
+     value=" Add " />
     </div>
     </td>
   </tr>

Modified: Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/www/daGeneric.zpt
===================================================================
--- Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/www/daGeneric.zpt	2012-01-03 10:54:48 UTC (rev 123908)
+++ Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/www/daGeneric.zpt	2012-01-03 10:55:45 UTC (rev 123909)
@@ -48,13 +48,13 @@
             <input type="checkbox" name="match_ids:list" value=""
                    tal:attributes="value match_info/match_id" />
           </td>
-          <td class="form-text" 
-              tal:content="match_info/match_type"> 
-            type 
+          <td class="form-text"
+              tal:content="match_info/match_type">
+            type
           </td>
-          <td class="form-text" 
-              tal:content="match_info/match_string"> 
-            string 
+          <td class="form-text"
+              tal:content="match_info/match_string">
+            string
           </td>
           <td class="form-text"
               tal:content="match_info/username">

Modified: Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/www/daMatches.zpt
===================================================================
--- Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/www/daMatches.zpt	2012-01-03 10:54:48 UTC (rev 123908)
+++ Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/www/daMatches.zpt	2012-01-03 10:55:45 UTC (rev 123909)
@@ -102,7 +102,7 @@
         <tr class="list-header">
           <td class="list-header">
             <span class="form-label">
-              Add new domain mapping for user 
+              Add new domain mapping for user
               <span tal:replace="user_id"> foo </span>.
             </span>
           </td>

Modified: Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/www/dgpAdd.zpt
===================================================================
--- Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/www/dgpAdd.zpt	2012-01-03 10:54:48 UTC (rev 123908)
+++ Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/www/dgpAdd.zpt	2012-01-03 10:55:45 UTC (rev 123909)
@@ -10,7 +10,7 @@
 TALES expressions.
 </p>
 
-<form action="addDynamicGroupsPlugin" method="post" 
+<form action="addDynamicGroupsPlugin" method="post"
  enctype="multipart/form-data">
 <table cellspacing="0" cellpadding="2" border="0">
   <tr>
@@ -38,8 +38,8 @@
     </td>
     <td align="left" valign="top">
     <div class="form-element">
-    <input class="form-element" type="submit" name="submit" 
-     value=" Add " /> 
+    <input class="form-element" type="submit" name="submit"
+     value=" Add " />
     </div>
     </td>
   </tr>

Modified: Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/www/dgpGroups.zpt
===================================================================
--- Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/www/dgpGroups.zpt	2012-01-03 10:54:48 UTC (rev 123908)
+++ Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/www/dgpGroups.zpt	2012-01-03 10:55:45 UTC (rev 123909)
@@ -28,7 +28,7 @@
  <form action="." method="POST">
 
  <tr class="row-hilite"
-     tal:repeat="info here/listGroupInfo" 
+     tal:repeat="info here/listGroupInfo"
      tal:attributes="class
             python:repeat['info'].odd() and 'row-normal' or default"
      >

Modified: Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/www/dmpAdd.zpt
===================================================================
--- Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/www/dmpAdd.zpt	2012-01-03 10:54:48 UTC (rev 123908)
+++ Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/www/dmpAdd.zpt	2012-01-03 10:55:45 UTC (rev 123909)
@@ -45,8 +45,8 @@
     </td>
     <td align="left" valign="top">
     <div class="form-element">
-    <input class="form-element" type="submit" name="submit" 
-     value=" Add " /> 
+    <input class="form-element" type="submit" name="submit"
+     value=" Add " />
     </div>
     </td>
   </tr>

Modified: Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/www/hbAdd.zpt
===================================================================
--- Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/www/hbAdd.zpt	2012-01-03 10:54:48 UTC (rev 123908)
+++ Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/www/hbAdd.zpt	2012-01-03 10:55:45 UTC (rev 123909)
@@ -5,10 +5,10 @@
 
 <p class="form-help">
 HTTP Basic Auth Helpers manage the details of HTTP Basic Authentication for
-Pluggable Auth Service functionality. 
+Pluggable Auth Service functionality.
 </p>
 
-<form action="addHTTPBasicAuthHelper" method="post" 
+<form action="addHTTPBasicAuthHelper" method="post"
  enctype="multipart/form-data">
 <table cellspacing="0" cellpadding="2" border="0">
   <tr>
@@ -36,8 +36,8 @@
     </td>
     <td align="left" valign="top">
     <div class="form-element">
-    <input class="form-element" type="submit" name="submit" 
-     value=" Add " /> 
+    <input class="form-element" type="submit" name="submit"
+     value=" Add " />
     </div>
     </td>
   </tr>

