This is an automated email from the ASF dual-hosted git repository.

rombert pushed a commit to annotated tag 
org.apache.sling.jcr.jackrabbit.accessmanager-2.0.2-incubator
in repository 
https://gitbox.apache.org/repos/asf/sling-org-apache-sling-jcr-jackrabbit-accessmanager.git

commit 1431cb128f3ddb9b614ba207c14b79b4dd2ef250
Author: Jukka Zitting <[email protected]>
AuthorDate: Fri Apr 24 12:14:03 2009 +0000

    SLING-941: Lots of svn:eol-style settings missing
    
    Set svn:eol-style to native on all Java files that lack the setting.
    
    git-svn-id: 
https://svn.apache.org/repos/asf/incubator/sling/trunk/bundles/jcr/jackrabbit-accessmanager@768268
 13f79535-47bb-0310-9956-ffa450edef68
---
 .../jackrabbit/accessmanager/PrivilegesInfo.java   | 1232 ++++++++++----------
 .../post/AbstractAccessPostServlet.java            |  508 ++++----
 .../accessmanager/post/DeleteAcesServlet.java      |  256 ++--
 .../accessmanager/post/GetAclServlet.java          |  360 +++---
 .../accessmanager/post/ModifyAceServlet.java       |  482 ++++----
 .../accessmanager/PrivilegesResources.properties   |   44 +-
 6 files changed, 1441 insertions(+), 1441 deletions(-)

diff --git 
a/src/main/java/org/apache/sling/jcr/jackrabbit/accessmanager/PrivilegesInfo.java
 
b/src/main/java/org/apache/sling/jcr/jackrabbit/accessmanager/PrivilegesInfo.java
index aef7a29..3143650 100644
--- 
a/src/main/java/org/apache/sling/jcr/jackrabbit/accessmanager/PrivilegesInfo.java
+++ 
b/src/main/java/org/apache/sling/jcr/jackrabbit/accessmanager/PrivilegesInfo.java
@@ -1,616 +1,616 @@
-/*
- * Licensed to the Apache Software Foundation (ASF) under one or more
- * contributor license agreements.  See the NOTICE file distributed with
- * this work for additional information regarding copyright ownership.
- * The ASF licenses this file to You under the Apache License, Version 2.0
- * (the "License"); you may not use this file except in compliance with
- * the License.  You may obtain a copy of the License at
- *
- *      http://www.apache.org/licenses/LICENSE-2.0
- *
- * Unless required by applicable law or agreed to in writing, software
- * distributed under the License is distributed on an "AS IS" BASIS,
- * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
- * See the License for the specific language governing permissions and
- * limitations under the License.
- */
-package org.apache.sling.jcr.jackrabbit.accessmanager;
-
-import java.lang.reflect.InvocationTargetException;
-import java.lang.reflect.Method;
-import java.security.Principal;
-import java.util.Arrays;
-import java.util.HashSet;
-import java.util.Iterator;
-import java.util.LinkedHashMap;
-import java.util.Locale;
-import java.util.Map;
-import java.util.ResourceBundle;
-import java.util.Set;
-
-import javax.jcr.Node;
-import javax.jcr.RepositoryException;
-import javax.jcr.Session;
-
-import org.apache.jackrabbit.api.jsr283.security.AccessControlEntry;
-import org.apache.jackrabbit.api.jsr283.security.AccessControlList;
-import org.apache.jackrabbit.api.jsr283.security.AccessControlManager;
-import org.apache.jackrabbit.api.jsr283.security.AccessControlPolicy;
-import org.apache.jackrabbit.api.jsr283.security.Privilege;
-import org.apache.jackrabbit.api.security.principal.PrincipalManager;
-import org.apache.sling.jcr.base.util.AccessControlUtil;
-
-/**
- * Helper class to assist in the usage of access control from scripts.
- */
-public class PrivilegesInfo {
-       
-       /**
-        * Return the supported Privileges for the specified node.
