directory-commits mailing list archives

Site index · List index
Message view « Date » · « Thread »
Top « Date » · « Thread »
From elecha...@apache.org
Subject [2/5] directory-fortress-core git commit: Replaced tabs by spaces
Date Tue, 19 May 2015 11:30:21 GMT
http://git-wip-us.apache.org/repos/asf/directory-fortress-core/blob/f02712d4/src/test/java/org/apache/directory/fortress/core/DelegatedAccessMgrConsole.java
----------------------------------------------------------------------
diff --git a/src/test/java/org/apache/directory/fortress/core/DelegatedAccessMgrConsole.java b/src/test/java/org/apache/directory/fortress/core/DelegatedAccessMgrConsole.java
index 946e9a2..afa2c40 100755
--- a/src/test/java/org/apache/directory/fortress/core/DelegatedAccessMgrConsole.java
+++ b/src/test/java/org/apache/directory/fortress/core/DelegatedAccessMgrConsole.java
@@ -19,6 +19,7 @@
  */
 package org.apache.directory.fortress.core;
 
+
 import org.apache.directory.fortress.core.rbac.Permission;
 import org.apache.directory.fortress.core.rbac.Role;
 import org.apache.directory.fortress.core.rbac.TestUtils;
@@ -42,25 +43,27 @@ import java.util.List;
  */
 class DelegatedAccessMgrConsole
 {
-	private DelAccessMgr dAmgr = null;
+    private DelAccessMgr dAmgr = null;
     private Session session = null;
     private static final String CLS_NM = DelegatedAccessMgrConsole.class.getName();
     private static final Logger LOG = LoggerFactory.getLogger( CLS_NM );
 
-	/**
-	 * put your documentation comment here
-	 */
-	public DelegatedAccessMgrConsole()
-	{
-		try
-		{
-			dAmgr = DelAccessMgrFactory.createInstance(TestUtils.getContext());
-		}
-		catch ( org.apache.directory.fortress.core.SecurityException e)
-		{
-            LOG.error(" constructor caught SecurityException rc=" + e.getErrorId() + ", msg=" + e.getMessage(), e);
-		}
-	}
+
+    /**
+     * put your documentation comment here
+     */
+    public DelegatedAccessMgrConsole()
+    {
+        try
+        {
+            dAmgr = DelAccessMgrFactory.createInstance( TestUtils.getContext() );
+        }
+        catch ( org.apache.directory.fortress.core.SecurityException e )
+        {
+            LOG.error( " constructor caught SecurityException rc=" + e.getErrorId() + ", msg=" + e.getMessage(), e );
+        }
+    }
+
 