Modified: Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/www/iaAdd.zpt
===================================================================
--- Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/www/iaAdd.zpt	2012-01-03 10:54:48 UTC (rev 123908)
+++ Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/www/iaAdd.zpt	2012-01-03 10:55:45 UTC (rev 123909)
@@ -5,10 +5,10 @@
 
 <p class="form-help">
 Inline Auth Helpers manage the details of Inline Authentication for
-Pluggable Auth Service functionality. 
+Pluggable Auth Service functionality.
 </p>
 
-<form action="addInlineAuthHelper" method="post" 
+<form action="addInlineAuthHelper" method="post"
  enctype="multipart/form-data">
 <table cellspacing="0" cellpadding="2" border="0">
   <tr>
@@ -36,8 +36,8 @@
     </td>
     <td align="left" valign="top">
     <div class="form-element">
-    <input class="form-element" type="submit" name="submit" 
-     value=" Add " /> 
+    <input class="form-element" type="submit" name="submit"
+     value=" Add " />
     </div>
     </td>
   </tr>

Modified: Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/www/lrpAdd.zpt
===================================================================
--- Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/www/lrpAdd.zpt	2012-01-03 10:54:48 UTC (rev 123908)
+++ Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/www/lrpAdd.zpt	2012-01-03 10:55:45 UTC (rev 123909)
@@ -5,12 +5,12 @@
     tal:replace="structure here/manage_form_title">Form Title</h2>
 
 
-<p class="form-help"> 
+<p class="form-help">
 Local Role Plugins assign roles to principals based on the
 __ac_local_roles__ mappings found in the Root Folder.
 </p>
 
-<form action="addLocalRolePlugin" method="post" 
+<form action="addLocalRolePlugin" method="post"
  enctype="multipart/form-data">
 <table cellspacing="0" cellpadding="2" border="0">
   <tr>
@@ -38,8 +38,8 @@
     </td>
     <td align="left" valign="top">
     <div class="form-element">
-    <input class="form-element" type="submit" name="submit" 
-     value=" Add " /> 
+    <input class="form-element" type="submit" name="submit"
+     value=" Add " />
     </div>
     </td>
   </tr>

Modified: Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/www/rgpAdd.zpt
===================================================================
--- Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/www/rgpAdd.zpt	2012-01-03 10:54:48 UTC (rev 123908)
+++ Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/www/rgpAdd.zpt	2012-01-03 10:55:45 UTC (rev 123909)
@@ -11,7 +11,7 @@
 IGroupsPlugins to play in Authentication.
 </p>
 
-<form action="addRecursiveGroupsPlugin" method="post" 
+<form action="addRecursiveGroupsPlugin" method="post"
  enctype="multipart/form-data">
 <table cellspacing="0" cellpadding="2" border="0">
   <tr>
@@ -39,8 +39,8 @@
     </td>
     <td align="left" valign="top">
     <div class="form-element">
-    <input class="form-element" type="submit" name="submit" 
-     value=" Add " /> 
+    <input class="form-element" type="submit" name="submit"
+     value=" Add " />
     </div>
     </td>
   </tr>

Modified: Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/www/rtsAdd.zpt
===================================================================
--- Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/www/rtsAdd.zpt	2012-01-03 10:54:48 UTC (rev 123908)
+++ Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/www/rtsAdd.zpt	2012-01-03 10:55:45 UTC (rev 123909)
@@ -10,7 +10,7 @@
 later use by other plugins.
 </p>
 
-<form action="addRequestTypeSnifferPlugin" method="post" 
+<form action="addRequestTypeSnifferPlugin" method="post"
  enctype="multipart/form-data">
 <table cellspacing="0" cellpadding="2" border="0">
   <tr>
@@ -38,8 +38,8 @@
     </td>
     <td align="left" valign="top">
     <div class="form-element">
-    <input class="form-element" type="submit" name="submit" 
-     value=" Add " /> 
+    <input class="form-element" type="submit" name="submit"
+     value=" Add " />
     </div>
     </td>
   </tr>

Modified: Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/www/saAdd.zpt
===================================================================
--- Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/www/saAdd.zpt	2012-01-03 10:54:48 UTC (rev 123908)
+++ Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/www/saAdd.zpt	2012-01-03 10:55:45 UTC (rev 123909)
@@ -5,10 +5,10 @@
 
 <p class="form-help">
 Session Auth Helpers manage the details of Session-based Authentication for
-Pluggable Auth Service functionality. 
+Pluggable Auth Service functionality.
 </p>
 