-        * 
-        * @param node the node to check
-        * @return array of Privileges
-        * @throws RepositoryException
-        */
-       public Privilege [] getSupportedPrivileges(Node node) throws 
RepositoryException {
-               return getSupportedPrivileges(node.getSession(), 
node.getPath());
-       }
-       
-       /**
-        * Returns the supported privileges for the specified path.
-        * 
-        * @param session the session for the current user
-        * @param absPath the path to get the privileges for
-        * @return array of Privileges
-        * @throws RepositoryException
-        */
-       public Privilege [] getSupportedPrivileges(Session session, String 
absPath) throws RepositoryException {
-               AccessControlManager accessControlManager = 
AccessControlUtil.getAccessControlManager(session);
-               Privilege[] supportedPrivileges = 
accessControlManager.getSupportedPrivileges(absPath);
-               return supportedPrivileges;
-       }
-       
-       /**
-        * Wrapper class that holds the set of Privileges that are granted 
-        * and/or denied for a specific principal.
-        */
-       public static class AccessRights {
-               private Set<Privilege> granted = new HashSet<Privilege>();
-               private Set<Privilege> denied = new HashSet<Privilege>();
-
-               private transient static ResourceBundle resBundle = null; 
-               private ResourceBundle getResourceBundle(Locale locale) {
-                       if (resBundle == null || 
!resBundle.getLocale().equals(locale)) {
-                               resBundle = 
ResourceBundle.getBundle(getClass().getPackage().getName() + 
".PrivilegesResources", locale);
-                       }
-                       return resBundle;
-               }
-               
-
-               public Set<Privilege> getGranted() {
-                       return granted;
-               }
-               public Set<Privilege> getDenied() {
-                       return denied;
-               }
-               
-               public String getPrivilegeSetDisplayName(Locale locale) {
-                       if (denied != null && !denied.isEmpty()) {
-                               //if there are any denied privileges, then this 
is a custom privilege set
-                               return 
getResourceBundle(locale).getString("privilegeset.custom");
-                       } else {
-                               if (granted.isEmpty()) {
-                                       //appears to have an empty privilege set
-                                       return 
getResourceBundle(locale).getString("privilegeset.none");
-                               }
-                                       
-                               if (granted.size() == 1) {
-                                       //check if the single privilege is 
jcr:all or jcr:read
-                                       Iterator<Privilege> iterator = 
granted.iterator();
-                                       Privilege next = iterator.next();
-                                       if ("jcr:all".equals(next.getName())) {
-                                               //full control privilege set
-                                               return 
getResourceBundle(locale).getString("privilegeset.all");
-                                       } else if 
("jcr:read".equals(next.getName())) {
-                                               //readonly privilege set
-                                               return 
getResourceBundle(locale).getString("privilegeset.readonly");
-                                       } 
-                               } else if (granted.size() == 2) {
-                                       //check if the two privileges are 
jcr:read and jcr:write
-                                       Iterator<Privilege> iterator = 
granted.iterator();
-                                       Privilege next = iterator.next();
-                                       Privilege next2 = iterator.next();
-                                       if ( ("jcr:read".equals(next.getName()) 
&& "jcr:write".equals(next2.getName())) ||
-                                                       
("jcr:read".equals(next2.getName()) && "jcr:write".equals(next.getName())) ) {
-                                               //read/write privileges
-                                               return 
getResourceBundle(locale).getString("privilegeset.readwrite");
-                                       }
-                               }
-
-                               //some other set of privileges
-                               return 
getResourceBundle(locale).getString("privilegeset.custom");
-                       }
-               }
-       }
-
-       /**
-        * Returns the mapping of declared access rights that have been set for 
the resource at
-        * the given path. 
-        * 
-        * @param node the node to get the access rights for
-        * @return map of access rights.  Key is the user/group principal, 
value contains the granted/denied privileges
-        * @throws RepositoryException
-        */
-       public Map<Principal, AccessRights> getDeclaredAccessRights(Node node) 
throws RepositoryException {
-               Map<Principal, AccessRights> accessRights = 
getDeclaredAccessRights(node.getSession(), node.getPath());
-               return accessRights;
-       }
-       
-       /**
-        * Returns the mapping of declared access rights that have been set for 
the resource at
-        * the given path. 