     /**
      *
@@ -70,17 +73,18 @@ class DelegatedAccessMgrConsole
         try
         {
             ReaderUtil.clearScreen();
-            System.out.println("Enter userId:");
-            User user = new User(ReaderUtil.readLn());
-            System.out.println("Enter role name:");
-            Role role = new Role(ReaderUtil.readLn());
-            boolean result = dAmgr.canAssign(session, user, role);
-            System.out.println("Can Assign User [" + user.getUserId() + "] Role [" + role.getName() + "] return [" + result + "]");
-            System.out.println("ENTER to continue");
+            System.out.println( "Enter userId:" );
+            User user = new User( ReaderUtil.readLn() );
+            System.out.println( "Enter role name:" );
+            Role role = new Role( ReaderUtil.readLn() );
+            boolean result = dAmgr.canAssign( session, user, role );
+            System.out.println( "Can Assign User [" + user.getUserId() + "] Role [" + role.getName() + "] return ["
+                + result + "]" );
+            System.out.println( "ENTER to continue" );
         }
-        catch (SecurityException e)
+        catch ( SecurityException e )
         {
-            LOG.error("canAssign caught SecurityException rc=" + e.getErrorId() + ", msg=" + e.getMessage(), e);
+            LOG.error( "canAssign caught SecurityException rc=" + e.getErrorId() + ", msg=" + e.getMessage(), e );
         }
         ReaderUtil.readChar();
     }
@@ -91,17 +95,18 @@ class DelegatedAccessMgrConsole
         try
         {
             ReaderUtil.clearScreen();
-            System.out.println("Enter userId:");
-            User user = new User(ReaderUtil.readLn());
-            System.out.println("Enter role name:");
-            Role role = new Role(ReaderUtil.readLn());
-            boolean result = dAmgr.canDeassign(session, user, role);
-            System.out.println("Can Deassign User [" + user.getUserId() + "] Role [" + role.getName() + "] return [" + result + "]");
-            System.out.println("ENTER to continue");
+            System.out.println( "Enter userId:" );
+            User user = new User( ReaderUtil.readLn() );
+            System.out.println( "Enter role name:" );
+            Role role = new Role( ReaderUtil.readLn() );
+            boolean result = dAmgr.canDeassign( session, user, role );
+            System.out.println( "Can Deassign User [" + user.getUserId() + "] Role [" + role.getName() + "] return ["
+                + result + "]" );
+            System.out.println( "ENTER to continue" );
         }
-        catch (SecurityException e)
+        catch ( SecurityException e )
         {
-            LOG.error("canDeassign caught SecurityException rc=" + e.getErrorId() + ", msg=" + e.getMessage(), e);
+            LOG.error( "canDeassign caught SecurityException rc=" + e.getErrorId() + ", msg=" + e.getMessage(), e );
         }
         ReaderUtil.readChar();
     }
@@ -112,17 +117,18 @@ class DelegatedAccessMgrConsole
         try
         {
             ReaderUtil.clearScreen();
-            System.out.println("Enter role name:");
-            Role role = new Role(ReaderUtil.readLn());
-            System.out.println("Enter perm object name:");
+            System.out.println( "Enter role name:" );
+            Role role = new Role( ReaderUtil.readLn() );
+            System.out.println( "Enter perm object name:" );
             String objName = ReaderUtil.readLn();
-            boolean result = dAmgr.canGrant(session, role, new Permission(objName));
-            System.out.println("Can Assign Role [" + role.getName() + "] Object name [" + objName + "] return [" + result + "]");
-            System.out.println("ENTER to continue");
+            boolean result = dAmgr.canGrant( session, role, new Permission( objName ) );
+            System.out.println( "Can Assign Role [" + role.getName() + "] Object name [" + objName + "] return ["
+                + result + "]" );
+            System.out.println( "ENTER to continue" );
         }
-        catch (SecurityException e)
+        catch ( SecurityException e )
         {
-            LOG.error("canGrant caught SecurityException rc=" + e.getErrorId() + ", msg=" + e.getMessage(), e);
+            LOG.error( "canGrant caught SecurityException rc=" + e.getErrorId() + ", msg=" + e.getMessage(), e );
         }
         ReaderUtil.readChar();
     }
@@ -133,17 +139,18 @@ class DelegatedAccessMgrConsole
         try
         {
             ReaderUtil.clearScreen();
-            System.out.println("Enter role name:");
-            Role role = new Role(ReaderUtil.readLn());
-            System.out.println("Enter perm object name:");
+            System.out.println( "Enter role name:" );
+            Role role = new Role( ReaderUtil.readLn() );
+            System.out.println( "Enter perm object name:" );
             String objName = ReaderUtil.readLn();
-            boolean result = dAmgr.canRevoke(session, role, new Permission(objName));
-            System.out.println("Can Revoke Role [" + role.getName() + "] Object name [" + objName + "] return [" + result + "]");
-            System.out.println("ENTER to continue");
+            boolean result = dAmgr.canRevoke( session, role, new Permission( objName ) );
+            System.out.println( "Can Revoke Role [" + role.getName() + "] Object name [" + objName + "] return ["
+                + result + "]" );
+            System.out.println( "ENTER to continue" );
         }
-        catch (SecurityException e)
+        catch ( SecurityException e )
         {
-            LOG.error("canRevoke caught SecurityException rc=" + e.getErrorId() + ", msg=" + e.getMessage(), e);
+            LOG.error( "canRevoke caught SecurityException rc=" + e.getErrorId() + ", msg=" + e.getMessage(), e );
         }
         ReaderUtil.readChar();
     }
@@ -157,20 +164,20 @@ class DelegatedAccessMgrConsole
         try
         {
             ReaderUtil.clearScreen();
-            System.out.println("Enter userId:");
+            System.out.println( "Enter userId:" );
             String userId = ReaderUtil.readLn();
-            System.out.println("Enter password:");
+            System.out.println( "Enter password:" );
             String password = ReaderUtil.readLn();
             session = new Session();
             //((AccessMgr)dAmgr).createSession(session, userId, password);
-            ((AccessMgr)dAmgr).createSession(new User(userId, password.toCharArray()), false);
-            System.out.println("Session created successfully for userId [" + userId + "]");
-            System.out.println("session [" + session + "]");
-            System.out.println("ENTER to continue");
+            ( ( AccessMgr ) dAmgr ).createSession( new User( userId, password.toCharArray() ), false );
+            System.out.println( "Session created successfully for userId [" + userId + "]" );
+            System.out.println( "session [" + session + "]" );
+            System.out.println( "ENTER to continue" );
         }
-        catch (SecurityException e)
+        catch ( SecurityException e )
         {
-            LOG.error("createSession caught SecurityException rc=" + e.getErrorId() + ", msg=" + e.getMessage(), e);
+            LOG.error( "createSession caught SecurityException rc=" + e.getErrorId() + ", msg=" + e.getMessage(), e );
         }
         ReaderUtil.readChar();
     }
@@ -181,105 +188,108 @@ class DelegatedAccessMgrConsole
         try
         {
             ReaderUtil.clearScreen();
-            System.out.println("Enter userId:");
+            System.out.println( "Enter userId:" );
             String userId = ReaderUtil.readLn();
-            session = ((AccessMgr)dAmgr).createSession(new User(userId), true);
-            System.out.println("Trusted Session created successfully for userId [" + userId + "]");
-            System.out.println("session [" + session + "]");
-            System.out.println("ENTER to continue");
+            session = ( ( AccessMgr ) dAmgr ).createSession( new User( userId ), true );
+            System.out.println( "Trusted Session created successfully for userId [" + userId + "]" );
+            System.out.println( "session [" + session + "]" );
+            System.out.println( "ENTER to continue" );
         }
-        catch (SecurityException e)
+        catch ( SecurityException e )
         {
-            LOG.error("createSessionTrusted caught SecurityException rc=" + e.getErrorId() + ", msg=" + e.getMessage(), e);
+            LOG.error(
+                "createSessionTrusted caught SecurityException rc=" + e.getErrorId() + ", msg=" + e.getMessage(), e );
         }
         ReaderUtil.readChar();
     }
 
 
-
     void checkAccess()
     {
         try
         {
-            VUtil.assertNotNull(session, GlobalErrIds.USER_SESS_NULL, ".checkAccess");
+            VUtil.assertNotNull( session, GlobalErrIds.USER_SESS_NULL, ".checkAccess" );
             ReaderUtil.clearScreen();
-            System.out.println("Enter object name:");
+            System.out.println( "Enter object name:" );
             String objName = ReaderUtil.readLn();
-            System.out.println("Enter operation name:");
+            System.out.println( "Enter operation name:" );
             String opName = ReaderUtil.readLn();
-            boolean result = dAmgr.checkAccess(session, new Permission(objName, opName));
-            System.out.println("CheckAccess return [" + result + "] for user [" + session.getUserId() + "] objName [" + objName + "] operationName [" + opName + "]");
-            System.out.println("ENTER to continue");
+            boolean result = dAmgr.checkAccess( session, new Permission( objName, opName ) );
+            System.out.println( "CheckAccess return [" + result + "] for user [" + session.getUserId() + "] objName ["
+                + objName + "] operationName [" + opName + "]" );
+            System.out.println( "ENTER to continue" );
         }
-        catch (SecurityException e)
+        catch ( SecurityException e )
         {
-            LOG.error("checkAccess caught SecurityException rc=" + e.getErrorId() + ", msg=" + e.getMessage(), e);
+            LOG.error( "checkAccess caught SecurityException rc=" + e.getErrorId() + ", msg=" + e.getMessage(), e );
         }
         ReaderUtil.readChar();
     }
 
