From c00577e5ddded5e53c9074da7def30bd9c350a1e Mon Sep 17 00:00:00 2001
From: James Moger <james.moger@gitblit.com>
Date: Mon, 30 Sep 2013 16:22:15 -0400
Subject: [PATCH] Remove trailing whitespace from unit tests

---
 src/test/java/com/gitblit/tests/X509UtilsTest.java |   63 ++++++++++++++++---------------
 1 files changed, 32 insertions(+), 31 deletions(-)

diff --git a/src/test/java/com/gitblit/tests/X509UtilsTest.java b/src/test/java/com/gitblit/tests/X509UtilsTest.java
index 5d17e18..668626b 100644
--- a/src/test/java/com/gitblit/tests/X509UtilsTest.java
+++ b/src/test/java/com/gitblit/tests/X509UtilsTest.java
@@ -39,18 +39,19 @@
 
 /**
  * Unit tests for X509 certificate generation.
- * 
+ *
  * @author James Moger
- * 
+ *
  */
 public class X509UtilsTest extends Assert {
-	
+
 	// passwords are case-sensitive and may be length-limited
 	// based on the JCE policy files
 	String caPassword = "aBcDeFg";
 	File folder = new File(System.getProperty("user.dir"), "x509test");
-	
+
 	X509Log log = new X509Log() {
+		@Override
 		public void log(String message) {
 			System.out.println(message);
 		}
@@ -62,69 +63,69 @@
 		X509Metadata goMetadata = new X509Metadata("localhost", caPassword);
 		X509Utils.prepareX509Infrastructure(goMetadata, folder, log);
 	}
-	
+
 	@After
 	public void cleanUp() throws Exception {
 		if (folder.exists()) {
 			FileUtils.delete(folder, FileUtils.RECURSIVE);
 		}
 	}
-	
+
 	@Test
-	public void testNewCA() throws Exception {		
+	public void testNewCA() throws Exception {
 		File storeFile = new File(folder, X509Utils.CA_KEY_STORE);
 		X509Utils.getPrivateKey(X509Utils.CA_ALIAS, storeFile, caPassword);
 		X509Certificate cert = X509Utils.getCertificate(X509Utils.CA_ALIAS, storeFile, caPassword);
 		assertEquals("O=Gitblit,OU=Gitblit,CN=Gitblit Certificate Authority", cert.getIssuerDN().getName());
-	}	
+	}
 
 	@Test
-	public void testCertificateUserMapping() throws Exception {		
+	public void testCertificateUserMapping() throws Exception {
 		File storeFile = new File(folder, X509Utils.CA_KEY_STORE);
 		PrivateKey caPrivateKey = X509Utils.getPrivateKey(X509Utils.CA_ALIAS, storeFile, caPassword);
 		X509Certificate caCert = X509Utils.getCertificate(X509Utils.CA_ALIAS, storeFile, caPassword);
-		
+
 		X509Metadata userMetadata = new X509Metadata("james", "james");
 		userMetadata.serverHostname = "www.myserver.com";
 		userMetadata.userDisplayname = "James Moger";
 		userMetadata.passwordHint = "your name";
 		userMetadata.oids.put("C",  "US");
-		
+
 		X509Certificate cert1 = X509Utils.newClientCertificate(userMetadata, caPrivateKey, caCert, storeFile.getParentFile());
 		UserModel userModel1 = HttpUtils.getUserModelFromCertificate(cert1);
 		assertEquals(userMetadata.commonName, userModel1.username);
 		assertEquals(userMetadata.emailAddress, userModel1.emailAddress);
 		assertEquals("C=US,O=Gitblit,OU=Gitblit,CN=james", cert1.getSubjectDN().getName());
-		
-		
+
+
 		X509Certificate cert2 = X509Utils.newClientCertificate(userMetadata, caPrivateKey, caCert, storeFile.getParentFile());
 		UserModel userModel2 = HttpUtils.getUserModelFromCertificate(cert2);
 		assertEquals(userMetadata.commonName, userModel2.username);
 		assertEquals(userMetadata.emailAddress, userModel2.emailAddress);
 		assertEquals("C=US,O=Gitblit,OU=Gitblit,CN=james", cert2.getSubjectDN().getName());
-		
+
 		assertNotSame("Serial numbers are the same!", cert1.getSerialNumber().longValue(), cert2.getSerialNumber().longValue());
 	}
-	
+
 	@Test
 	public void testUserBundle() throws Exception {
 		File storeFile = new File(folder, X509Utils.CA_KEY_STORE);
-		
+
 		X509Metadata userMetadata = new X509Metadata("james", "james");
-		userMetadata.serverHostname = "www.myserver.com";		
+		userMetadata.serverHostname = "www.myserver.com";
 		userMetadata.userDisplayname = "James Moger";
 		userMetadata.passwordHint = "your name";
 