-        * 
-        * @param session the current user session.
-        * @param absPath the path of the resource to get the access rights for
-        * @return map of access rights.  Key is the user/group principal, 
value contains the granted/denied privileges
-        * @throws RepositoryException
-        */
-       public Map<Principal, AccessRights> getDeclaredAccessRights(Session 
session, String absPath) throws RepositoryException {
-               Map<Principal, AccessRights> accessMap = new 
LinkedHashMap<Principal, AccessRights>();
-               AccessControlEntry[] entries = 
getDeclaredAccessControlEntries(session, absPath);
-               if (entries != null) {
-                       for (AccessControlEntry ace : entries) {
-                               Principal principal = ace.getPrincipal();
-                               AccessRights accessPrivleges = 
accessMap.get(principal);
-                               if (accessPrivleges == null) {
-                                       accessPrivleges = new AccessRights();
-                                       accessMap.put(principal, 
accessPrivleges);
-                               }
-                               boolean allow = AccessControlUtil.isAllow(ace);
-                               if (allow) {
-                                       
accessPrivleges.getGranted().addAll(Arrays.asList(ace.getPrivileges()));
-                               } else {
-                                       
accessPrivleges.getDenied().addAll(Arrays.asList(ace.getPrivileges()));
-                               }
-                       }
-               }
-               
-               return accessMap;
-       }
-
-       private AccessControlEntry[] getDeclaredAccessControlEntries(Session 
session, String absPath) throws RepositoryException {
-               AccessControlManager accessControlManager = 
AccessControlUtil.getAccessControlManager(session);
-               AccessControlPolicy[] policies = 
accessControlManager.getPolicies(absPath);
-               for (AccessControlPolicy accessControlPolicy : policies) {
-                       if (accessControlPolicy instanceof AccessControlList) {
-                               AccessControlEntry[] accessControlEntries = 
((AccessControlList)accessControlPolicy).getAccessControlEntries();
-                               return accessControlEntries;
-                       }
-               }
-               return new AccessControlEntry[0];
-       }
-
-       /**
-        * Returns the declared access rights for the specified Node for the 
given
-        * principalId.
-        * 
-        * @param node the JCR node to retrieve the access rights for
-        * @param principalId the principalId to get the access rights for
-        * @return access rights for the specified principal
-        * @throws RepositoryException
-        */
-       public AccessRights getDeclaredAccessRightsForPrincipal(Node node, 
String principalId) throws RepositoryException {
-               return getDeclaredAccessRightsForPrincipal(node.getSession(), 
node.getPath(), principalId);
-       }
-
-       /**
-        * Returns the declared access rights for the resource at the specified 
path for the given
-        * principalId.
-        * 
-        * @param session the current JCR session
-        * @param absPath the path of the resource to retrieve the rights for
-        * @param principalId the principalId to get the access rights for
-        * @return access rights for the specified principal
-        * @throws RepositoryException
-        */
-       public AccessRights getDeclaredAccessRightsForPrincipal(Session 
session, String absPath, String principalId) throws RepositoryException {
-               AccessRights rights = new AccessRights();
-               if (principalId != null && principalId.length() > 0) {
-                       AccessControlManager accessControlManager = 
AccessControlUtil.getAccessControlManager(session);
-                       AccessControlPolicy[] policies = 
accessControlManager.getPolicies(absPath);
-                       for (AccessControlPolicy accessControlPolicy : 
policies) {
-                               if (accessControlPolicy instanceof 
AccessControlList) {
-                                       AccessControlEntry[] 
accessControlEntries = 
((AccessControlList)accessControlPolicy).getAccessControlEntries();
-                                       for (AccessControlEntry ace : 
accessControlEntries) {
-                                               if 
(principalId.equals(ace.getPrincipal().getName())) {
-                                                       boolean isAllow = 
AccessControlUtil.isAllow(ace);
-                                                       if (isAllow) {
-                                                               
rights.getGranted().addAll(Arrays.asList(ace.getPrivileges()));
-                                                       } else {
-                                                               
rights.getDenied().addAll(Arrays.asList(ace.getPrivileges()));
-                                                       }
-                                               }
-                                       }
-                               }
-                       }
-               }
-               
-               return rights;
-       }
-       
-
-       
-       
-       /**
-        * Returns the mapping of effective access rights that have been set 
for the resource at
-        * the given path. 