+
     void sessionPermissions()
     {
         try
         {
-            VUtil.assertNotNull(session, GlobalErrIds.USER_SESS_NULL, "DelegatedAccessMgrConsole.sessionPermissions");
+            VUtil.assertNotNull( session, GlobalErrIds.USER_SESS_NULL, "DelegatedAccessMgrConsole.sessionPermissions" );
             ReaderUtil.clearScreen();
-            List<Permission> list = dAmgr.sessionPermissions(session);
-            if (list != null)
+            List<Permission> list = dAmgr.sessionPermissions( session );
+            if ( list != null )
             {
-                Collections.sort(list, new Comparator<Permission>()
+                Collections.sort( list, new Comparator<Permission>()
                 {
                     @Override
-                    public int compare(Permission p1, Permission p2)
+                    public int compare( Permission p1, Permission p2 )
                     {
                         return p1.getAbstractName().compareTo( p2.getAbstractName() );
                     }
-                });
+                } );
                 int i = 0;
-                for (Permission pe : list)
+                for ( Permission pe : list )
                 {
                     //pe = (Permission) list.get(i);
-                    System.out.println("**perm:" + (i++) + "***");
-                    System.out.println("object name [" + pe.getObjName() + "]");
-                    System.out.println("object id [" + pe.getObjId() + "]");
-                    System.out.println("operation name [" + pe.getOpName() + "]");
-                    System.out.println("abstract perm name [" + pe.getAbstractName() + "]");
-                    System.out.println("internalId [" + pe.getInternalId() + "]");
-                    if (pe.getUsers() != null && pe.getUsers().size() > 0)
+                    System.out.println( "**perm:" + ( i++ ) + "***" );
+                    System.out.println( "object name [" + pe.getObjName() + "]" );
+                    System.out.println( "object id [" + pe.getObjId() + "]" );
+                    System.out.println( "operation name [" + pe.getOpName() + "]" );
+                    System.out.println( "abstract perm name [" + pe.getAbstractName() + "]" );
+                    System.out.println( "internalId [" + pe.getInternalId() + "]" );
+                    if ( pe.getUsers() != null && pe.getUsers().size() > 0 )
                     {
                         int ctr = 0;
-                        for (String user : pe.getUsers())
+                        for ( String user : pe.getUsers() )
                         {
-                            System.out.println("user[" + ctr++ + "]=" + user);
+                            System.out.println( "user[" + ctr++ + "]=" + user );
                         }
                     }
-                    if (pe.getRoles() != null && pe.getRoles().size() > 0)
+                    if ( pe.getRoles() != null && pe.getRoles().size() > 0 )
                     {
                         int ctr = 0;
-                        for (String role : pe.getRoles())
+                        for ( String role : pe.getRoles() )
                         {
-                            System.out.println("name[" + ctr++ + "]=" + role);
+                            System.out.println( "name[" + ctr++ + "]=" + role );
                         }
                     }
-                    if (pe.getProperties() != null && pe.getProperties().size() > 0)
+                    if ( pe.getProperties() != null && pe.getProperties().size() > 0 )
                     {
                         int ctr = 0;
-                        for (Enumeration e = pe.getProperties().propertyNames(); e.hasMoreElements();)
+                        for ( Enumeration e = pe.getProperties().propertyNames(); e.hasMoreElements(); )
                         {
-                            String key = (String) e.nextElement();
-                            String val = pe.getProperty(key);
-                            System.out.println("prop key[" + ctr + "]=" + key);
-                            System.out.println("prop value[" + ctr++ + "]=" + val);
+                            String key = ( String ) e.nextElement();
+                            String val = pe.getProperty( key );
+                            System.out.println( "prop key[" + ctr + "]=" + key );
+                            System.out.println( "prop value[" + ctr++ + "]=" + val );
                         }
                     }
-                    System.out.println("**");
+                    System.out.println( "**" );
                 }
             }
-            System.out.println("ENTER to continue");
+            System.out.println( "ENTER to continue" );
         }
-        catch (SecurityException e)
+        catch ( SecurityException e )
         {
-            LOG.error("sessionPermissions caught SecurityException rc=" + e.getErrorId() + ", msg=" + e.getMessage(), e);
+            LOG.error( "sessionPermissions caught SecurityException rc=" + e.getErrorId() + ", msg=" + e.getMessage(),
+                e );
         }
         ReaderUtil.readChar();
     }

http://git-wip-us.apache.org/repos/asf/directory-fortress-core/blob/f02712d4/src/test/java/org/apache/directory/fortress/core/DelegatedReviewMgrConsole.java
----------------------------------------------------------------------
diff --git a/src/test/java/org/apache/directory/fortress/core/DelegatedReviewMgrConsole.java b/src/test/java/org/apache/directory/fortress/core/DelegatedReviewMgrConsole.java
index f5b17cf..4b138f6 100755
--- a/src/test/java/org/apache/directory/fortress/core/DelegatedReviewMgrConsole.java
+++ b/src/test/java/org/apache/directory/fortress/core/DelegatedReviewMgrConsole.java
@@ -19,6 +19,7 @@
  */
 package org.apache.directory.fortress.core;
 
+
 import org.apache.directory.fortress.core.rbac.AdminRole;
 import org.apache.directory.fortress.core.rbac.TestUtils;
 import org.apache.directory.fortress.core.rbac.UserAdminRole;
@@ -29,6 +30,7 @@ import org.slf4j.LoggerFactory;
 
 import java.util.List;
 
+
 /**
  * Description of the Class
  *
@@ -39,6 +41,8 @@ class DelegatedReviewMgrConsole
     private DelReviewMgr rm;
     private static final String CLS_NM = DelegatedReviewMgrConsole.class.getName();
     private static final Logger LOG = LoggerFactory.getLogger( CLS_NM );
+
+
     /**
      * Constructor for the ReviewMgrConsole object
      */
@@ -48,12 +52,13 @@ class DelegatedReviewMgrConsole
         {
             rm = DelReviewMgrFactory.createInstance( TestUtils.getContext() );
         }
-        catch ( org.apache.directory.fortress.core.SecurityException e)
+        catch ( org.apache.directory.fortress.core.SecurityException e )
         {
-            LOG.error(" constructor caught SecurityException rc=" + e.getErrorId() + ", msg=" + e.getMessage(), e);
+            LOG.error( " constructor caught SecurityException rc=" + e.getErrorId() + ", msg=" + e.getMessage(), e );
         }
     }
 
