[Checkins] SVN: Products.PluggableAuthService/trunk/ Nuke trailing white space.
Maurits van Rees
m.van.rees at zestsoftware.nl
Tue Jan 3 10:55:46 UTC 2012
Log message for revision 123909:
Nuke trailing white space.
Changed:
U Products.PluggableAuthService/trunk/Products/PluggableAuthService/Extensions/upgrade.py
U Products.PluggableAuthService/trunk/Products/PluggableAuthService/PluggableAuthService.py
U Products.PluggableAuthService/trunk/Products/PluggableAuthService/PropertiedUser.py
U Products.PluggableAuthService/trunk/Products/PluggableAuthService/compatibility.zcml
U Products.PluggableAuthService/trunk/Products/PluggableAuthService/events.zcml
U Products.PluggableAuthService/trunk/Products/PluggableAuthService/exportimport.py
U Products.PluggableAuthService/trunk/Products/PluggableAuthService/interfaces/authservice.py
U Products.PluggableAuthService/trunk/Products/PluggableAuthService/interfaces/plugins.py
U Products.PluggableAuthService/trunk/Products/PluggableAuthService/interfaces/propertysheets.py
U Products.PluggableAuthService/trunk/Products/PluggableAuthService/interfaces/request.py
U Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/DelegatingMultiPlugin.py
U Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/DomainAuthHelper.py
U Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/DynamicGroupsPlugin.py
U Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/RecursiveGroupsPlugin.py
U Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/SearchPrincipalsPlugin.py
U Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/ZODBGroupManager.py
U Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/ZODBRoleManager.py
U Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/ZODBUserManager.py
U Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/tests/test_ChallengeProtocolChooser.py
U Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/tests/test_CookieAuthHelper.py
U Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/tests/test_LocalRolePlugin.py
U Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/tests/test_RecursiveGroupsPlugin.py
U Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/tests/test_RequestTypeSniffer.py
U Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/tests/test_ZODBGroupManager.py
U Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/tests/test_ZODBRoleManager.py
U Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/tests/test_exportimport.py
U Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/www/bpActivateInterfaces.zpt
U Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/www/caAdd.zpt
U Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/www/cpcAdd.zpt
U Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/www/cpcEdit.zpt
U Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/www/daAdd.zpt
U Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/www/daGeneric.zpt
U Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/www/daMatches.zpt
U Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/www/dgpAdd.zpt
U Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/www/dgpGroups.zpt
U Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/www/dmpAdd.zpt
U Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/www/hbAdd.zpt
U Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/www/iaAdd.zpt
U Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/www/lrpAdd.zpt
U Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/www/rgpAdd.zpt
U Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/www/rtsAdd.zpt
U Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/www/saAdd.zpt
U Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/www/spAdd.zpt
U Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/www/spEditInterfaces.zpt
U Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/www/sppAdd.zpt
U Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/www/zgAdd.zpt
U Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/www/zgGroups.zpt
U Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/www/zrAdd.zpt
U Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/www/zrRoles.zpt
U Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/www/zuAdd.zpt
U Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/www/zuUsers.zpt
U Products.PluggableAuthService/trunk/Products/PluggableAuthService/tests/test_PluggableAuthService.py
U Products.PluggableAuthService/trunk/Products/PluggableAuthService/tests/test_PropertiedUser.py
U Products.PluggableAuthService/trunk/Products/PluggableAuthService/www/pasAddForm.zpt
U Products.PluggableAuthService/trunk/Products/PluggableAuthService/www/pasSearch.zpt
U Products.PluggableAuthService/trunk/Products/PluggableAuthService/www/two_lists.zpt
U Products.PluggableAuthService/trunk/setup.py
-=-
Modified: Products.PluggableAuthService/trunk/Products/PluggableAuthService/Extensions/upgrade.py
===================================================================
--- Products.PluggableAuthService/trunk/Products/PluggableAuthService/Extensions/upgrade.py 2012-01-03 10:54:48 UTC (rev 123908)
+++ Products.PluggableAuthService/trunk/Products/PluggableAuthService/Extensions/upgrade.py 2012-01-03 10:55:45 UTC (rev 123909)
@@ -2,8 +2,8 @@
#
# Copyright (c) 2004 Zope Foundation and Contributors.
#
-# This software is subject to the provisions of the Zope Visible Source
-# License, Version 1.0 (ZVSL). A copy of the ZVSL should accompany this
+# This software is subject to the provisions of the Zope Visible Source
+# License, Version 1.0 (ZVSL). A copy of the ZVSL should accompany this
# distribution.
#
# THIS SOFTWARE IS PROVIDED "AS IS" AND ANY AND ALL EXPRESS OR IMPLIED
Modified: Products.PluggableAuthService/trunk/Products/PluggableAuthService/PluggableAuthService.py
===================================================================
--- Products.PluggableAuthService/trunk/Products/PluggableAuthService/PluggableAuthService.py 2012-01-03 10:54:48 UTC (rev 123908)
+++ Products.PluggableAuthService/trunk/Products/PluggableAuthService/PluggableAuthService.py 2012-01-03 10:55:45 UTC (rev 123909)
@@ -605,9 +605,9 @@
except _SWALLOWABLE_PLUGIN_EXCEPTIONS:
reraise(auth)
- msg = 'AuthenticationPlugin %s error' % (
+ msg = 'AuthenticationPlugin %s error' % (
authenticator_id, )
- logger.debug(msg, exc_info=True)
+ logger.debug(msg, exc_info=True)
continue
if user_id is not None:
Modified: Products.PluggableAuthService/trunk/Products/PluggableAuthService/PropertiedUser.py
===================================================================
--- Products.PluggableAuthService/trunk/Products/PluggableAuthService/PropertiedUser.py 2012-01-03 10:54:48 UTC (rev 123908)
+++ Products.PluggableAuthService/trunk/Products/PluggableAuthService/PropertiedUser.py 2012-01-03 10:55:45 UTC (rev 123909)
@@ -102,7 +102,7 @@
principal_ids = list( group_ids )
principal_ids.insert( 0, user_id )
- local ={}
+ local ={}
object = aq_inner( object )
while 1:
Modified: Products.PluggableAuthService/trunk/Products/PluggableAuthService/compatibility.zcml
===================================================================
--- Products.PluggableAuthService/trunk/Products/PluggableAuthService/compatibility.zcml 2012-01-03 10:54:48 UTC (rev 123908)
+++ Products.PluggableAuthService/trunk/Products/PluggableAuthService/compatibility.zcml 2012-01-03 10:55:45 UTC (rev 123909)
@@ -3,7 +3,7 @@
xmlns:five="http://namespaces.zope.org/five">
<five:deprecatedManageAddDelete
- class="Products.PluggableAuthService.PluggableAuthService.PluggableAuthService"
+ class="Products.PluggableAuthService.PluggableAuthService.PluggableAuthService"
/>
<five:deprecatedManageAddDelete
Modified: Products.PluggableAuthService/trunk/Products/PluggableAuthService/events.zcml
===================================================================
--- Products.PluggableAuthService/trunk/Products/PluggableAuthService/events.zcml 2012-01-03 10:54:48 UTC (rev 123908)
+++ Products.PluggableAuthService/trunk/Products/PluggableAuthService/events.zcml 2012-01-03 10:55:45 UTC (rev 123909)
@@ -1,7 +1,7 @@
<configure
xmlns="http://namespaces.zope.org/zope"
>
-
+
<subscriber handler=".events.PASEventNotify" />
<subscriber
Modified: Products.PluggableAuthService/trunk/Products/PluggableAuthService/exportimport.py
===================================================================
--- Products.PluggableAuthService/trunk/Products/PluggableAuthService/exportimport.py 2012-01-03 10:54:48 UTC (rev 123908)
+++ Products.PluggableAuthService/trunk/Products/PluggableAuthService/exportimport.py 2012-01-03 10:55:45 UTC (rev 123909)
@@ -45,7 +45,7 @@
registry._setId(object_id)
self.context._setObject(object_id, registry)
return registry
-
+
class PAS_CF_Namer(object):
implements(IContentFactoryName)
Modified: Products.PluggableAuthService/trunk/Products/PluggableAuthService/interfaces/authservice.py
===================================================================
--- Products.PluggableAuthService/trunk/Products/PluggableAuthService/interfaces/authservice.py 2012-01-03 10:54:48 UTC (rev 123908)
+++ Products.PluggableAuthService/trunk/Products/PluggableAuthService/interfaces/authservice.py 2012-01-03 10:55:45 UTC (rev 123909)
@@ -72,7 +72,7 @@
"""
def addPropertysheet( id, data ):
-
+
""" Add a new property sheet to the user.