-        * 
-        * @param node the node to get the access rights for
-        * @return map of access rights.  Key is the user/group principal, 
value contains the granted/denied privileges
-        * @throws RepositoryException
-        */
-       public Map<Principal, AccessRights> getEffectiveAccessRights(Node node) 
throws RepositoryException {
-               Map<Principal, AccessRights> accessRights = 
getEffectiveAccessRights(node.getSession(), node.getPath());
-               return accessRights;
-       }
-       
-       /**
-        * Returns the mapping of effective access rights that have been set 
for the resource at
-        * the given path. 
-        * 
-        * @param session the current user session.
-        * @param absPath the path of the resource to get the access rights for
-        * @return map of access rights.  Key is the user/group principal, 
value contains the granted/denied privileges
-        * @throws RepositoryException
-        */
-       public Map<Principal, AccessRights> getEffectiveAccessRights(Session 
session, String absPath) throws RepositoryException {
-               Map<Principal, AccessRights> accessMap = new 
LinkedHashMap<Principal, AccessRights>();
-               AccessControlEntry[] entries = 
getEffectiveAccessControlEntries(session, absPath);
-               if (entries != null) {
-                       for (AccessControlEntry ace : entries) {
-                               Principal principal = ace.getPrincipal();
-                               AccessRights accessPrivleges = 
accessMap.get(principal);
-                               if (accessPrivleges == null) {
-                                       accessPrivleges = new AccessRights();
-                                       accessMap.put(principal, 
accessPrivleges);
-                               }
-                               boolean allow = AccessControlUtil.isAllow(ace);
-                               if (allow) {
-                                       
accessPrivleges.getGranted().addAll(Arrays.asList(ace.getPrivileges()));
-                               } else {
-                                       
accessPrivleges.getDenied().addAll(Arrays.asList(ace.getPrivileges()));
-                               }
-                       }
-               }
-               
-               return accessMap;
-       }
-       
-       private AccessControlEntry[] getEffectiveAccessControlEntries(Session 
session, String absPath) throws RepositoryException {
-               AccessControlManager accessControlManager = 
AccessControlUtil.getAccessControlManager(session);
-               AccessControlPolicy[] policies = 
accessControlManager.getEffectivePolicies(absPath);
-               for (AccessControlPolicy accessControlPolicy : policies) {
-                       if (accessControlPolicy instanceof AccessControlList) {
-                               AccessControlEntry[] accessControlEntries = 
((AccessControlList)accessControlPolicy).getAccessControlEntries();
-                               return accessControlEntries;
-                       }
-               }
-               return new AccessControlEntry[0];
-       }
-
-       /**
-        * Returns the effective access rights for the specified Node for the 
given
-        * principalId.
-        * 
-        * @param node the JCR node to retrieve the access rights for
-        * @param principalId the principalId to get the access rights for
-        * @return access rights for the specified principal
-        * @throws RepositoryException
-        */
-       public AccessRights getEffectiveAccessRightsForPrincipal(Node node, 
String principalId) throws RepositoryException {
-               return getEffectiveAccessRightsForPrincipal(node.getSession(), 
node.getPath(), principalId);
-       }
-
-       /**
-        * Returns the effective access rights for the resource at the 
specified path for the given
-        * principalId.