 		File zip = X509Utils.newClientBundle(userMetadata, storeFile, caPassword, log);
 		assertTrue(zip.exists());
-		
+
 		List<String> expected = Arrays.asList(
 				userMetadata.commonName + ".pem",
 				userMetadata.commonName + ".p12",
 				userMetadata.commonName + ".cer",
 				"ca.cer",
 				"README.TXT");
-		
+
 		ZipInputStream zis = new ZipInputStream(new FileInputStream(zip));
 		ZipEntry entry = null;
 		while ((entry = zis.getNextEntry()) != null) {
@@ -132,49 +133,49 @@
 		}
 		zis.close();
 	}
-	
+
 	@Test
-	public void testCertificateRevocation() throws Exception {		
+	public void testCertificateRevocation() throws Exception {
 		File storeFile = new File(folder, X509Utils.CA_KEY_STORE);
 		PrivateKey caPrivateKey = X509Utils.getPrivateKey(X509Utils.CA_ALIAS, storeFile, caPassword);
 		X509Certificate caCert = X509Utils.getCertificate(X509Utils.CA_ALIAS, storeFile, caPassword);
-		
+
 		X509Metadata userMetadata = new X509Metadata("james", "james");
 		userMetadata.serverHostname = "www.myserver.com";
 		userMetadata.userDisplayname = "James Moger";
 		userMetadata.passwordHint = "your name";
-		
+
 		// generate a new client certificate
 		X509Certificate cert1 = X509Utils.newClientCertificate(userMetadata, caPrivateKey, caCert, storeFile.getParentFile());
-		
+
 		// confirm this certificate IS NOT revoked
 		File caRevocationList = new File(folder, X509Utils.CA_REVOCATION_LIST);
 		assertFalse(X509Utils.isRevoked(cert1, caRevocationList));
-		
+
 		// revoke certificate and then confirm it IS revoked
 		X509Utils.revoke(cert1, RevocationReason.ACompromise, caRevocationList, storeFile, caPassword, log);
 		assertTrue(X509Utils.isRevoked(cert1, caRevocationList));
-		
+
 		// generate a second certificate
 		X509Certificate cert2 = X509Utils.newClientCertificate(userMetadata, caPrivateKey, caCert, storeFile.getParentFile());
-		
+
 		// confirm second certificate IS NOT revoked
 		assertTrue(X509Utils.isRevoked(cert1, caRevocationList));
 		assertFalse(X509Utils.isRevoked(cert2, caRevocationList));
-		
+
 		// revoke second certificate and then confirm it IS revoked
 		X509Utils.revoke(cert2, RevocationReason.ACompromise, caRevocationList, caPrivateKey, log);
 		assertTrue(X509Utils.isRevoked(cert1, caRevocationList));
 		assertTrue(X509Utils.isRevoked(cert2, caRevocationList));
-		
+
 		// generate a third certificate
 		X509Certificate cert3 = X509Utils.newClientCertificate(userMetadata, caPrivateKey, caCert, storeFile.getParentFile());
-		
+
 		// confirm third certificate IS NOT revoked
 		assertTrue(X509Utils.isRevoked(cert1, caRevocationList));
 		assertTrue(X509Utils.isRevoked(cert2, caRevocationList));
 		assertFalse(X509Utils.isRevoked(cert3, caRevocationList));
-		
+
 		// revoke third certificate and then confirm it IS revoked
 		X509Utils.revoke(cert3, RevocationReason.ACompromise, caRevocationList, caPrivateKey, log);
 		assertTrue(X509Utils.isRevoked(cert1, caRevocationList));

--
Gitblit v1.9.1