-<form action="manage_addSessionAuthHelper" method="post" 
+<form action="manage_addSessionAuthHelper" method="post"
  enctype="multipart/form-data">
 <table cellspacing="0" cellpadding="2" border="0">
   <tr>
@@ -36,8 +36,8 @@
     </td>
     <td align="left" valign="top">
     <div class="form-element">
-    <input class="form-element" type="submit" name="submit" 
-     value=" Add " /> 
+    <input class="form-element" type="submit" name="submit"
+     value=" Add " />
     </div>
     </td>
   </tr>

Modified: Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/www/spAdd.zpt
===================================================================
--- Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/www/spAdd.zpt	2012-01-03 10:54:48 UTC (rev 123908)
+++ Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/www/spAdd.zpt	2012-01-03 10:55:45 UTC (rev 123909)
@@ -5,7 +5,7 @@
 
 <p class="form-help">
 Scriptable Plugins are containers for disparate scripting solutions for
-Pluggable Auth Service functionality. 
+Pluggable Auth Service functionality.
 </p>
 
 <form action="addScriptablePlugin" method="post">
@@ -35,8 +35,8 @@
     </td>
     <td align="left" valign="top">
     <div class="form-element">
-    <input class="form-element" type="submit" name="submit" 
-     value=" Add " /> 
+    <input class="form-element" type="submit" name="submit"
+     value=" Add " />
     </div>
     </td>
   </tr>

Modified: Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/www/spEditInterfaces.zpt
===================================================================
--- Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/www/spEditInterfaces.zpt	2012-01-03 10:54:48 UTC (rev 123908)
+++ Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/www/spEditInterfaces.zpt	2012-01-03 10:55:45 UTC (rev 123909)
@@ -19,7 +19,7 @@
         <input type="checkbox" name="interfaces:list" value=""
            tal:attributes="value interface_name;
                checked python:implements and 'checked' or '';
-               disabled python:not here.hasMethod(method) and 'checked' or ''" 
+               disabled python:not here.hasMethod(method) and 'checked' or ''"
         />&nbsp;
         <span tal:replace="title/title"/>
         <i>(<span tal:replace="method"/>)</i>
@@ -30,8 +30,8 @@
     </td>
     <td align="left" valign="top">
     <div class="form-element">
-    <input class="form-element" type="submit" name="submit" 
-     value=" Update " /> 
+    <input class="form-element" type="submit" name="submit"
+     value=" Update " />
     </div>
     </td>
   </tr>

Modified: Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/www/sppAdd.zpt
===================================================================
--- Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/www/sppAdd.zpt	2012-01-03 10:54:48 UTC (rev 123908)
+++ Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/www/sppAdd.zpt	2012-01-03 10:55:45 UTC (rev 123909)
@@ -5,7 +5,7 @@
 
 <p class="form-help">
   Search Principals Plugins allow delegation of searching to another
-  PluggableAuthService 
+  PluggableAuthService
 </p>
 
 <form action="addSearchPrincipalsPlugin">
@@ -45,8 +45,8 @@
     </td>
     <td align="left" valign="top">
     <div class="form-element">
-    <input class="form-element" type="submit" name="submit" 
-     value=" Add " /> 
+    <input class="form-element" type="submit" name="submit"
+     value=" Add " />
     </div>
     </td>
   </tr>

Modified: Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/www/zgAdd.zpt
===================================================================
--- Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/www/zgAdd.zpt	2012-01-03 10:54:48 UTC (rev 123908)
+++ Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/www/zgAdd.zpt	2012-01-03 10:55:45 UTC (rev 123909)
@@ -4,7 +4,7 @@
     tal:replace="structure here/manage_form_title">Form Title</h2>
 
 <p class="form-help">
-ZODB Group Managers are containers for groups. 
+ZODB Group Managers are containers for groups.
 </p>
 
 <form action="addZODBGroupManager" method="post">
@@ -34,8 +34,8 @@
     </td>
     <td align="left" valign="top">
     <div class="form-element">
-    <input class="form-element" type="submit" name="submit" 
-     value=" Add " /> 
+    <input class="form-element" type="submit" name="submit"
+     value=" Add " />
     </div>
     </td>
   </tr>

Modified: Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/www/zgGroups.zpt
===================================================================
--- Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/www/zgGroups.zpt	2012-01-03 10:54:48 UTC (rev 123908)
+++ Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/www/zgGroups.zpt	2012-01-03 10:55:45 UTC (rev 123909)
@@ -31,7 +31,7 @@
  <form action="." method="POST">
 