-        * 
-        * @param session the current JCR session
-        * @param absPath the path of the resource to retrieve the rights for
-        * @param principalId the principalId to get the access rights for
-        * @return access rights for the specified principal
-        * @throws RepositoryException
-        */
-       public AccessRights getEffectiveAccessRightsForPrincipal(Session 
session, String absPath, String principalId) throws RepositoryException {
-               AccessRights rights = new AccessRights();
-               if (principalId != null && principalId.length() > 0) {
-                       AccessControlManager accessControlManager = 
AccessControlUtil.getAccessControlManager(session);
-                       AccessControlPolicy[] policies = 
accessControlManager.getEffectivePolicies(absPath);
-                       for (AccessControlPolicy accessControlPolicy : 
policies) {
-                               if (accessControlPolicy instanceof 
AccessControlList) {
-                                       AccessControlEntry[] 
accessControlEntries = 
((AccessControlList)accessControlPolicy).getAccessControlEntries();
-                                       for (AccessControlEntry ace : 
accessControlEntries) {
-                                               if 
(principalId.equals(ace.getPrincipal().getName())) {
-                                                       boolean isAllow = 
AccessControlUtil.isAllow(ace);
-                                                       if (isAllow) {
-                                                               
rights.getGranted().addAll(Arrays.asList(ace.getPrivileges()));
-                                                       } else {
-                                                               
rights.getDenied().addAll(Arrays.asList(ace.getPrivileges()));
-                                                       }
-                                               }
-                                       }
-                               }
-                       }
-               }
-               
-               return rights;
-       }
-       
-       
-       
-       /**
-        * Checks whether the current user has been granted privileges
-        * to add children to the specified node.
-        *  
-        * @param node the node to check
-        * @return true if the current user has the privileges, false otherwise
-        */
-       public boolean canAddChildren(Node node) {
-               try {
-                       return canAddChildren(node.getSession(), 
node.getPath());
-               } catch (RepositoryException e) {
-                       return false;
-               }
-       }
-       
-       /**
-        * Checks whether the current user has been granted privileges
-        * to add children to the specified path.
-        *  
-        * @param session the JCR session of the current user
-        * @param absPath the path of the resource to check
-        * @return true if the current user has the privileges, false otherwise
-        */
-       public boolean canAddChildren(Session session, String absPath) {
-               try {
-                       AccessControlManager accessControlManager = 
AccessControlUtil.getAccessControlManager(session);
-                       return accessControlManager.hasPrivileges(absPath, new 
Privilege[] {
-                                                       
accessControlManager.privilegeFromName(Privilege.JCR_ADD_CHILD_NODES)
-                                               });
-               } catch (RepositoryException e) {
-                       return false;
-               }
-       }
-       
-       /**
-        * Checks whether the current user has been granted privileges
-        * to delete children to the specified node.
-        *  
-        * @param node the node to check
-        * @return true if the current user has the privileges, false otherwise
-        */
-       public boolean canDeleteChildren(Node node) {
-               try {
-                       return canDeleteChildren(node.getSession(), 
node.getPath());
-               } catch (RepositoryException e) {
-                       return false;
-               }
-       }
-
-       /**
-        * Checks whether the current user has been granted privileges
-        * to delete children of the specified path.
-        *  
-        * @param session the JCR session of the current user
-        * @param absPath the path of the resource to check
-        * @return true if the current user has the privileges, false otherwise
-        */
-       public boolean canDeleteChildren(Session session, String absPath) {
-               try {
-                       AccessControlManager accessControlManager = 
AccessControlUtil.getAccessControlManager(session);
-                       
-                       return accessControlManager.hasPrivileges(absPath, new 
Privilege[] {
-                                                       
accessControlManager.privilegeFromName(Privilege.JCR_REMOVE_CHILD_NODES)
-                                               });
-               } catch (RepositoryException e) {
-                       return false;
-               }
-       }
-       
-       /**
-        * Checks whether the current user has been granted privileges
-        * to delete the specified node.
-        *  
-        * @param node the node to check
-        * @return true if the current user has the privileges, false otherwise
-        */
-       public boolean canDelete(Node node) {
-               try {
-                       return canDelete(node.getSession(), node.getPath());
-               } catch (RepositoryException e) {
-                       return false;
-               }
-       }
-       
-       /**
-        * Checks whether the current user has been granted privileges
-        * to delete the specified path.