The property sheet has to be a map or an IPropertySheet instance.
Modified: Products.PluggableAuthService/trunk/Products/PluggableAuthService/interfaces/plugins.py
===================================================================
--- Products.PluggableAuthService/trunk/Products/PluggableAuthService/interfaces/plugins.py 2012-01-03 10:54:48 UTC (rev 123908)
+++ Products.PluggableAuthService/trunk/Products/PluggableAuthService/interfaces/plugins.py 2012-01-03 10:55:45 UTC (rev 123909)
@@ -41,8 +41,8 @@
def extractCredentials( request ):
- """ request -> { 'login' : login
- , 'password' : password
+ """ request -> { 'login' : login
+ , 'password' : password
, k1 : v1
, ...
, kN : vN
@@ -62,8 +62,8 @@
def extractCredentials( request ):
- """ request -> { 'login' : login
- , 'password' : password
+ """ request -> { 'login' : login
+ , 'password' : password
, 'remote_host' : remote_host
, 'remote_addr' : remote_addr
, k1 : v1
@@ -90,7 +90,7 @@
o 'credentials' will be a mapping, as returned by IExtractionPlugin.
- o Return a tuple consisting of user ID (which may be different
+ o Return a tuple consisting of user ID (which may be different
from the login name) and login
o If the credentials cannot be authenticated, return None.
@@ -237,7 +237,7 @@
""" principal -> ( group_1, ... group_N )
- o Return a sequence of group names to which the principal
+ o Return a sequence of group names to which the principal
(either a user or another group) belongs.
o May assign groups based on values in the REQUEST object, if present
@@ -325,7 +325,7 @@
plugin should return mappings for all users satisfying the criteria.
o Minimal keys in the returned mappings:
-
+
'id' -- (required) the user ID, which may be different than
the login name
@@ -366,8 +366,8 @@
return at most one mapping per supplied ID ('id' and 'login'
may be sequences).
- o If 'exact_match' is False, then 'id' may be treated by
- the plugin as "contains" searches (more complicated searches
+ o If 'exact_match' is False, then 'id' may be treated by
+ the plugin as "contains" searches (more complicated searches
may be supported by some plugins using other keyword arguments).
o If 'sort_by' is passed, the results will be sorted accordingly.
@@ -375,11 +375,11 @@
o If 'max_results' is specified, it must be a positive integer,
limiting the number of returned mappings. If unspecified, the
- plugin should return mappings for all groups satisfying the
+ plugin should return mappings for all groups satisfying the
criteria.
o Minimal keys in the returned mappings:
-
+
'id' -- (required) the group ID
'pluginid' -- (required) the plugin ID (as returned by getId())
@@ -417,8 +417,8 @@
return at most one mapping per supplied ID ('id' and 'login'
may be sequences).
- o If 'exact_match' is False, then 'id' may be treated by
- the plugin as "contains" searches (more complicated searches
+ o If 'exact_match' is False, then 'id' may be treated by
+ the plugin as "contains" searches (more complicated searches
may be supported by some plugins using other keyword arguments).
o If 'sort_by' is passed, the results will be sorted accordingly.
@@ -426,11 +426,11 @@
o If 'max_results' is specified, it must be a positive integer,
limiting the number of returned mappings. If unspecified, the
- plugin should return mappings for all roles satisfying the
+ plugin should return mappings for all roles satisfying the
criteria.
o Minimal keys in the returned mappings:
-
+
'id' -- (required) the role ID
'pluginid' -- (required) the plugin ID (as returned by getId())
@@ -464,7 +464,7 @@
"""
def chooseProtocols( request ):
""" -> ( protocol_1, ... protocol_N) | None
-
+
o If a set of protocols is returned, the first plugin with a
protocol that is in the set will define the protocol to be
used for the current request.
Modified: Products.PluggableAuthService/trunk/Products/PluggableAuthService/interfaces/propertysheets.py
===================================================================
--- Products.PluggableAuthService/trunk/Products/PluggableAuthService/interfaces/propertysheets.py 2012-01-03 10:54:48 UTC (rev 123908)
+++ Products.PluggableAuthService/trunk/Products/PluggableAuthService/interfaces/propertysheets.py 2012-01-03 10:55:45 UTC (rev 123909)
@@ -22,7 +22,7 @@
class IPropertySheet( Interface ):
""" Interface for queryable property sheets.
-
+
o Objects implementing this interface can play in read-only fashion
in OFS.PropertySheets' framework.
"""
Modified: Products.PluggableAuthService/trunk/Products/PluggableAuthService/interfaces/request.py
===================================================================
--- Products.PluggableAuthService/trunk/Products/PluggableAuthService/interfaces/request.py 2012-01-03 10:54:48 UTC (rev 123908)
+++ Products.PluggableAuthService/trunk/Products/PluggableAuthService/interfaces/request.py 2012-01-03 10:55:45 UTC (rev 123909)
@@ -52,4 +52,4 @@
""" FTP Request
"""
-
+
Modified: Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/DelegatingMultiPlugin.py
===================================================================
--- Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/DelegatingMultiPlugin.py 2012-01-03 10:54:48 UTC (rev 123908)
+++ Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/DelegatingMultiPlugin.py 2012-01-03 10:55:45 UTC (rev 123909)
@@ -64,7 +64,7 @@
, REQUEST=None
):
""" Factory method to instantiate a DelegatingMultiPlugin """
- # Make sure we really are working in our container (the
+ # Make sure we really are working in our container (the
# PluggableAuthService object)
self = self.this()
@@ -219,7 +219,7 @@
, 'login' : user.getUserName()
, 'pluginid' : plugin_id
, 'editurl' : '%s' % edit_url
- } )
+ } )
else:
l_results = []
seen = []
Modified: Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/DomainAuthHelper.py
===================================================================
--- Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/DomainAuthHelper.py 2012-01-03 10:54:48 UTC (rev 123908)
+++ Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/DomainAuthHelper.py 2012-01-03 10:55:45 UTC (rev 123909)
@@ -228,14 +228,14 @@
if not r_host and not r_address:
return tuple(matches)
-
+
all_info = list(self._domain_map.get(login, []))
all_info.extend(self._domain_map.get('', []))
-
+
if not r_host:
try:
r_host = socket.gethostbyaddr(r_address)[0]
- except socket.error:
+ except socket.error:
pass
if not r_address:
@@ -282,7 +282,7 @@
, 'roles' : match_info['roles']
, 'username' : match_info['username']
} )
-
+
return result
Modified: Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/DynamicGroupsPlugin.py
===================================================================
--- Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/DynamicGroupsPlugin.py 2012-01-03 10:54:48 UTC (rev 123908)
+++ Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/DynamicGroupsPlugin.py 2012-01-03 10:55:45 UTC (rev 123909)
@@ -370,7 +370,7 @@
# This method changes the enumerateGroups return value
view_name = createViewName('enumerateGroups')
self.ZCacheable_invalidate(view_name=view_name)
-
+
security.declareProtected( ManageGroups, 'updateGroup' )
def updateGroup( self
, group_id
@@ -408,7 +408,7 @@
self.ZCacheable_invalidate(view_name=view_name)
view_name = createViewName('enumerateGroups', group_id)
self.ZCacheable_invalidate(view_name=view_name)
-
+
security.declareProtected( ManageGroups, 'removeGroup' )
def removeGroup( self, group_id, REQUEST=None ):
@@ -513,7 +513,7 @@
message = 'no+groups+selected'
else:
-
+
for group_id in group_ids:
self.removeGroup( group_id )
Modified: Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/RecursiveGroupsPlugin.py
===================================================================
--- Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/RecursiveGroupsPlugin.py 2012-01-03 10:54:48 UTC (rev 123908)
+++ Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/RecursiveGroupsPlugin.py 2012-01-03 10:55:45 UTC (rev 123909)
@@ -94,7 +94,7 @@
continue
seen.append( test )
new_groups = parent._getGroupsForPrincipal(
- PropertiedUser( test ).__of__(parent),
+ PropertiedUser( test ).__of__(parent),
ignore_plugins=( self.getId(), ) )
if new_groups:
set.extend( new_groups )
Modified: Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/SearchPrincipalsPlugin.py
===================================================================
--- Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/SearchPrincipalsPlugin.py 2012-01-03 10:54:48 UTC (rev 123908)
+++ Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/SearchPrincipalsPlugin.py 2012-01-03 10:55:45 UTC (rev 123909)
@@ -12,7 +12,7 @@
#
##############################################################################
""" SearchPrincipalsPlugin Plugin to delegate enumerateUsers
- and enumerateGroups requests to another
+ and enumerateGroups requests to another
PluggableAuthService
"""
Modified: Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/ZODBGroupManager.py
===================================================================
--- Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/ZODBGroupManager.py 2012-01-03 10:54:48 UTC (rev 123908)
+++ Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/ZODBGroupManager.py 2012-01-03 10:55:45 UTC (rev 123909)
@@ -159,7 +159,7 @@
o Return one mapping per group, with the following keys:
- - 'id'
+ - 'id'
"""
return self._groups.values()
@@ -289,7 +289,7 @@
""" Remove a prinicpal from from a group.