  <tr class="row-hilite"
-     tal:repeat="info here/listGroupInfo" 
+     tal:repeat="info here/listGroupInfo"
      tal:attributes="class python:repeat['info'].odd() and 'row-normal' or default"
      >
   <td>
@@ -53,7 +53,7 @@
        tal:attributes="href string:?group_id=${info/id}&amp;assign=1"
     >?</a>
     <span
-       tal:content="python:','.join( 
+       tal:content="python:','.join(
            [x[1] for x in here.listAssignedPrincipals(info['id'])] )"
     >GROUP ASSIGNMENTS</span>
   </td>

Modified: Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/www/zrAdd.zpt
===================================================================
--- Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/www/zrAdd.zpt	2012-01-03 10:54:48 UTC (rev 123908)
+++ Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/www/zrAdd.zpt	2012-01-03 10:55:45 UTC (rev 123909)
@@ -34,8 +34,8 @@
     </td>
     <td align="left" valign="top">
     <div class="form-element">
-    <input class="form-element" type="submit" name="submit" 
-     value=" Add " /> 
+    <input class="form-element" type="submit" name="submit"
+     value=" Add " />
     </div>
     </td>
   </tr>

Modified: Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/www/zrRoles.zpt
===================================================================
--- Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/www/zrRoles.zpt	2012-01-03 10:54:48 UTC (rev 123908)
+++ Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/www/zrRoles.zpt	2012-01-03 10:55:45 UTC (rev 123909)
@@ -34,7 +34,7 @@
  <form action="." method="POST">
 
  <tr class="row-hilite"
-     tal:repeat="info here/listRoleInfo" 
+     tal:repeat="info here/listRoleInfo"
      tal:attributes="class python:repeat['info'].odd() and 'row-normal' or default"
      >
   <td>
@@ -56,7 +56,7 @@
        tal:attributes="href string:?role_id=${info/id}&amp;assign=1"
     >?</a>
     <span
-       tal:content="python:','.join( 
+       tal:content="python:','.join(
             [x[1] for x in here.listAssignedPrincipals(info['id'])] )"
     >ROLE ASSIGNMENTS</span>
   </td>

Modified: Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/www/zuAdd.zpt
===================================================================
--- Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/www/zuAdd.zpt	2012-01-03 10:54:48 UTC (rev 123908)
+++ Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/www/zuAdd.zpt	2012-01-03 10:55:45 UTC (rev 123909)
@@ -5,7 +5,7 @@
 
 <p class="form-help">
 ZODB User Managers are containers for disparate scripting solutions for
-Pluggable Auth Service functionality. 
+Pluggable Auth Service functionality.
 </p>
 
 <form action="addZODBUserManager" method="post">
@@ -35,8 +35,8 @@
     </td>
     <td align="left" valign="top">
     <div class="form-element">
-    <input class="form-element" type="submit" name="submit" 
-     value=" Add " /> 
+    <input class="form-element" type="submit" name="submit"
+     value=" Add " />
     </div>
     </td>
   </tr>

Modified: Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/www/zuUsers.zpt
===================================================================
--- Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/www/zuUsers.zpt	2012-01-03 10:54:48 UTC (rev 123908)
+++ Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/www/zuUsers.zpt	2012-01-03 10:55:45 UTC (rev 123909)
@@ -29,7 +29,7 @@
  <form action="." method="POST">
 
  <tr class="row-hilite"
-     tal:repeat="info here/listUserInfo" 
+     tal:repeat="info here/listUserInfo"
      tal:attributes="class python:repeat['info'].odd() and 'row-normal' or default"
      >
   <td>

Modified: Products.PluggableAuthService/trunk/Products/PluggableAuthService/tests/test_PluggableAuthService.py
===================================================================
--- Products.PluggableAuthService/trunk/Products/PluggableAuthService/tests/test_PluggableAuthService.py	2012-01-03 10:54:48 UTC (rev 123908)
+++ Products.PluggableAuthService/trunk/Products/PluggableAuthService/tests/test_PluggableAuthService.py	2012-01-03 10:55:45 UTC (rev 123909)
@@ -1167,7 +1167,7 @@
         # Our enumerator plugin normally returns something, even if
         # you ask for a nonexistent user.
         self.failUnless(zcuf._verifyUser(plugins, login='qux') in users)
-        
+
         # But with no criteria, we should always get None.
         self.assertEqual(zcuf._verifyUser(plugins, login=None, user_id=None),
                          None)