-        *  
-        * @param session the JCR session of the current user
-        * @param absPath the path of the resource to check
-        * @return true if the current user has the privileges, false otherwise
-        */
-       public boolean canDelete(Session session, String absPath) {
-               try {
-                       AccessControlManager accessControlManager = 
AccessControlUtil.getAccessControlManager(session);
-                       
-                       String parentPath = absPath.substring(0, 
absPath.lastIndexOf('/'));
-                       boolean canDelete = 
accessControlManager.hasPrivileges(absPath, new Privilege[] {
-                                                       
accessControlManager.privilegeFromName(Privilege.JCR_REMOVE_NODE)
-                                               }) && 
canDeleteChildren(session, parentPath);
-                       return canDelete;
-               } catch (RepositoryException e) {
-                       return false;
-               }
-       }
-
-       /**
-        * Checks whether the current user has been granted privileges
-        * to modify properties of the specified node.
-        *  
-        * @param node the node to check
-        * @return true if the current user has the privileges, false otherwise
-        */
-       public boolean canModifyProperties(Node node) {
-               try {
-                       return canModifyProperties(node.getSession(), 
node.getPath());
-               } catch (RepositoryException e) {
-                       return false;
-               }
-       }
-       
-       /**
-        * Checks whether the current user has been granted privileges
-        * to modify properties of the specified path.
-        *  
-        * @param session the JCR session of the current user
-        * @param absPath the path of the resource to check
-        * @return true if the current user has the privileges, false otherwise
-        */
-       public boolean canModifyProperties(Session session, String absPath) {
-               try {
-                       AccessControlManager accessControlManager = 
AccessControlUtil.getAccessControlManager(session);
-                       return accessControlManager.hasPrivileges(absPath, new 
Privilege[] {
-                                                       
accessControlManager.privilegeFromName(Privilege.JCR_MODIFY_PROPERTIES)
-                                               });
-               } catch (RepositoryException e) {
-                       return false;
-               }
-       }
-       
-       /**
-        * Checks whether the current user has been granted privileges
-        * to read the access control of the specified node.
-        *  
-        * @param node the node to check
-        * @return true if the current user has the privileges, false otherwise
-        */
-       public boolean canReadAccessControl(Node node) {
-               try {
-                       return canReadAccessControl(node.getSession(), 
node.getPath());
-               } catch (RepositoryException e) {
-                       return false;
-               }
-       }
-       
-       /**
-        * Checks whether the current user has been granted privileges
-        * to read the access control of the specified path.
-        *  
-        * @param session the JCR session of the current user
-        * @param absPath the path of the resource to check
-        * @return true if the current user has the privileges, false otherwise
-        */
-       public boolean canReadAccessControl(Session session, String absPath) {
-               try {
-                       AccessControlManager accessControlManager = 
AccessControlUtil.getAccessControlManager(session);
-                       return accessControlManager.hasPrivileges(absPath, new 
Privilege[] {
-                                                       
accessControlManager.privilegeFromName(Privilege.JCR_READ_ACCESS_CONTROL)
-                                               });
-               } catch (RepositoryException e) {
-                       return false;
-               }
-       }
-       
-       /**
-        * Checks whether the current user has been granted privileges
-        * to modify the access control of the specified node.
-        *  
-        * @param node the node to check
-        * @return true if the current user has the privileges, false otherwise
-        */
-       public boolean canModifyAccessControl(Node node) {
-               try {
-                       return canModifyAccessControl(node.getSession(), 
node.getPath());
-               } catch (RepositoryException e) {
-                       return false;
-               }
-       }
-       
-       /**
-        * Checks whether the current user has been granted privileges
-        * to modify the access control of the specified path.
-        *  
-        * @param session the JCR session of the current user
-        * @param absPath the path of the resource to check
-        * @return true if the current user has the privileges, false otherwise
-        */
-       public boolean canModifyAccessControl(Session session, String absPath) {
-               try {
-                       AccessControlManager accessControlManager = 
AccessControlUtil.getAccessControlManager(session);
-                       return accessControlManager.hasPrivileges(absPath, new 
Privilege[] {
-                                                       
accessControlManager.privilegeFromName(Privilege.JCR_MODIFY_ACCESS_CONTROL)
-                                               });
-               } catch (RepositoryException e) {
-                       return false;
-               }
-       }
-
-
-       /**
-        * Checks whether the current user has been granted privileges
-        * to update the properties of the specified principal.