+
     /**
      *
      */
@@ -62,29 +67,29 @@ class DelegatedReviewMgrConsole
         ReaderUtil.clearScreen();
         try
         {
-            System.out.println("Enter AdminRole name to read:");
+            System.out.println( "Enter AdminRole name to read:" );
             AdminRole role = new AdminRole();
-            role.setName(ReaderUtil.readLn());
-            AdminRole re = rm.readRole(role);
-            if (re != null)
+            role.setName( ReaderUtil.readLn() );
+            AdminRole re = rm.readRole( role );
+            if ( re != null )
             {
-                System.out.println("ADMIN ROLE OBJECT:");
-                System.out.println("    name      [" + re.getName() + "]");
-                System.out.println("    internalId  [" + re.getId() + "]");
-                System.out.println("    description [" + re.getDescription() + "]");
-                System.out.println("    osU [" + re.getOsU() + "]");
-                System.out.println("    osP [" + re.getOsP() + "]");
-                ReviewMgrConsole.printTemporal(re, "ADMINROLE");
+                System.out.println( "ADMIN ROLE OBJECT:" );
+                System.out.println( "    name      [" + re.getName() + "]" );
+                System.out.println( "    internalId  [" + re.getId() + "]" );
+                System.out.println( "    description [" + re.getDescription() + "]" );
+                System.out.println( "    osU [" + re.getOsU() + "]" );
+                System.out.println( "    osP [" + re.getOsP() + "]" );
+                ReviewMgrConsole.printTemporal( re, "ADMINROLE" );
             }
             else
             {
-                System.out.println("	name [" + role.getName() + "] was not found");
+                System.out.println( "    name [" + role.getName() + "] was not found" );
             }
-            System.out.println("ENTER to continue");
+            System.out.println( "ENTER to continue" );
         }
-        catch (SecurityException e)
+        catch ( SecurityException e )
         {
-            LOG.error("readRole caught SecurityException rc=" + e.getErrorId() + ", msg=" + e.getMessage(), e);
+            LOG.error( "readRole caught SecurityException rc=" + e.getErrorId() + ", msg=" + e.getMessage(), e );
         }
         ReaderUtil.readChar();
     }
@@ -95,32 +100,32 @@ class DelegatedReviewMgrConsole
         ReaderUtil.clearScreen();
         try
         {
-            System.out.println("Enter value to search AdminRoles with:");
+            System.out.println( "Enter value to search AdminRoles with:" );
             String val = ReaderUtil.readLn();
-            List<AdminRole> list = rm.findRoles(val);
-            if (list != null && list.size() > 0)
+            List<AdminRole> list = rm.findRoles( val );
+            if ( list != null && list.size() > 0 )
             {
-                for (int i = 0; i < list.size(); i++)
+                for ( int i = 0; i < list.size(); i++ )
                 {
-                    AdminRole re = list.get(i);
-                    System.out.println("ADMIN ROLE OBJECT [" + i + "]:");
-                    System.out.println("    name      [" + re.getName() + "]");
-                    System.out.println("    internalId  [" + re.getId() + "]");
-                    System.out.println("    description [" + re.getDescription() + "]");
-                    System.out.println("    osU [" + re.getOsU() + "]");
-                    System.out.println("    osP [" + re.getOsP() + "]");
-                    ReviewMgrConsole.printTemporal(re, "ADMINROLE");
+                    AdminRole re = list.get( i );
+                    System.out.println( "ADMIN ROLE OBJECT [" + i + "]:" );
+                    System.out.println( "    name      [" + re.getName() + "]" );
+                    System.out.println( "    internalId  [" + re.getId() + "]" );
+                    System.out.println( "    description [" + re.getDescription() + "]" );
+                    System.out.println( "    osU [" + re.getOsU() + "]" );
+                    System.out.println( "    osP [" + re.getOsP() + "]" );
+                    ReviewMgrConsole.printTemporal( re, "ADMINROLE" );
                 }
             }
             else
             {
-                System.out.println("name [" + val + "] was not found");
+                System.out.println( "name [" + val + "] was not found" );
             }
-            System.out.println("ENTER to continue");
+            System.out.println( "ENTER to continue" );
         }
-        catch (SecurityException e)
+        catch ( SecurityException e )
         {
-            LOG.error("findRoles caught SecurityException rc=" + e.getErrorId() + ", msg=" + e.getMessage(), e);
+            LOG.error( "findRoles caught SecurityException rc=" + e.getErrorId() + ", msg=" + e.getMessage(), e );
         }
         ReaderUtil.readChar();
     }
@@ -133,31 +138,32 @@ class DelegatedReviewMgrConsole
     {
         try
         {
-            System.out.println("Enter admin role name:");
+            System.out.println( "Enter admin role name:" );
             String name = ReaderUtil.readLn();
-            List<User> list = rm.assignedUsers(new AdminRole(name));
+            List<User> list = rm.assignedUsers( new AdminRole( name ) );
             int i = 0;
-            for (User ue : list)
+            for ( User ue : list )
             {
-                System.out.println("USER[" + ++i + "]");
-                System.out.println("    userId      [" + ue.getUserId() + "]");
-                System.out.println("    internalId  [" + ue.getInternalId() + "]");
-                System.out.println("    description [" + ue.getDescription() + "]");
-                System.out.println("    common name [" + ue.getCn() + "]");
-                System.out.println("    surname     [" + ue.getSn() + "]");
-                System.out.println("    orgUnitId   [" + ue.getOu() + "]");
-                ReviewMgrConsole.printTemporal(ue, "USER");
+                System.out.println( "USER[" + ++i + "]" );
+                System.out.println( "    userId      [" + ue.getUserId() + "]" );
+                System.out.println( "    internalId  [" + ue.getInternalId() + "]" );
+                System.out.println( "    description [" + ue.getDescription() + "]" );
+                System.out.println( "    common name [" + ue.getCn() + "]" );
+                System.out.println( "    surname     [" + ue.getSn() + "]" );
+                System.out.println( "    orgUnitId   [" + ue.getOu() + "]" );
+                ReviewMgrConsole.printTemporal( ue, "USER" );
                 System.out.println();
             }
-            System.out.println("ENTER to continue");
+            System.out.println( "ENTER to continue" );
         }
-        catch (SecurityException e)
+        catch ( SecurityException e )
         {
-            LOG.error("assignedUsers caught SecurityException rc=" + e.getErrorId() + ", msg=" + e.getMessage(), e);
+            LOG.error( "assignedUsers caught SecurityException rc=" + e.getErrorId() + ", msg=" + e.getMessage(), e );
         }
         ReaderUtil.readChar();
     }
 