- o Return a boolean indicating whether the principal was already
+ o Return a boolean indicating whether the principal was already
a member of the group.
o Raise KeyError if 'group_id' is unknown.
@@ -313,7 +313,7 @@
#
# ZMI
#
- manage_options = ( ( { 'label': 'Groups',
+ manage_options = ( ( { 'label': 'Groups',
'action': 'manage_groups', }
,
)
@@ -430,7 +430,7 @@
manage_addPrincipalsToGroup = postonly(manage_addPrincipalsToGroup)
security.declareProtected( ManageGroups
- , 'manage_removePrincipalsFromGroup'
+ , 'manage_removePrincipalsFromGroup'
)
def manage_removePrincipalsFromGroup( self
, group_id
Modified: Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/ZODBRoleManager.py
===================================================================
--- Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/ZODBRoleManager.py 2012-01-03 10:54:48 UTC (rev 123908)
+++ Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/ZODBRoleManager.py 2012-01-03 10:55:45 UTC (rev 123909)
@@ -36,7 +36,7 @@
from Products.PluggableAuthService.plugins.BasePlugin import BasePlugin
from Products.PluggableAuthService.utils import classImplements
-import logging
+import logging
LOG = logging.getLogger('PluggableAuthService')
@@ -282,7 +282,7 @@
parent = aq_parent( self )
info = parent.searchPrincipals( id=k, exact_match=True )
- if len(info) > 1:
+ if len(info) > 1:
message = ("Multiple groups or users exist with the "
"name '%s'. Remove one of the duplicate groups "
"or users." % (k))
@@ -347,7 +347,7 @@
#
# ZMI
#
- manage_options = ( ( { 'label': 'Roles',
+ manage_options = ( ( { 'label': 'Roles',
'action': 'manage_roles', }
,
)
Modified: Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/ZODBUserManager.py
===================================================================
--- Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/ZODBUserManager.py 2012-01-03 10:54:48 UTC (rev 123908)
+++ Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/ZODBUserManager.py 2012-01-03 10:55:45 UTC (rev 123909)
@@ -108,7 +108,7 @@
if reference is None:
return None
-
+
if AuthEncoding.is_encrypted( reference ):
if AuthEncoding.pw_validate( reference, password ):
return userid, login
@@ -205,7 +205,7 @@
, 'login' : self._userid_to_login[ user_id ]
, 'pluginid' : plugin_id
, 'editurl' : '%s?%s' % (e_url, qs)
- }
+ }
if not user_filter or user_filter( info ):
user_info.append( info )
@@ -253,7 +253,7 @@
o Return one mapping per user, with the following keys:
- - 'user_id'
+ - 'user_id'
- 'login_name'
"""
return [ self.getUserInfo( x ) for x in self._user_passwords.keys() ]
@@ -349,7 +349,7 @@
#
# ZMI
#
- manage_options = ( ( { 'label': 'Users',
+ manage_options = ( ( { 'label': 'Users',
'action': 'manage_users', }
,
)
@@ -383,7 +383,7 @@
message = 'password+and+confirm+do+not+match'
else:
-
+
if not login_name:
login_name = user_id
@@ -412,7 +412,7 @@
message = 'password+and+confirm+do+not+match'
else:
-
+
self.updateUserPassword( user_id, password )
message = 'password+updated'
@@ -455,7 +455,7 @@
message = 'no+users+selected'
else:
-
+
for user_id in user_ids:
self.removeUser( user_id )
@@ -500,7 +500,7 @@
message = 'password+and+confirm+do+not+match'
else:
-
+
if not login_name:
login_name = user_id
Modified: Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/tests/test_ChallengeProtocolChooser.py
===================================================================
--- Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/tests/test_ChallengeProtocolChooser.py 2012-01-03 10:54:48 UTC (rev 123908)
+++ Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/tests/test_ChallengeProtocolChooser.py 2012-01-03 10:55:45 UTC (rev 123909)
@@ -21,7 +21,7 @@
import IChallengeProtocolChooser_conformance
class ChallengeProtocolChooser( unittest.TestCase
- , IChallengeProtocolChooser_conformance
+ , IChallengeProtocolChooser_conformance
):
@@ -39,9 +39,9 @@
if __name__ == "__main__":
unittest.main()
-
+
def test_suite():
return unittest.TestSuite((
unittest.makeSuite( ChallengeProtocolChooser ),
))
-
+
Modified: Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/tests/test_CookieAuthHelper.py
===================================================================
--- Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/tests/test_CookieAuthHelper.py 2012-01-03 10:54:48 UTC (rev 123908)
+++ Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/tests/test_CookieAuthHelper.py 2012-01-03 10:55:45 UTC (rev 123909)