-        *  
-        * @param session the JCR session for the current user
-        * @param principalID the id of the principal to check
-        * @return true if the current user has the privileges, false otherwise
-        */
-       public boolean canUpdateAuthorizable(Session session, String 
principalID) {
-               try {
-                       PrincipalManager principalManager = 
AccessControlUtil.getPrincipalManager(session);
-                       Principal principal = 
principalManager.getPrincipal(principalID);
-                       if (principal == null) {
-                               return false;
-                       }
-
-                       String path = getAuthorizableItemPath(principal);
-                       return canModifyProperties(session, path);
-               } catch (Exception e) {
-                       //just eat it.
-                       return false;
-               }
-       }
-       private String getAuthorizableItemPath(Principal principal)
-                       throws NoSuchMethodException, IllegalAccessException,
-                       InvocationTargetException {
-               //should check if principal implements ItemBasedPrincipal, but 
it is not visible here so use reflection instead
-               Method method = principal.getClass().getMethod("getPath");
-               String path = (String)method.invoke(principal);
-               return path;
-       }
-       
-       /**
-        * Checks whether the current user has been granted privileges
-        * to delete the specified principal.
-        *  
-        * @param session the JCR session for the current user
-        * @param principalID the id of the principal to check
-        * @return true if the current user has the privileges, false otherwise
-        */
-       public boolean canDeleteAuthorizable(Session session, String 
principalID) {
-               try {
-                       PrincipalManager principalManager = 
AccessControlUtil.getPrincipalManager(session);
-                       Principal principal = 
principalManager.getPrincipal(principalID);
-                       if (principal == null) {
-                               return false;
-                       }
-                       
-                       //should check if principal implements 
ItemBasedPrincipal, but it is not visible here so use reflection instead
-                       String path = getAuthorizableItemPath(principal);
-                       return canDelete(session, path);
-               } catch (Exception e) {
-                       //just eat it.
-                       return false;
-               }
-       }
-}
+/*
+ * Licensed to the Apache Software Foundation (ASF) under one or more
+ * contributor license agreements.  See the NOTICE file distributed with
+ * this work for additional information regarding copyright ownership.
+ * The ASF licenses this file to You under the Apache License, Version 2.0
+ * (the "License"); you may not use this file except in compliance with
+ * the License.  You may obtain a copy of the License at
+ *
+ *      http://www.apache.org/licenses/LICENSE-2.0
+ *
+ * Unless required by applicable law or agreed to in writing, software
+ * distributed under the License is distributed on an "AS IS" BASIS,
+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+ * See the License for the specific language governing permissions and
+ * limitations under the License.
+ */
+package org.apache.sling.jcr.jackrabbit.accessmanager;
+
+import java.lang.reflect.InvocationTargetException;
+import java.lang.reflect.Method;
+import java.security.Principal;
+import java.util.Arrays;
+import java.util.HashSet;
+import java.util.Iterator;
+import java.util.LinkedHashMap;
+import java.util.Locale;
+import java.util.Map;
+import java.util.ResourceBundle;
+import java.util.Set;
+
+import javax.jcr.Node;
+import javax.jcr.RepositoryException;
+import javax.jcr.Session;
+
+import org.apache.jackrabbit.api.jsr283.security.AccessControlEntry;
+import org.apache.jackrabbit.api.jsr283.security.AccessControlList;
+import org.apache.jackrabbit.api.jsr283.security.AccessControlManager;
+import org.apache.jackrabbit.api.jsr283.security.AccessControlPolicy;
+import org.apache.jackrabbit.api.jsr283.security.Privilege;
+import org.apache.jackrabbit.api.security.principal.PrincipalManager;
+import org.apache.sling.jcr.base.util.AccessControlUtil;
+
+/**
+ * Helper class to assist in the usage of access control from scripts.
+ */
+public class PrivilegesInfo {
+       
+       /**
+        * Return the supported Privileges for the specified node.
+        * 
+        * @param node the node to check
+        * @return array of Privileges
+        * @throws RepositoryException
+        */
+       public Privilege [] getSupportedPrivileges(Node node) throws 
RepositoryException {
+               return getSupportedPrivileges(node.getSession(), 
node.getPath());
+       }
+       
+       /**
+        * Returns the supported privileges for the specified path.