+
     /**
      *
      */
@@ -168,24 +174,24 @@ class DelegatedReviewMgrConsole
         ReaderUtil.clearScreen();
         try
         {
-            System.out.println("Enter UserId to read admin roles:");
+            System.out.println( "Enter UserId to read admin roles:" );
             userId = ReaderUtil.readLn();
             User user = new User();
-            user.setUserId(userId);
-            List<UserAdminRole> roles = rm.assignedRoles(user);
-            for(UserAdminRole re : roles)
+            user.setUserId( userId );
+            List<UserAdminRole> roles = rm.assignedRoles( user );
+            for ( UserAdminRole re : roles )
             {
-                System.out.println("USER OBJECT:");
-                System.out.println("    admin role  [" + re.getName() + "]");
-                System.out.println("    OsU         [" + re.getOsU() + "]");
-                System.out.println("    OsP         [" + re.getOsP() + "]");
-                ReviewMgrConsole.printTemporal(re, "ADMINROLE");
+                System.out.println( "USER OBJECT:" );
+                System.out.println( "    admin role  [" + re.getName() + "]" );
+                System.out.println( "    OsU         [" + re.getOsU() + "]" );
+                System.out.println( "    OsP         [" + re.getOsP() + "]" );
+                ReviewMgrConsole.printTemporal( re, "ADMINROLE" );
             }
-            System.out.println("ENTER to continue");
+            System.out.println( "ENTER to continue" );
         }
-        catch (SecurityException e)
+        catch ( SecurityException e )
         {
-            LOG.error("assignedRoles caught SecurityException rc=" + e.getErrorId() + ", msg=" + e.getMessage(), e);
+            LOG.error( "assignedRoles caught SecurityException rc=" + e.getErrorId() + ", msg=" + e.getMessage(), e );
         }
         ReaderUtil.readChar();
     }

http://git-wip-us.apache.org/repos/asf/directory-fortress-core/blob/f02712d4/src/test/java/org/apache/directory/fortress/core/FortressConsole.java
----------------------------------------------------------------------
diff --git a/src/test/java/org/apache/directory/fortress/core/FortressConsole.java b/src/test/java/org/apache/directory/fortress/core/FortressConsole.java
index f4db6dd..a17de4a 100755
--- a/src/test/java/org/apache/directory/fortress/core/FortressConsole.java
+++ b/src/test/java/org/apache/directory/fortress/core/FortressConsole.java
@@ -19,6 +19,7 @@
  */
 package org.apache.directory.fortress.core;
 
+
 /**
  *  Description of the Class
  *
@@ -27,15 +28,14 @@ package org.apache.directory.fortress.core;
 public class FortressConsole
 {
 
-	/**
-	 * put your documentation comment here
-	 *
-	 * @param  args
-	 */
-	public static void main(String[] args)
-	{
-		ProcessMenuCommand rc = new ProcessMenuCommand();
-		rc.processRbacControl();
-	}
+    /**
+     * put your documentation comment here
+     *
+     * @param  args
+     */
+    public static void main( String[] args )
+    {
+        ProcessMenuCommand rc = new ProcessMenuCommand();
+        rc.processRbacControl();
+    }
 }
-

http://git-wip-us.apache.org/repos/asf/directory-fortress-core/blob/f02712d4/src/test/java/org/apache/directory/fortress/core/PolicyMgrConsole.java
----------------------------------------------------------------------
diff --git a/src/test/java/org/apache/directory/fortress/core/PolicyMgrConsole.java b/src/test/java/org/apache/directory/fortress/core/PolicyMgrConsole.java
index 9fcf7ed..10e7f52 100755
--- a/src/test/java/org/apache/directory/fortress/core/PolicyMgrConsole.java
+++ b/src/test/java/org/apache/directory/fortress/core/PolicyMgrConsole.java
@@ -19,57 +19,60 @@
  */
 package org.apache.directory.fortress.core;
 
+
 import org.apache.directory.fortress.core.rbac.PwPolicy;
 import org.apache.directory.fortress.core.rbac.TestUtils;
 import org.slf4j.Logger;
 import org.slf4j.LoggerFactory;
 