@@ -104,7 +104,7 @@
# http://www.zope.org/Collectors/PAS/43
# Edge case: The ZPublisher sets a cookie's value to "deleted"
# in the current request if expireCookie is called. If we hit
- # extractCredentials in the same request after this, it would
+ # extractCredentials in the same request after this, it would
# blow up trying to deal with the invalid cookie value.
helper = self._makeOne()
response = FauxCookieResponse()
@@ -130,7 +130,7 @@
self.assertEqual(len(response.headers), 3)
self.failUnless(response.headers['Location'].endswith(urllib.quote(testURL)))
self.assertEqual(response.headers['Cache-Control'], 'no-cache')
- self.assertEqual(response.headers['Expires'], 'Sat, 01 Jan 2000 00:00:00 GMT')
+ self.assertEqual(response.headers['Expires'], 'Sat, 01 Jan 2000 00:00:00 GMT')
def test_challenge_with_vhm( self ):
rc, root, folder, object = self._makeTree()
@@ -173,27 +173,27 @@
helper.login()
self.assertEqual(len(response.cookies), 0)
- def test_extractCredentials_from_cookie_with_colon_in_password(self):
+ def test_extractCredentials_from_cookie_with_colon_in_password(self):
# http://www.zope.org/Collectors/PAS/51
# Passwords with ":" characters broke authentication
- from base64 import encodestring
+ from base64 import encodestring
- helper = self._makeOne()
- response = FauxCookieResponse()
- request = FauxSettableRequest(RESPONSE=response)
+ helper = self._makeOne()
+ response = FauxCookieResponse()
+ request = FauxSettableRequest(RESPONSE=response)
cookie_str = '%s:%s' % ('foo'.encode('hex'), 'b:ar'.encode('hex'))
cookie_val = encodestring(cookie_str)
- cookie_val = cookie_val.rstrip()
- request.set(helper.cookie_name, cookie_val)
+ cookie_val = cookie_val.rstrip()
+ request.set(helper.cookie_name, cookie_val)
- self.assertEqual(helper.extractCredentials(request),
- {'login': 'foo',
- 'password': 'b:ar',
- 'remote_host': '',
- 'remote_address': ''})
+ self.assertEqual(helper.extractCredentials(request),
+ {'login': 'foo',
+ 'password': 'b:ar',
+ 'remote_host': '',
+ 'remote_address': ''})
- def test_extractCredentials_from_cookie_with_colon_that_is_not_ours(self):
+ def test_extractCredentials_from_cookie_with_colon_that_is_not_ours(self):
# http://article.gmane.org/gmane.comp.web.zope.plone.product-developers/5145
from base64 import encodestring
Modified: Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/tests/test_LocalRolePlugin.py
===================================================================
--- Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/tests/test_LocalRolePlugin.py 2012-01-03 10:54:48 UTC (rev 123908)
+++ Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/tests/test_LocalRolePlugin.py 2012-01-03 10:55:45 UTC (rev 123909)
@@ -44,7 +44,7 @@
class FauxRoot( FauxContainer ):
isTopLevelPrincipiaApplicationObject = 1
-
+
def getPhysicalRoot( self ):
return self
@@ -106,7 +106,7 @@
def test_no_local_roles( self ):
rc, root, folder, object = self._makeTree()
-
+
lrp = self._makeOne( 'no_roles' ).__of__(root)
user = FauxUser( 'loser' ).__of__(root)
@@ -118,7 +118,7 @@
rc, root, folder, object = self._makeTree()
root.__ac_local_roles__ = { 'some_manager' : [ 'Manager' ] }
-
+
lrp = self._makeOne( 'roles' ).__of__(root)
user = FauxUser( 'some_manager' ).__of__(root)
@@ -128,8 +128,8 @@
if __name__ == "__main__":
unittest.main()
-
+
def test_suite():
return unittest.TestSuite((
unittest.makeSuite( LocalRolePluginTestCase ),
- ))
+ ))
Modified: Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/tests/test_RecursiveGroupsPlugin.py
===================================================================
--- Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/tests/test_RecursiveGroupsPlugin.py 2012-01-03 10:54:48 UTC (rev 123908)
+++ Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/tests/test_RecursiveGroupsPlugin.py 2012-01-03 10:55:45 UTC (rev 123909)
@@ -24,7 +24,7 @@
def __init__( self ):
self._id = 'acl_users'
-
+
def _getGroupsForPrincipal( self, principal, request=None, plugins=None
, ignore_plugins=None ):
all_groups = []
@@ -42,14 +42,14 @@
return all_groups
class DummyPrincipal:
-
+
def __init__( self, id, groups=() ):
self._id = id
self._groups = groups
-
+
def getId( self ):
return self._id
-
+
def getGroups( self ):
return self._groups
@@ -62,10 +62,10 @@
def getId( self ):
return self._id
-
+
def addGroup( self, group_id ):
self._groups[group_id] = 1
-
+
def addPrincipalToGroup( self, prin, group_id ):
prin_id = prin.getId()
already_in = self._prin_to_group.get( prin_id, () )
@@ -92,7 +92,7 @@
return self._getTargetClass()( id=id, *args, **kw )
def test_simple_flattening( self ):
-
+
pas = FauxPAS()
dgm = DummyGroupsManager( 'dummy' )
rgp = self._makeOne( 'rgp' )
@@ -103,20 +103,20 @@
dgm = pas._getOb( 'dgm' )
dgm.addGroup( 'group1' )
dgm.addGroup( 'group2' )
-
+
rgp = pas._getOb( 'rgp' )
user = DummyPrincipal( 'user1', ( 'dummy:group1', ) )
-
+
dgm.addPrincipalToGroup( user, 'group1' )
dgm.addPrincipalToGroup( DummyPrincipal( 'dummy:group1' ), 'group2' )
-
+
self.assertEqual( rgp.getGroupsForPrincipal( user )
- , ( 'dummy:group1', 'dummy:group2' )
+ , ( 'dummy:group1', 'dummy:group2' )
)
def test_complex_flattening( self ):
-
+
pas = FauxPAS()
dgm = DummyGroupsManager( 'dummy' )
odgm = DummyGroupsManager( 'other_dummy' )
@@ -135,16 +135,16 @@
odgm.addGroup( 'group4' )
rgp = pas._getOb( 'rgp' )
-
+
user = DummyPrincipal( 'user1', ( 'dummy:group1'
, 'other_dummy:group3' ) )
-
+
dgm.addPrincipalToGroup( user, 'group1' )
dgm.addPrincipalToGroup( DummyPrincipal( 'dummy:group1' ), 'group2' )
odgm.addPrincipalToGroup( user, 'group3' )
odgm.addPrincipalToGroup( DummyPrincipal( 'dummy:group2' ), 'group4' )
-
+
groups = rgp.getGroupsForPrincipal( user )
self.assertEqual( len( groups ), 4 )
self.failUnless( 'dummy:group1' in groups )
@@ -153,7 +153,7 @@
self.failUnless( 'other_dummy:group4' in groups )
def test_cross_nested_flattening( self ):
-
+
pas = FauxPAS()
dgm = DummyGroupsManager( 'dummy' )
odgm = DummyGroupsManager( 'other_dummy' )
@@ -170,17 +170,17 @@
odgm.addGroup( 'group2' )
rgp = pas._getOb( 'rgp' )
-
+
user = DummyPrincipal( 'user1', ( 'dummy:group1'
, 'other_dummy:group2' ) )
-
+
dgm.addPrincipalToGroup( user, 'group1' )
dgm.addPrincipalToGroup( DummyPrincipal( 'other_dummy:group1' )
, 'group1' )
odgm.addPrincipalToGroup( user, 'group2' )
odgm.addPrincipalToGroup( DummyPrincipal( 'dummy:group1' ), 'group2' )
-
+
groups = rgp.getGroupsForPrincipal( user )
self.assertEqual( len( groups ), 2 )
self.failUnless( 'dummy:group1' in groups )
Modified: Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/tests/test_RequestTypeSniffer.py
===================================================================
--- Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/tests/test_RequestTypeSniffer.py 2012-01-03 10:54:48 UTC (rev 123908)
+++ Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/tests/test_RequestTypeSniffer.py 2012-01-03 10:55:45 UTC (rev 123909)
@@ -21,7 +21,7 @@
import IRequestTypeSniffer_conformance
class RequestTypeSniffer( unittest.TestCase
- , IRequestTypeSniffer_conformance
+ , IRequestTypeSniffer_conformance
):
@@ -39,9 +39,9 @@
if __name__ == "__main__":
unittest.main()
-
+
def test_suite():
return unittest.TestSuite((
unittest.makeSuite( RequestTypeSniffer ),
))
-
+
Modified: Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/tests/test_ZODBGroupManager.py
===================================================================
--- Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/tests/test_ZODBGroupManager.py 2012-01-03 10:54:48 UTC (rev 123908)
+++ Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/tests/test_ZODBGroupManager.py 2012-01-03 10:55:45 UTC (rev 123909)
@@ -105,8 +105,8 @@
zgm.updateGroup( 'group', description='group_description_changed_again')
group_info = zgm.getGroupInfo( 'group' )
self.assertEqual( group_info['title'], 'group_title_changed_again' )
-
+
def test_addPrincipalToGroup( self ):
zgm = self._makeOne()
@@ -149,7 +149,7 @@
zgm.addGroup( 'group' )
user = DummyUser( 'userid' )
-
+
zgm.addPrincipalToGroup( user.getId(), 'group' )
zgm.removePrincipalFromGroup( user.getId(), 'group' )
groups = zgm.getGroupsForPrincipal( user )
@@ -161,7 +161,7 @@
zgm.addGroup( 'group' )
user = DummyUser( 'userid' )
-
+
zgm.addPrincipalToGroup( user.getId(), 'group' )
zgm.removeGroup( 'group' )
group_ids = zgm.listGroupIds()
@@ -172,13 +172,13 @@
def test_multiplePrincipalsPerGroup( self ):
pas = FauxPAS()
zgm = self._makeOne().__of__( pas )
-
+
zgm.addGroup( 'group1' )
zgm.addGroup( 'group2' )
user1 = DummyUser( 'userid1' )
user2 = DummyUser( 'userid2' )
-
+
zgm.addPrincipalToGroup( user1.getId(), 'group1' )
zgm.addPrincipalToGroup( user1.getId(), 'group2' )
zgm.addPrincipalToGroup( user2.getId(), 'group2' )
Modified: Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/tests/test_ZODBRoleManager.py
===================================================================
--- Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/tests/test_ZODBRoleManager.py 2012-01-03 10:54:48 UTC (rev 123908)
+++ Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/tests/test_ZODBRoleManager.py 2012-01-03 10:55:45 UTC (rev 123909)
@@ -193,7 +193,7 @@
self.assertEqual( info_list[ i ][ 'properties_url' ]
, 'partial/manage_roles?role_id=%s' % sorted[ i ])
self.assertEqual( info_list[ i ][ 'members_url' ]
- , 'partial/manage_roles?role_id=%s&assign=1'
+ , 'partial/manage_roles?role_id=%s&assign=1'
% sorted[ i ])
self.assertEqual( info_list[ i ][ 'title' ]
, 'Role %s' % sorted[ i ] )
@@ -424,20 +424,20 @@
def test_listAssignedPrincipals_duplicate_principals( self ):
from Products.PluggableAuthService.plugins.ZODBRoleManager \
import MultiplePrincipalError
-
+
class FauxDuplicatePAS( FauxSmartPAS ):
"""Returns duplicate user ids when searched."""