Modified: Products.PluggableAuthService/trunk/Products/PluggableAuthService/tests/test_PropertiedUser.py
===================================================================
--- Products.PluggableAuthService/trunk/Products/PluggableAuthService/tests/test_PropertiedUser.py	2012-01-03 10:54:48 UTC (rev 123908)
+++ Products.PluggableAuthService/trunk/Products/PluggableAuthService/tests/test_PropertiedUser.py	2012-01-03 10:55:45 UTC (rev 123909)
@@ -285,4 +285,4 @@
     return unittest.TestSuite((
         unittest.makeSuite( PropertiedUserTests ),
         ))
-    
+

Modified: Products.PluggableAuthService/trunk/Products/PluggableAuthService/www/pasAddForm.zpt
===================================================================
--- Products.PluggableAuthService/trunk/Products/PluggableAuthService/www/pasAddForm.zpt	2012-01-03 10:54:48 UTC (rev 123908)
+++ Products.PluggableAuthService/trunk/Products/PluggableAuthService/www/pasAddForm.zpt	2012-01-03 10:55:45 UTC (rev 123909)
@@ -35,7 +35,7 @@
    &nbsp;
   </td>
   <td>
-   <input class="form-element" type="submit" name="submit" value="Add" /> 
+   <input class="form-element" type="submit" name="submit" value="Add" />
   </td>
  </tr>
 </table>

Modified: Products.PluggableAuthService/trunk/Products/PluggableAuthService/www/pasSearch.zpt
===================================================================
--- Products.PluggableAuthService/trunk/Products/PluggableAuthService/www/pasSearch.zpt	2012-01-03 10:54:48 UTC (rev 123908)
+++ Products.PluggableAuthService/trunk/Products/PluggableAuthService/www/pasSearch.zpt	2012-01-03 10:55:45 UTC (rev 123909)
@@ -40,7 +40,7 @@
           <option value="id"> User ID </option>
         </select>
       </td>
-      <td class="form-element"> 
+      <td class="form-element">
         <input type="text" width="30" name="s_term" />
       </td>
       <td class="form-element">

Modified: Products.PluggableAuthService/trunk/Products/PluggableAuthService/www/two_lists.zpt
===================================================================
--- Products.PluggableAuthService/trunk/Products/PluggableAuthService/www/two_lists.zpt	2012-01-03 10:54:48 UTC (rev 123908)
+++ Products.PluggableAuthService/trunk/Products/PluggableAuthService/www/two_lists.zpt	2012-01-03 10:55:45 UTC (rev 123909)
@@ -46,17 +46,17 @@
               multiple="multiple"
               tal:attributes="name string:${left_name}:list" >
         <option tal:repeat="item left_list"
-                tal:attributes="value python:item[0]" 
+                tal:attributes="value python:item[0]"
                 tal:content="python: item[1]"/>
       </select>
     </td>
     <td align="center" valign="middle">
-      <input type="image" src="arrow_right_gif" 
+      <input type="image" src="arrow_right_gif"
              width="29" height="30" border="0"
              name="left_to_right:method"
              tal:attributes="name string:${left_to_right}:method"/>
       <br/><br/>
-      <input type="image" src="arrow_left_gif" 
+      <input type="image" src="arrow_left_gif"
              width="29" height="30" border="0"
              name="right_to_left:method"
              tal:attributes="name string:${right_to_left}:method"/>
@@ -69,19 +69,19 @@
               multiple="multiple"
               tal:attributes="name string:${right_name}:list" >
         <option tal:repeat="item right_list"
-                tal:attributes="value python:item[0]" 
+                tal:attributes="value python:item[0]"
                 tal:content="python: item[1]"/>
       </select>
     </td>
     <td align="center" valign="middle"
         tal:condition="right_is_ordered | nothing"
     >
-      <input type="image" src="arrow_up_gif" 
+      <input type="image" src="arrow_up_gif"
              width="29" height="30" border="0"
              name="move_up:method"
              tal:attributes="name string:${move_up}:method"/>
       <br/><br/>
-      <input type="image" src="arrow_down_gif" 
+      <input type="image" src="arrow_down_gif"
              width="29" height="30" border="0"
              name="move_down:method"
              tal:attributes="name string:${move_down}:method"/>

Modified: Products.PluggableAuthService/trunk/setup.py
===================================================================
--- Products.PluggableAuthService/trunk/setup.py	2012-01-03 10:54:48 UTC (rev 123908)
+++ Products.PluggableAuthService/trunk/setup.py	2012-01-03 10:55:45 UTC (rev 123909)
@@ -13,7 +13,7 @@
 
 _boundary = '\n\n'
 README = ( open('README.txt').read()
-         + _boundary 
+         + _boundary
          + open('CHANGES.txt').read()
          )
 



More information about the checkins mailing list