+
 class PolicyMgrConsole
 {
-	private PwPolicyMgr pm = null;
-	final private static String PWDATTRIBUTE = "This attribute contains the name of the attribute to which the password policy is applied. For example, the password policy may be  applied  to the userPassword attribute. \n Note:  in this implementation, the only value accepted for pwdAttribute is  userPassword .";
-	final private static String PWDMINAGE = "This attribute contains the number of seconds that must elapse  between modifications allowed  to  the	password.  If  this  attribute	is not present, zero seconds is assumed (i.e. the  password  may  be  modified whenever and however often is desired).";
-	final private static String PWDMAXAGE = "This attribute contains the number of seconds after which a modified password will expire.  If this attribute is not present, or if its value is zero (0), then passwords will not expire.";
-	final private static String PWDINHISTORY = "This  attribute is used to specify the maximum number of used passwords that will be stored in the pwdHistory attribute.  If  the  pwdInHistory attribute  is  not present, or if its value is zero (0), used passwords will not be stored in pwdHistory and thus any previously-used password may be reused.";
-	final private static String PWDCHECKQUALITY = "This attribute	indicates if and how password syntax will be checked while a password is being modified or added. If this attribute is not present, or its value is zero (0), no syntax checking will be done. If its value is one (1), the server will check the syntax, and if the server is unable to check the syntax, whether due to a client-side hashed password or some other reason, it will be accepted. If its value is two (2), the server will check the syntax, and if the server is unable to check the syntax it will return an error refusing the pass-word.";
-	final private static String PWDMINLENGTH = "When syntax checking is enabled (see also the	pwdCheckSyntax attribute), this attribute contains the minimum number of characters that  will be accepted in a password. If this attribute is not present,minimum password length is not enforced. If the server is unable to check  the  length of the password, whether due to a client-side hashed password or some other reason, the server will, depending on the value of  pwdCheckSyntax,  either accept the password without checking it (if pwdCheckSyntax is zero (0) or one (1)) or refuse it (if pwdCheckSyntax is two (2)).";
-	final private static String PWDEXPIREWARNING = "This attribute contains the maximum number of seconds before a password is due to expire that expiration warning messages will be returned to a user  who is authenticating to the directory.  If this attribute is not present, or if the value is zero (0), no warnings will be sent.";
-	final private static String PWDGRACELOGINLIMIT = "This attribute contains the number of times that  an  expired  password may be used to authenticate a user to the directory. If this attribute is not present or if its value is zero (0), users with expired passwords will not be allowed to authenticate to the directory.";
-	final private static String PWDLOCKOUT = "This attribute specifies the action that should be taken by the directory when a user has made a number of failed attempts to authenticate to the directory. If pwdLockout is set (its value is TRUE), the user will not be allowed to attempt to authenticate to the directory after there have been a specified number of consecutive failed bind attempts. The maximum number of consecutive failed bind attempts allowed is specified by the pwdMaxFailure attribute. If pwdLockout is not present, or if its value is FALSE, the password may be used to authenticate no matter how many consecutive failed bind attempts have been made.";
-	final private static String PWDLOCKOUTDURATION = "This attribute contains the number of seconds during which the password cannot be used to authenticate the user to the directory due to too many  consecutive  failed bind attempts.  (See also pwdLockout and pwd-MaxFailure.)  If pwdLockoutDuration is not present, or if its value is zero  (0),  the password cannot be used to authenticate the user to the directory again until it is reset by an administrator.";
-	final private static String PWDMAXFAILURE = "This attribute contains the number of consecutive failed bind attempts after which the password may not be used to authenticate a user to the directory.  If pwdMaxFailure is not present, or its value is zero (0), then a user will be allowed to continue to attempt to authenticate to the directory, no matter how many consecutive failed bind attempts have occurred with that user's DN. (See also pwdLockout and pwdLockoutDuration.)";
-	final private static String PWDFAILURECOUNTINTERVAL = "This attribute contains the number of seconds after which old consecutive failed bind attempts are purged from the failure counter, even though no  successful  authentication  has  occurred.  If  pwdFailure-CountInterval is not present, or its value is zero (0), the failure counter will only be reset by a successful authentication.";
-	final private static String PWDMUSTCHANGE = "This attribute specifies whether users must change their passwords when they first bind to the directory after a password is set or reset by the administrator, or not.  If pwdMustChange has a value of TRUE, users must change their passwords when they first bind to the directory after a password is set or reset by the administrator.  If pwd-MustChange is not present, or its value is FALSE, users are not required to change their password upon binding after the administrator sets or resets the password.";
-	final private static String PWDALLOWUSERCHANGE = "This attribute specifies whether users are allowed to change their own passwords or not.  If pwdAllowUserChange is set to TRUE, or if the attribute is  not  present, users will be allowed to change their own passwords.  If its value is FALSE, users will not be allowed to change their own passwords.";
-	final private static String PWDSAFEMODIFY = "This attribute denotes whether the user's existing password must be sent along with their new password when changing a password. If pwd-SafeModify is set to TRUE, the existing password must be sent along with the new password.  If the attribute is not present, or its value is  FALSE,  the existing password need not be sent along with the new password.";
+    private PwPolicyMgr pm = null;
+    final private static String PWDATTRIBUTE = "This attribute contains the name of the attribute to which the password policy is applied. For example, the password policy may be  applied  to the userPassword attribute. \n Note:  in this implementation, the only value accepted for pwdAttribute is  userPassword .";
+    final private static String PWDMINAGE = "This attribute contains the number of seconds that must elapse  between modifications allowed  to  the    password.  If  this  attribute    is not present, zero seconds is assumed (i.e. the  password  may  be  modified whenever and however often is desired).";
+    final private static String PWDMAXAGE = "This attribute contains the number of seconds after which a modified password will expire.  If this attribute is not present, or if its value is zero (0), then passwords will not expire.";
+    final private static String PWDINHISTORY = "This  attribute is used to specify the maximum number of used passwords that will be stored in the pwdHistory attribute.  If  the  pwdInHistory attribute  is  not present, or if its value is zero (0), used passwords will not be stored in pwdHistory and thus any previously-used password may be reused.";
+    final private static String PWDCHECKQUALITY = "This attribute    indicates if and how password syntax will be checked while a password is being modified or added. If this attribute is not present, or its value is zero (0), no syntax checking will be done. If its value is one (1), the server will check the syntax, and if the server is unable to check the syntax, whether due to a client-side hashed password or some other reason, it will be accepted. If its value is two (2), the server will check the syntax, and if the server is unable to check the syntax it will return an error refusing the pass-word.";
+    final private static String PWDMINLENGTH = "When syntax checking is enabled (see also the    pwdCheckSyntax attribute), this attribute contains the minimum number of characters that  will be accepted in a password. If this attribute is not present,minimum password length is not enforced. If the server is unable to check  the  length of the password, whether due to a client-side hashed password or some other reason, the server will, depending on the value of  pwdCheckSyntax,  either accept the password without checking it (if pwdCheckSyntax is zero (0) or one (1)) or refuse it (if pwdCheckSyntax is two (2)).";
+    final private static String PWDEXPIREWARNING = "This attribute contains the maximum number of seconds before a password is due to expire that expiration warning messages will be returned to a user  who is authenticating to the directory.  If this attribute is not present, or if the value is zero (0), no warnings will be sent.";
+    final private static String PWDGRACELOGINLIMIT = "This attribute contains the number of times that  an  expired  password may be used to authenticate a user to the directory. If this attribute is not present or if its value is zero (0), users with expired passwords will not be allowed to authenticate to the directory.";
+    final private static String PWDLOCKOUT = "This attribute specifies the action that should be taken by the directory when a user has made a number of failed attempts to authenticate to the directory. If pwdLockout is set (its value is TRUE), the user will not be allowed to attempt to authenticate to the directory after there have been a specified number of consecutive failed bind attempts. The maximum number of consecutive failed bind attempts allowed is specified by the pwdMaxFailure attribute. If pwdLockout is not present, or if its value is FALSE, the password may be used to authenticate no matter how many consecutive failed bind attempts have been made.";
+    final private static String PWDLOCKOUTDURATION = "This attribute contains the number of seconds during which the password cannot be used to authenticate the user to the directory due to too many  consecutive  failed bind attempts.  (See also pwdLockout and pwd-MaxFailure.)  If pwdLockoutDuration is not present, or if its value is zero  (0),  the password cannot be used to authenticate the user to the directory again until it is reset by an administrator.";
+    final private static String PWDMAXFAILURE = "This attribute contains the number of consecutive failed bind attempts after which the password may not be used to authenticate a user to the directory.  If pwdMaxFailure is not present, or its value is zero (0), then a user will be allowed to continue to attempt to authenticate to the directory, no matter how many consecutive failed bind attempts have occurred with that user's DN. (See also pwdLockout and pwdLockoutDuration.)";
+    final private static String PWDFAILURECOUNTINTERVAL = "This attribute contains the number of seconds after which old consecutive failed bind attempts are purged from the failure counter, even though no  successful  authentication  has  occurred.  If  pwdFailure-CountInterval is not present, or its value is zero (0), the failure counter will only be reset by a successful authentication.";
+    final private static String PWDMUSTCHANGE = "This attribute specifies whether users must change their passwords when they first bind to the directory after a password is set or reset by the administrator, or not.  If pwdMustChange has a value of TRUE, users must change their passwords when they first bind to the directory after a password is set or reset by the administrator.  If pwd-MustChange is not present, or its value is FALSE, users are not required to change their password upon binding after the administrator sets or resets the password.";
+    final private static String PWDALLOWUSERCHANGE = "This attribute specifies whether users are allowed to change their own passwords or not.  If pwdAllowUserChange is set to TRUE, or if the attribute is  not  present, users will be allowed to change their own passwords.  If its value is FALSE, users will not be allowed to change their own passwords.";
+    final private static String PWDSAFEMODIFY = "This attribute denotes whether the user's existing password must be sent along with their new password when changing a password. If pwd-SafeModify is set to TRUE, the existing password must be sent along with the new password.  If the attribute is not present, or its value is  FALSE,  the existing password need not be sent along with the new password.";
 