def searchPrincipals( self, **kw ):
return [ {'id':'foo', 'title':'User 1'},
{'id':'foo', 'title':'User 2'} ]
-
+
root = FauxDuplicatePAS()
zrm = self._makeOne(id='assign_new').__of__(root)
-
+
zrm.addRole('test')
zrm.assignRoleToPrincipal('test', 'foo')
-
+
self.assertRaises(MultiplePrincipalError,
zrm.listAssignedPrincipals, 'test' )
Modified: Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/tests/test_exportimport.py
===================================================================
--- Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/tests/test_exportimport.py 2012-01-03 10:54:48 UTC (rev 123908)
+++ Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/tests/test_exportimport.py 2012-01-03 10:55:45 UTC (rev 123909)
@@ -36,7 +36,7 @@
from Products.GenericSetup.tests.common import BaseRegistryTests
from Products.GenericSetup.tests.common import DummyExportContext
from Products.GenericSetup.tests.common import DummyImportContext
-
+
from Products.PluggableAuthService.tests.utils import _setUpDefaultTraversable
class _TestBase(BaseRegistryTests,
@@ -76,7 +76,7 @@
def test_export_empty(self):
_setUpDefaultTraversable()
-
+
plugin = self._makePlugin('empty').__of__(self.root)
adapter = self._makeOne(plugin)
@@ -115,7 +115,7 @@
def test_export_with_users(self):
_setUpDefaultTraversable()
-
+
plugin = self._makePlugin('with_users').__of__(self.root)
plugin.title = 'Plugin Title'
@@ -220,7 +220,7 @@
def test_export_empty(self):
_setUpDefaultTraversable()
-
+
plugin = self._makePlugin('empty').__of__(self.root)
adapter = self._makeOne(plugin)
@@ -254,7 +254,7 @@
def test_export_with_groups(self):
_setUpDefaultTraversable()
-
+
plugin = self._makePlugin('with_groups').__of__(self.root)
plugin.title = 'Plugin Title'
@@ -365,7 +365,7 @@
def test_export_empty(self):
_setUpDefaultTraversable()
-
+
plugin = self._makePlugin('empty').__of__(self.root)
adapter = self._makeOne(plugin)
@@ -399,7 +399,7 @@
def test_export_with_roles(self):
_setUpDefaultTraversable()
-
+
plugin = self._makePlugin('with_roles').__of__(self.root)
plugin.title = 'Plugin Title'
@@ -514,7 +514,7 @@
def test_export_default(self):
_setUpDefaultTraversable()
-
+
from Products.PluggableAuthService.plugins.CookieAuthHelper \
import CookieAuthHelper as CAH
plugin = self._makePlugin('default').__of__(self.root)
@@ -549,7 +549,7 @@
def test_export_explicitly_set(self):
_setUpDefaultTraversable()
-
+
TITLE = 'Plugin Title'
COOKIE_NAME = 'COOKIE_NAME'
LOGIN_PATH = 'LOGIN_PATH'
@@ -648,7 +648,7 @@
def test_export_empty(self):
_setUpDefaultTraversable()
-
+
plugin = self._makePlugin('empty', None).__of__(self.root)
adapter = self._makeOne(plugin)
@@ -690,7 +690,7 @@
def test_export_with_map(self):
_setUpDefaultTraversable()
-
+
TITLE = 'With Map'
USER_ID = 'some_user_id'
DOMAIN = 'host.example.com'
@@ -852,7 +852,7 @@
def test_export_no_title(self):
_setUpDefaultTraversable()
-
+
plugin = self._makePlugin('no_title', None).__of__(self.root)
adapter = self._makeOne(plugin)
@@ -867,7 +867,7 @@
def test_export_with_title(self):
_setUpDefaultTraversable()
-
+
TITLE = 'Plugin Title'
plugin = self._makePlugin('with_title', None).__of__(self.root)
plugin.title = TITLE
@@ -947,7 +947,7 @@
def test_export_default(self):
_setUpDefaultTraversable()
-
+
plugin = self._makePlugin('default').__of__(self.root)
adapter = self._makeOne(plugin)
@@ -974,7 +974,7 @@
def test_export_explicitly_set(self):
_setUpDefaultTraversable()
-
+
TITLE = 'Plugin Title'
DELEGATE_PATH = 'path/to/delegate'
plugin = self._makePlugin('explicit').__of__(self.root)
@@ -1057,7 +1057,7 @@
def test_export_empty(self):
_setUpDefaultTraversable()
-
+
plugin = self._makePlugin('empty', None).__of__(self.root)
adapter = self._makeOne(plugin)
@@ -1094,7 +1094,7 @@
def test_export_with_groups(self):
_setUpDefaultTraversable()
-
+
plugin = self._makePlugin('with_groups').__of__(self.root)
plugin.title = 'Plugin Title'
Modified: Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/www/bpActivateInterfaces.zpt
===================================================================
--- Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/www/bpActivateInterfaces.zpt 2012-01-03 10:54:48 UTC (rev 123908)
+++ Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/www/bpActivateInterfaces.zpt 2012-01-03 10:55:45 UTC (rev 123909)
@@ -2,7 +2,7 @@
<h2 tal:replace="structure here/manage_tabs"> TABS </h2>
<p class="form-help">
- Choose the functionality this
+ Choose the functionality this
<span tal:replace="here/meta_type"> Foo Plugin </span>
will perform.
</p>
@@ -23,9 +23,9 @@
tal:condition="python:here.testImplements(interface)">
<input type="checkbox" name="interfaces:list" value=""
tal:attributes="value interface_name;
- checked python:here.getId() in act_ids and 'checked' or ''"
+ checked python:here.getId() in act_ids and 'checked' or ''"
/>
- <a href=""
+ <a href=""
tal:attributes="href string:${pau}?plugin_type=${info/id}">
<span tal:replace="title/title"/></a>
<i>(<span tal:replace="method"/>)</i>
@@ -36,8 +36,8 @@
</td>
<td align="left" valign="top">
<div class="form-element">
- <input class="form-element" type="submit" name="submit"
- value=" Update " />
+ <input class="form-element" type="submit" name="submit"
+ value=" Update " />
</div>
</td>
</tr>
Modified: Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/www/caAdd.zpt
===================================================================
--- Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/www/caAdd.zpt 2012-01-03 10:54:48 UTC (rev 123908)
+++ Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/www/caAdd.zpt 2012-01-03 10:55:45 UTC (rev 123909)
@@ -5,10 +5,10 @@
<p class="form-help">
Cookie Auth Helpers manage the details of Cookie Authentication for
-Pluggable Auth Service functionality.
+Pluggable Auth Service functionality.
</p>
-<form action="addCookieAuthHelper" method="post"
+<form action="addCookieAuthHelper" method="post"
enctype="multipart/form-data">
<table cellspacing="0" cellpadding="2" border="0">
<tr>
@@ -46,8 +46,8 @@
</td>
<td align="left" valign="top">
<div class="form-element">
- <input class="form-element" type="submit" name="submit"
- value=" Add " />
+ <input class="form-element" type="submit" name="submit"
+ value=" Add " />
</div>
</td>
</tr>
Modified: Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/www/cpcAdd.zpt
===================================================================
--- Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/www/cpcAdd.zpt 2012-01-03 10:54:48 UTC (rev 123908)
+++ Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/www/cpcAdd.zpt 2012-01-03 10:55:45 UTC (rev 123909)
@@ -10,7 +10,7 @@
challenge based on the incoming request.
</p>
-<form action="addChallengeProtocolChooserPlugin" method="post"
+<form action="addChallengeProtocolChooserPlugin" method="post"
enctype="multipart/form-data">
<table cellspacing="0" cellpadding="2" border="0">
<tr>
@@ -38,8 +38,8 @@
</td>
<td align="left" valign="top">
<div class="form-element">
- <input class="form-element" type="submit" name="submit"
- value=" Add " />
+ <input class="form-element" type="submit" name="submit"
+ value=" Add " />
</div>
</td>
</tr>
Modified: Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/www/cpcEdit.zpt
===================================================================
--- Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/www/cpcEdit.zpt 2012-01-03 10:54:48 UTC (rev 123908)
+++ Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/www/cpcEdit.zpt 2012-01-03 10:55:45 UTC (rev 123909)
@@ -18,7 +18,7 @@
</tr>
<tr class="row-hilite"
- tal:repeat="entry info"
+ tal:repeat="entry info"
tal:attributes="class python:repeat['entry'].odd() and 'row-normal' or default"
>
<td class="form-label"
Modified: Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/www/daAdd.zpt
===================================================================
--- Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/www/daAdd.zpt 2012-01-03 10:54:48 UTC (rev 123908)
+++ Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/www/daAdd.zpt 2012-01-03 10:55:45 UTC (rev 123909)
@@ -5,10 +5,10 @@
<p class="form-help">
Domain Auth Helpers manage the details of Domain-based Authentication for
-Pluggable Auth Service functionality.
+Pluggable Auth Service functionality.
</p>
-<form action="manage_addDomainAuthHelper" method="post"
+<form action="manage_addDomainAuthHelper" method="post"
enctype="multipart/form-data">
<table cellspacing="0" cellpadding="2" border="0">
<tr>
@@ -36,8 +36,8 @@
</td>
<td align="left" valign="top">
<div class="form-element">
- <input class="form-element" type="submit" name="submit"
- value=" Add " />
+ <input class="form-element" type="submit" name="submit"
+ value=" Add " />
</div>
</td>
</tr>
Modified: Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/www/daGeneric.zpt
===================================================================
--- Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/www/daGeneric.zpt 2012-01-03 10:54:48 UTC (rev 123908)
+++ Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/www/daGeneric.zpt 2012-01-03 10:55:45 UTC (rev 123909)
@@ -48,13 +48,13 @@
<input type="checkbox" name="match_ids:list" value=""
tal:attributes="value match_info/match_id" />
</td>
- <td class="form-text"
- tal:content="match_info/match_type">
- type
+ <td class="form-text"
+ tal:content="match_info/match_type">
+ type
</td>
- <td class="form-text"
- tal:content="match_info/match_string">
- string
+ <td class="form-text"
+ tal:content="match_info/match_string">
+ string
</td>
<td class="form-text"
tal:content="match_info/username">
Modified: Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/www/daMatches.zpt
===================================================================
--- Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/www/daMatches.zpt 2012-01-03 10:54:48 UTC (rev 123908)
+++ Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/www/daMatches.zpt 2012-01-03 10:55:45 UTC (rev 123909)
@@ -102,7 +102,7 @@
<tr class="list-header">
<td class="list-header">
<span class="form-label">
- Add new domain mapping for user
+ Add new domain mapping for user
<span tal:replace="user_id"> foo </span>.
</span>
</td>
Modified: Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/www/dgpAdd.zpt
===================================================================
--- Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/www/dgpAdd.zpt 2012-01-03 10:54:48 UTC (rev 123908)
+++ Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/www/dgpAdd.zpt 2012-01-03 10:55:45 UTC (rev 123909)
@@ -10,7 +10,7 @@
TALES expressions.
</p>
-<form action="addDynamicGroupsPlugin" method="post"
+<form action="addDynamicGroupsPlugin" method="post"
enctype="multipart/form-data">
<table cellspacing="0" cellpadding="2" border="0">
<tr>
@@ -38,8 +38,8 @@
</td>
<td align="left" valign="top">
<div class="form-element">
- <input class="form-element" type="submit" name="submit"
- value=" Add " />
+ <input class="form-element" type="submit" name="submit"
+ value=" Add " />
</div>
</td>
</tr>
Modified: Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/www/dgpGroups.zpt
===================================================================
--- Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/www/dgpGroups.zpt 2012-01-03 10:54:48 UTC (rev 123908)
+++ Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/www/dgpGroups.zpt 2012-01-03 10:55:45 UTC (rev 123909)
@@ -28,7 +28,7 @@
<form action="." method="POST">
<tr class="row-hilite"
- tal:repeat="info here/listGroupInfo"
+ tal:repeat="info here/listGroupInfo"
tal:attributes="class
python:repeat['info'].odd() and 'row-normal' or default"
>
Modified: Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/www/dmpAdd.zpt
===================================================================
--- Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/www/dmpAdd.zpt 2012-01-03 10:54:48 UTC (rev 123908)
+++ Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/www/dmpAdd.zpt 2012-01-03 10:55:45 UTC (rev 123909)
@@ -45,8 +45,8 @@
</td>
<td align="left" valign="top">
<div class="form-element">
- <input class="form-element" type="submit" name="submit"
- value=" Add " />
+ <input class="form-element" type="submit" name="submit"
+ value=" Add " />
</div>
</td>
</tr>
Modified: Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/www/hbAdd.zpt
===================================================================
--- Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/www/hbAdd.zpt 2012-01-03 10:54:48 UTC (rev 123908)
+++ Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/www/hbAdd.zpt 2012-01-03 10:55:45 UTC (rev 123909)
@@ -5,10 +5,10 @@
<p class="form-help">
HTTP Basic Auth Helpers manage the details of HTTP Basic Authentication for
-Pluggable Auth Service functionality.
+Pluggable Auth Service functionality.
</p>
-<form action="addHTTPBasicAuthHelper" method="post"
+<form action="addHTTPBasicAuthHelper" method="post"
enctype="multipart/form-data">
<table cellspacing="0" cellpadding="2" border="0">
<tr>
@@ -36,8 +36,8 @@
</td>
<td align="left" valign="top">
<div class="form-element">
- <input class="form-element" type="submit" name="submit"
- value=" Add " />
+ <input class="form-element" type="submit" name="submit"
+ value=" Add " />
</div>
</td>
</tr>
Modified: Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/www/iaAdd.zpt
===================================================================
--- Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/www/iaAdd.zpt 2012-01-03 10:54:48 UTC (rev 123908)
+++ Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/www/iaAdd.zpt 2012-01-03 10:55:45 UTC (rev 123909)
@@ -5,10 +5,10 @@
<p class="form-help">
Inline Auth Helpers manage the details of Inline Authentication for
-Pluggable Auth Service functionality.
+Pluggable Auth Service functionality.