     private static final String CLS_NM = PolicyMgrConsole.class.getName();
     private static final Logger LOG = LoggerFactory.getLogger( CLS_NM );
 
-	/**
-	 * put your documentation comment here
-	 */
-	public PolicyMgrConsole()
-	{
-		try
-		{
-			pm = PwPolicyMgrFactory.createInstance( TestUtils.getContext() );
-		}
-		catch ( org.apache.directory.fortress.core.SecurityException e)
-		{
-            LOG.error(" constructor caught SecurityException rc=" + e.getErrorId() + ", msg=" + e.getMessage(), e);
-		}
-	}
+
+    /**
+     * put your documentation comment here
+     */
+    public PolicyMgrConsole()
+    {
+        try
+        {
+            pm = PwPolicyMgrFactory.createInstance( TestUtils.getContext() );
+        }
+        catch ( org.apache.directory.fortress.core.SecurityException e )
+        {
+            LOG.error( " constructor caught SecurityException rc=" + e.getErrorId() + ", msg=" + e.getMessage(), e );
+        }
+    }
 
 
     void add()
-	{
-		PwPolicy policy = new PwPolicy();
-		try
-		{			
-			/*
-			 *  public class PwPolicy
-			 *  {
+    {
+        PwPolicy policy = new PwPolicy();
+        try
+        {
+            /*
+             *  public class PwPolicy
+             *  {
                     private String name;
                     private String attribute;
                     private Integer minAge;
@@ -86,80 +89,78 @@ class PolicyMgrConsole
                     private Boolean mustChange;
                     private Boolean allowUserChange;
                     private Boolean safeModify;
-			 *  }
-			 */
-			ReaderUtil.clearScreen();
-			System.out.println("ADD PASSWORD POLICY");
-			System.out.println("Enter name:");
-			policy.setName(ReaderUtil.readLn());
-			
-			System.out.println(PWDCHECKQUALITY);
-			System.out.println("Enter checkQuality:");
-			policy.setCheckQuality(new Short(ReaderUtil.readLn()));
-
-			System.out.println(PWDMAXAGE);
-			System.out.println("Enter maxAge:");
-			policy.setMaxAge(new Long(ReaderUtil.readLn()));
-
-			System.out.println(PWDMINAGE);
-			System.out.println("Enter minAge:");
-			policy.setMinAge(new Integer(ReaderUtil.readLn()));
-
-			System.out.println(PWDMINLENGTH);
-			System.out.println("Enter minLength:");
-			policy.setMinLength(new Short(ReaderUtil.readLn()));
-
-			System.out.println(PWDFAILURECOUNTINTERVAL);
-			System.out.println("Enter failureCountInterval:");
-			policy.setFailureCountInterval(new Short(ReaderUtil.readLn()));
-
-			System.out.println(PWDMAXFAILURE);
-			System.out.println("Enter maxFailure:");
-			policy.setMaxFailure(new Short(ReaderUtil.readLn()));
-
-			System.out.println(PWDSAFEMODIFY);
-			System.out.println("Enter safeModify:");
-			policy.setSafeModify(Boolean.valueOf(ReaderUtil.readLn()));
-
-			System.out.println(PWDMUSTCHANGE);
-			System.out.println("Enter mustChange:");
-			policy.setMustChange(Boolean.valueOf(ReaderUtil.readLn()));
-
-			System.out.println(PWDINHISTORY);
-			System.out.println("Enter inHistory:");
-			policy.setInHistory(new Short(ReaderUtil.readLn()));
-
-			System.out.println(PWDGRACELOGINLIMIT);
-			System.out.println("Enter graceLoginLimit:");
-			policy.setGraceLoginLimit(new Short(ReaderUtil.readLn()));
-
-			System.out.println(PWDLOCKOUT);
-			System.out.println("Enter lockout:");
-			policy.setLockout(Boolean.valueOf(ReaderUtil.readLn()));
-
-			System.out.println(PWDLOCKOUTDURATION);
-			System.out.println("Enter lockoutDuration:");
-			policy.setLockoutDuration(new Integer(ReaderUtil.readLn()));
-
-			System.out.println(PWDALLOWUSERCHANGE);
-			System.out.println("Enter allowUserChange:");
-			policy.setAllowUserChange(Boolean.valueOf(ReaderUtil.readLn()));
-
-			System.out.println(PWDEXPIREWARNING);
-			System.out.println("Enter expireWarning:");
-			policy.setExpireWarning(new Long(ReaderUtil.readLn()));
-
-			pm.add(policy);
-			System.out.print("policy name [" + policy.getName() + "]");
-			System.out.println(" has been added");
-			System.out.println("ENTER to continue");
-		}
-		catch (SecurityException e)
-		{
-            LOG.error("add caught SecurityException rc=" + e.getErrorId() + ", msg=" + e.getMessage(), e);
-		}
-		ReaderUtil.readChar();
-	}
+             *  }
+             */
+            ReaderUtil.clearScreen();
+            System.out.println( "ADD PASSWORD POLICY" );
+            System.out.println( "Enter name:" );
+            policy.setName( ReaderUtil.readLn() );
+
+            System.out.println( PWDCHECKQUALITY );
+            System.out.println( "Enter checkQuality:" );
+            policy.setCheckQuality( new Short( ReaderUtil.readLn() ) );
+
+            System.out.println( PWDMAXAGE );
+            System.out.println( "Enter maxAge:" );
+            policy.setMaxAge( new Long( ReaderUtil.readLn() ) );
+
+            System.out.println( PWDMINAGE );
+            System.out.println( "Enter minAge:" );
+            policy.setMinAge( new Integer( ReaderUtil.readLn() ) );
+
+            System.out.println( PWDMINLENGTH );
+            System.out.println( "Enter minLength:" );
+            policy.setMinLength( new Short( ReaderUtil.readLn() ) );
+
+            System.out.println( PWDFAILURECOUNTINTERVAL );
+            System.out.println( "Enter failureCountInterval:" );
+            policy.setFailureCountInterval( new Short( ReaderUtil.readLn() ) );
+
+            System.out.println( PWDMAXFAILURE );
+            System.out.println( "Enter maxFailure:" );
+            policy.setMaxFailure( new Short( ReaderUtil.readLn() ) );
+
+            System.out.println( PWDSAFEMODIFY );
+            System.out.println( "Enter safeModify:" );
+            policy.setSafeModify( Boolean.valueOf( ReaderUtil.readLn() ) );
+
+            System.out.println( PWDMUSTCHANGE );
+            System.out.println( "Enter mustChange:" );
+            policy.setMustChange( Boolean.valueOf( ReaderUtil.readLn() ) );
+
+            System.out.println( PWDINHISTORY );
+            System.out.println( "Enter inHistory:" );
+            policy.setInHistory( new Short( ReaderUtil.readLn() ) );
+
+            System.out.println( PWDGRACELOGINLIMIT );
+            System.out.println( "Enter graceLoginLimit:" );
+            policy.setGraceLoginLimit( new Short( ReaderUtil.readLn() ) );
+
+            System.out.println( PWDLOCKOUT );
+            System.out.println( "Enter lockout:" );
+            policy.setLockout( Boolean.valueOf( ReaderUtil.readLn() ) );
+
+            System.out.println( PWDLOCKOUTDURATION );
+            System.out.println( "Enter lockoutDuration:" );
+            policy.setLockoutDuration( new Integer( ReaderUtil.readLn() ) );
+
+            System.out.println( PWDALLOWUSERCHANGE );
+            System.out.println( "Enter allowUserChange:" );
+            policy.setAllowUserChange( Boolean.valueOf( ReaderUtil.readLn() ) );
+
+            System.out.println( PWDEXPIREWARNING );
+            System.out.println( "Enter expireWarning:" );
+            policy.setExpireWarning( new Long( ReaderUtil.readLn() ) );
+
+            pm.add( policy );
+            System.out.print( "policy name [" + policy.getName() + "]" );
+            System.out.println( " has been added" );
+            System.out.println( "ENTER to continue" );
+        }
+        catch ( SecurityException e )
+        {
+            LOG.error( "add caught SecurityException rc=" + e.getErrorId() + ", msg=" + e.getMessage(), e );
+        }
+        ReaderUtil.readChar();
+    }
 }
-
-