</p>
-<form action="addInlineAuthHelper" method="post"
+<form action="addInlineAuthHelper" method="post"
enctype="multipart/form-data">
<table cellspacing="0" cellpadding="2" border="0">
<tr>
@@ -36,8 +36,8 @@
</td>
<td align="left" valign="top">
<div class="form-element">
- <input class="form-element" type="submit" name="submit"
- value=" Add " />
+ <input class="form-element" type="submit" name="submit"
+ value=" Add " />
</div>
</td>
</tr>
Modified: Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/www/lrpAdd.zpt
===================================================================
--- Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/www/lrpAdd.zpt 2012-01-03 10:54:48 UTC (rev 123908)
+++ Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/www/lrpAdd.zpt 2012-01-03 10:55:45 UTC (rev 123909)
@@ -5,12 +5,12 @@
tal:replace="structure here/manage_form_title">Form Title</h2>
-<p class="form-help">
+<p class="form-help">
Local Role Plugins assign roles to principals based on the
__ac_local_roles__ mappings found in the Root Folder.
</p>
-<form action="addLocalRolePlugin" method="post"
+<form action="addLocalRolePlugin" method="post"
enctype="multipart/form-data">
<table cellspacing="0" cellpadding="2" border="0">
<tr>
@@ -38,8 +38,8 @@
</td>
<td align="left" valign="top">
<div class="form-element">
- <input class="form-element" type="submit" name="submit"
- value=" Add " />
+ <input class="form-element" type="submit" name="submit"
+ value=" Add " />
</div>
</td>
</tr>
Modified: Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/www/rgpAdd.zpt
===================================================================
--- Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/www/rgpAdd.zpt 2012-01-03 10:54:48 UTC (rev 123908)
+++ Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/www/rgpAdd.zpt 2012-01-03 10:55:45 UTC (rev 123909)
@@ -11,7 +11,7 @@
IGroupsPlugins to play in Authentication.
</p>
-<form action="addRecursiveGroupsPlugin" method="post"
+<form action="addRecursiveGroupsPlugin" method="post"
enctype="multipart/form-data">
<table cellspacing="0" cellpadding="2" border="0">
<tr>
@@ -39,8 +39,8 @@
</td>
<td align="left" valign="top">
<div class="form-element">
- <input class="form-element" type="submit" name="submit"
- value=" Add " />
+ <input class="form-element" type="submit" name="submit"
+ value=" Add " />
</div>
</td>
</tr>
Modified: Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/www/rtsAdd.zpt
===================================================================
--- Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/www/rtsAdd.zpt 2012-01-03 10:54:48 UTC (rev 123908)
+++ Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/www/rtsAdd.zpt 2012-01-03 10:55:45 UTC (rev 123909)
@@ -10,7 +10,7 @@
later use by other plugins.
</p>
-<form action="addRequestTypeSnifferPlugin" method="post"
+<form action="addRequestTypeSnifferPlugin" method="post"
enctype="multipart/form-data">
<table cellspacing="0" cellpadding="2" border="0">
<tr>
@@ -38,8 +38,8 @@
</td>
<td align="left" valign="top">
<div class="form-element">
- <input class="form-element" type="submit" name="submit"
- value=" Add " />
+ <input class="form-element" type="submit" name="submit"
+ value=" Add " />
</div>
</td>
</tr>
Modified: Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/www/saAdd.zpt
===================================================================
--- Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/www/saAdd.zpt 2012-01-03 10:54:48 UTC (rev 123908)
+++ Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/www/saAdd.zpt 2012-01-03 10:55:45 UTC (rev 123909)
@@ -5,10 +5,10 @@
<p class="form-help">
Session Auth Helpers manage the details of Session-based Authentication for
-Pluggable Auth Service functionality.
+Pluggable Auth Service functionality.
</p>
-<form action="manage_addSessionAuthHelper" method="post"
+<form action="manage_addSessionAuthHelper" method="post"
enctype="multipart/form-data">
<table cellspacing="0" cellpadding="2" border="0">
<tr>
@@ -36,8 +36,8 @@
</td>
<td align="left" valign="top">
<div class="form-element">
- <input class="form-element" type="submit" name="submit"
- value=" Add " />
+ <input class="form-element" type="submit" name="submit"
+ value=" Add " />
</div>
</td>
</tr>
Modified: Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/www/spAdd.zpt
===================================================================
--- Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/www/spAdd.zpt 2012-01-03 10:54:48 UTC (rev 123908)
+++ Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/www/spAdd.zpt 2012-01-03 10:55:45 UTC (rev 123909)
@@ -5,7 +5,7 @@
<p class="form-help">
Scriptable Plugins are containers for disparate scripting solutions for
-Pluggable Auth Service functionality.
+Pluggable Auth Service functionality.
</p>
<form action="addScriptablePlugin" method="post">
@@ -35,8 +35,8 @@
</td>
<td align="left" valign="top">
<div class="form-element">
- <input class="form-element" type="submit" name="submit"
- value=" Add " />
+ <input class="form-element" type="submit" name="submit"
+ value=" Add " />
</div>
</td>
</tr>
Modified: Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/www/spEditInterfaces.zpt
===================================================================
--- Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/www/spEditInterfaces.zpt 2012-01-03 10:54:48 UTC (rev 123908)
+++ Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/www/spEditInterfaces.zpt 2012-01-03 10:55:45 UTC (rev 123909)
@@ -19,7 +19,7 @@
<input type="checkbox" name="interfaces:list" value=""
tal:attributes="value interface_name;
checked python:implements and 'checked' or '';
- disabled python:not here.hasMethod(method) and 'checked' or ''"
+ disabled python:not here.hasMethod(method) and 'checked' or ''"
/>
<span tal:replace="title/title"/>
<i>(<span tal:replace="method"/>)</i>
@@ -30,8 +30,8 @@
</td>
<td align="left" valign="top">
<div class="form-element">
- <input class="form-element" type="submit" name="submit"
- value=" Update " />
+ <input class="form-element" type="submit" name="submit"
+ value=" Update " />
</div>
</td>
</tr>
Modified: Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/www/sppAdd.zpt
===================================================================
--- Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/www/sppAdd.zpt 2012-01-03 10:54:48 UTC (rev 123908)
+++ Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/www/sppAdd.zpt 2012-01-03 10:55:45 UTC (rev 123909)
@@ -5,7 +5,7 @@
<p class="form-help">
Search Principals Plugins allow delegation of searching to another
- PluggableAuthService
+ PluggableAuthService
</p>
<form action="addSearchPrincipalsPlugin">
@@ -45,8 +45,8 @@
</td>
<td align="left" valign="top">
<div class="form-element">
- <input class="form-element" type="submit" name="submit"
- value=" Add " />
+ <input class="form-element" type="submit" name="submit"
+ value=" Add " />
</div>
</td>
</tr>
Modified: Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/www/zgAdd.zpt
===================================================================
--- Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/www/zgAdd.zpt 2012-01-03 10:54:48 UTC (rev 123908)
+++ Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/www/zgAdd.zpt 2012-01-03 10:55:45 UTC (rev 123909)
@@ -4,7 +4,7 @@
tal:replace="structure here/manage_form_title">Form Title</h2>
<p class="form-help">
-ZODB Group Managers are containers for groups.
+ZODB Group Managers are containers for groups.
</p>
<form action="addZODBGroupManager" method="post">
@@ -34,8 +34,8 @@
</td>
<td align="left" valign="top">
<div class="form-element">
- <input class="form-element" type="submit" name="submit"
- value=" Add " />
+ <input class="form-element" type="submit" name="submit"
+ value=" Add " />
</div>
</td>
</tr>
Modified: Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/www/zgGroups.zpt
===================================================================
--- Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/www/zgGroups.zpt 2012-01-03 10:54:48 UTC (rev 123908)
+++ Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/www/zgGroups.zpt 2012-01-03 10:55:45 UTC (rev 123909)
@@ -31,7 +31,7 @@
<form action="." method="POST">
<tr class="row-hilite"
- tal:repeat="info here/listGroupInfo"
+ tal:repeat="info here/listGroupInfo"
tal:attributes="class python:repeat['info'].odd() and 'row-normal' or default"
>
<td>
@@ -53,7 +53,7 @@
tal:attributes="href string:?group_id=${info/id}&assign=1"
>?</a>
<span
- tal:content="python:','.join(
+ tal:content="python:','.join(
[x[1] for x in here.listAssignedPrincipals(info['id'])] )"
>GROUP ASSIGNMENTS</span>
</td>
Modified: Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/www/zrAdd.zpt
===================================================================
--- Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/www/zrAdd.zpt 2012-01-03 10:54:48 UTC (rev 123908)
+++ Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/www/zrAdd.zpt 2012-01-03 10:55:45 UTC (rev 123909)
@@ -34,8 +34,8 @@
</td>
<td align="left" valign="top">
<div class="form-element">
- <input class="form-element" type="submit" name="submit"
- value=" Add " />
+ <input class="form-element" type="submit" name="submit"
+ value=" Add " />
</div>
</td>
</tr>
Modified: Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/www/zrRoles.zpt
===================================================================
--- Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/www/zrRoles.zpt 2012-01-03 10:54:48 UTC (rev 123908)
+++ Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/www/zrRoles.zpt 2012-01-03 10:55:45 UTC (rev 123909)
@@ -34,7 +34,7 @@
<form action="." method="POST">
<tr class="row-hilite"
- tal:repeat="info here/listRoleInfo"
+ tal:repeat="info here/listRoleInfo"
tal:attributes="class python:repeat['info'].odd() and 'row-normal' or default"
>
<td>
@@ -56,7 +56,7 @@
tal:attributes="href string:?role_id=${info/id}&assign=1"
>?</a>
<span
- tal:content="python:','.join(
+ tal:content="python:','.join(
[x[1] for x in here.listAssignedPrincipals(info['id'])] )"
>ROLE ASSIGNMENTS</span>
</td>
Modified: Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/www/zuAdd.zpt
===================================================================
--- Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/www/zuAdd.zpt 2012-01-03 10:54:48 UTC (rev 123908)
+++ Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/www/zuAdd.zpt 2012-01-03 10:55:45 UTC (rev 123909)
@@ -5,7 +5,7 @@
<p class="form-help">
ZODB User Managers are containers for disparate scripting solutions for
-Pluggable Auth Service functionality.
+Pluggable Auth Service functionality.
</p>
<form action="addZODBUserManager" method="post">
@@ -35,8 +35,8 @@
</td>
<td align="left" valign="top">
<div class="form-element">
- <input class="form-element" type="submit" name="submit"
- value=" Add " />
+ <input class="form-element" type="submit" name="submit"
+ value=" Add " />
</div>
</td>
</tr>
Modified: Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/www/zuUsers.zpt
===================================================================
--- Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/www/zuUsers.zpt 2012-01-03 10:54:48 UTC (rev 123908)
+++ Products.PluggableAuthService/trunk/Products/PluggableAuthService/plugins/www/zuUsers.zpt 2012-01-03 10:55:45 UTC (rev 123909)
@@ -29,7 +29,7 @@
<form action="." method="POST">
<tr class="row-hilite"
- tal:repeat="info here/listUserInfo"
+ tal:repeat="info here/listUserInfo"
tal:attributes="class python:repeat['info'].odd() and 'row-normal' or default"
>
<td>
Modified: Products.PluggableAuthService/trunk/Products/PluggableAuthService/tests/test_PluggableAuthService.py
===================================================================
--- Products.PluggableAuthService/trunk/Products/PluggableAuthService/tests/test_PluggableAuthService.py 2012-01-03 10:54:48 UTC (rev 123908)
+++ Products.PluggableAuthService/trunk/Products/PluggableAuthService/tests/test_PluggableAuthService.py 2012-01-03 10:55:45 UTC (rev 123909)
@@ -1167,7 +1167,7 @@
# Our enumerator plugin normally returns something, even if
# you ask for a nonexistent user.
self.failUnless(zcuf._verifyUser(plugins, login='qux') in users)
-
+
# But with no criteria, we should always get None.
self.assertEqual(zcuf._verifyUser(plugins, login=None, user_id=None),
None)
Modified: Products.PluggableAuthService/trunk/Products/PluggableAuthService/tests/test_PropertiedUser.py
===================================================================
--- Products.PluggableAuthService/trunk/Products/PluggableAuthService/tests/test_PropertiedUser.py 2012-01-03 10:54:48 UTC (rev 123908)
+++ Products.PluggableAuthService/trunk/Products/PluggableAuthService/tests/test_PropertiedUser.py 2012-01-03 10:55:45 UTC (rev 123909)
@@ -285,4 +285,4 @@
return unittest.TestSuite((
unittest.makeSuite( PropertiedUserTests ),
))
-
+
Modified: Products.PluggableAuthService/trunk/Products/PluggableAuthService/www/pasAddForm.zpt
===================================================================
--- Products.PluggableAuthService/trunk/Products/PluggableAuthService/www/pasAddForm.zpt 2012-01-03 10:54:48 UTC (rev 123908)
+++ Products.PluggableAuthService/trunk/Products/PluggableAuthService/www/pasAddForm.zpt 2012-01-03 10:55:45 UTC (rev 123909)
@@ -35,7 +35,7 @@
</td>
<td>
- <input class="form-element" type="submit" name="submit" value="Add" />
+ <input class="form-element" type="submit" name="submit" value="Add" />
</td>
</tr>
</table>
Modified: Products.PluggableAuthService/trunk/Products/PluggableAuthService/www/pasSearch.zpt
===================================================================
--- Products.PluggableAuthService/trunk/Products/PluggableAuthService/www/pasSearch.zpt 2012-01-03 10:54:48 UTC (rev 123908)
+++ Products.PluggableAuthService/trunk/Products/PluggableAuthService/www/pasSearch.zpt 2012-01-03 10:55:45 UTC (rev 123909)
@@ -40,7 +40,7 @@
<option value="id"> User ID </option>
</select>
</td>
- <td class="form-element">
+ <td class="form-element">
<input type="text" width="30" name="s_term" />
</td>
<td class="form-element">
Modified: Products.PluggableAuthService/trunk/Products/PluggableAuthService/www/two_lists.zpt
===================================================================
--- Products.PluggableAuthService/trunk/Products/PluggableAuthService/www/two_lists.zpt 2012-01-03 10:54:48 UTC (rev 123908)
+++ Products.PluggableAuthService/trunk/Products/PluggableAuthService/www/two_lists.zpt 2012-01-03 10:55:45 UTC (rev 123909)
@@ -46,17 +46,17 @@
multiple="multiple"
tal:attributes="name string:${left_name}:list" >
<option tal:repeat="item left_list"
- tal:attributes="value python:item[0]"
+ tal:attributes="value python:item[0]"
tal:content="python: item[1]"/>
</select>
</td>
<td align="center" valign="middle">
- <input type="image" src="arrow_right_gif"
+ <input type="image" src="arrow_right_gif"
width="29" height="30" border="0"
name="left_to_right:method"
tal:attributes="name string:${left_to_right}:method"/>
<br/><br/>
- <input type="image" src="arrow_left_gif"
+ <input type="image" src="arrow_left_gif"
width="29" height="30" border="0"
name="right_to_left:method"
tal:attributes="name string:${right_to_left}:method"/>
@@ -69,19 +69,19 @@
multiple="multiple"
tal:attributes="name string:${right_name}:list" >
<option tal:repeat="item right_list"
- tal:attributes="value python:item[0]"
+ tal:attributes="value python:item[0]"
tal:content="python: item[1]"/>
</select>
</td>
<td align="center" valign="middle"
tal:condition="right_is_ordered | nothing"
>
- <input type="image" src="arrow_up_gif"
+ <input type="image" src="arrow_up_gif"
width="29" height="30" border="0"
name="move_up:method"
tal:attributes="name string:${move_up}:method"/>
<br/><br/>
- <input type="image" src="arrow_down_gif"
+ <input type="image" src="arrow_down_gif"
width="29" height="30" border="0"
name="move_down:method"
tal:attributes="name string:${move_down}:method"/>
Modified: Products.PluggableAuthService/trunk/setup.py
===================================================================
--- Products.PluggableAuthService/trunk/setup.py 2012-01-03 10:54:48 UTC (rev 123908)
+++ Products.PluggableAuthService/trunk/setup.py 2012-01-03 10:55:45 UTC (rev 123909)
@@ -13,7 +13,7 @@
_boundary = '\n\n'
README = ( open('README.txt').read()
- + _boundary
+ + _boundary
+ open('CHANGES.txt').read()
)
More information about the checkins
mailing list