http://git-wip-us.apache.org/repos/asf/directory-fortress-core/blob/f02712d4/src/test/java/org/apache/directory/fortress/core/ProcessMenuCommand.java
----------------------------------------------------------------------
diff --git a/src/test/java/org/apache/directory/fortress/core/ProcessMenuCommand.java b/src/test/java/org/apache/directory/fortress/core/ProcessMenuCommand.java
index 8bd4b08..ab2d2e6 100755
--- a/src/test/java/org/apache/directory/fortress/core/ProcessMenuCommand.java
+++ b/src/test/java/org/apache/directory/fortress/core/ProcessMenuCommand.java
@@ -19,12 +19,14 @@
  */
 package org.apache.directory.fortress.core;
 
+
 import org.slf4j.Logger;
 import org.slf4j.LoggerFactory;
 
 import java.io.BufferedReader;
 import java.io.InputStreamReader;
 
+
 /**
  * Description of the Class
  *
@@ -46,6 +48,7 @@ class ProcessMenuCommand
     final private GroupMgrConsole groupConsole = new GroupMgrConsole();
     final private EncryptMgrConsole encryptConsole = new EncryptMgrConsole();
 
+
     /**
      *
      */
@@ -68,6 +71,7 @@ class ProcessMenuCommand
         System.out.println( "Enter q or Q to quit" );
     }
 
+
     /**
      *
      */
@@ -139,6 +143,7 @@ class ProcessMenuCommand
         }
     }
 
+
     void processGroupManagerFunction()
     {
         BufferedReader br = new BufferedReader( new InputStreamReader( System.in ) );
@@ -194,6 +199,7 @@ class ProcessMenuCommand
         }
     }
 
+
     private void showGroupFunctionMenu()
     {
         ReaderUtil.clearScreen();
@@ -210,6 +216,7 @@ class ProcessMenuCommand
         System.out.println( "Enter q or Q to return to previous menu" );
     }
 
+
     void processEncryptManagerFunction()
     {
         BufferedReader br = new BufferedReader( new InputStreamReader( System.in ) );
@@ -245,6 +252,7 @@ class ProcessMenuCommand
         }
     }
 
+
     private void showEncryptFunctionMenu()
     {
         ReaderUtil.clearScreen();
@@ -254,6 +262,7 @@ class ProcessMenuCommand
         System.out.println( "Enter q or Q to return to previous menu" );
     }
 
+
     void processConfigManagerFunction()
     {
         BufferedReader br = new BufferedReader( new InputStreamReader( System.in ) );
@@ -295,6 +304,7 @@ class ProcessMenuCommand
         }
     }
 
+
     /**
      *
      */
@@ -309,6 +319,7 @@ class ProcessMenuCommand
         System.out.println( "Enter q or Q to return to previous menu" );
     }
 
+
     /**
      *
      */
@@ -365,6 +376,7 @@ class ProcessMenuCommand
         }
     }
 
+
     /**
      *
      */
@@ -383,6 +395,7 @@ class ProcessMenuCommand
         System.out.println( "Enter q or Q to return to previous menu" );
     }
 
+
     /**
      *
      */
@@ -469,7 +482,7 @@ class ProcessMenuCommand
                         break;
                     //case '5':
                     //adminConsole.updatePermObj();
-                    //	break;
+                    //    break;
                     case '0':
                         adminConsole.deletePermission();
                         break;
@@ -1206,5 +1219,3 @@ class ProcessMenuCommand
         }
     }
 }
-
-


Mime
View raw message