+        * 
+        * @param session the session for the current user
+        * @param absPath the path to get the privileges for
+        * @return array of Privileges
+        * @throws RepositoryException
+        */
+       public Privilege [] getSupportedPrivileges(Session session, String 
absPath) throws RepositoryException {
+               AccessControlManager accessControlManager = 
AccessControlUtil.getAccessControlManager(session);
+               Privilege[] supportedPrivileges = 
accessControlManager.getSupportedPrivileges(absPath);
+               return supportedPrivileges;
+       }
+       
+       /**
+        * Wrapper class that holds the set of Privileges that are granted 
+        * and/or denied for a specific principal.
+        */
+       public static class AccessRights {
+               private Set<Privilege> granted = new HashSet<Privilege>();
+               private Set<Privilege> denied = new HashSet<Privilege>();
+
+               private transient static ResourceBundle resBundle = null; 
+               private ResourceBundle getResourceBundle(Locale locale) {
+                       if (resBundle == null || 
!resBundle.getLocale().equals(locale)) {
+                               resBundle = 
ResourceBundle.getBundle(getClass().getPackage().getName() + 
".PrivilegesResources", locale);
+                       }
+                       return resBundle;
+               }
+               
+
+               public Set<Privilege> getGranted() {
+                       return granted;
+               }
+               public Set<Privilege> getDenied() {
+                       return denied;
+               }
+               
+               public String getPrivilegeSetDisplayName(Locale locale) {
+                       if (denied != null && !denied.isEmpty()) {
+                               //if there are any denied privileges, then this 
is a custom privilege set
+                               return 
getResourceBundle(locale).getString("privilegeset.custom");
+                       } else {
+                               if (granted.isEmpty()) {
+                                       //appears to have an empty privilege set
+                                       return 
getResourceBundle(locale).getString("privilegeset.none");
+                               }
+                                       
+                               if (granted.size() == 1) {
+                                       //check if the single privilege is 
jcr:all or jcr:read
+                                       Iterator<Privilege> iterator = 
granted.iterator();
+                                       Privilege next = iterator.next();
+                                       if ("jcr:all".equals(next.getName())) {
+                                               //full control privilege set
+                                               return 
getResourceBundle(locale).getString("privilegeset.all");
+                                       } else if 
("jcr:read".equals(next.getName())) {
+                                               //readonly privilege set
+                                               return 
getResourceBundle(locale).getString("privilegeset.readonly");
+                                       } 
+                               } else if (granted.size() == 2) {
+                                       //check if the two privileges are 
jcr:read and jcr:write
+                                       Iterator<Privilege> iterator = 
granted.iterator();
+                                       Privilege next = iterator.next();
+                                       Privilege next2 = iterator.next();
+                                       if ( ("jcr:read".equals(next.getName()) 
&& "jcr:write".equals(next2.getName())) ||
+                                                       
("jcr:read".equals(next2.getName()) && "jcr:write".equals(next.getName())) ) {
+                                               //read/write privileges
+                                               return 
getResourceBundle(locale).getString("privilegeset.readwrite");
+                                       }
+                               }
+
+                               //some other set of privileges
+                               return 
getResourceBundle(locale).getString("privilegeset.custom");
+                       }
+               }
+       }
+
+       /**
+        * Returns the mapping of declared access rights that have been set for 
the resource at
+        * the given path. 
+        * 
+        * @param node the node to get the access rights for
+        * @return map of access rights.  Key is the user/group principal, 
value contains the granted/denied privileges
+        * @throws RepositoryException
+        */
+       public Map<Principal, AccessRights> getDeclaredAccessRights(Node node) 
throws RepositoryException {
+               Map<Principal, AccessRights> accessRights = 
getDeclaredAccessRights(node.getSession(), node.getPath());
+               return accessRights;
+       }
+       
+       /**
+        * Returns the mapping of declared access rights that have been set for 
the resource at
+        * the given path. 
+        * 
+        * @param session the current user session.
+        * @param absPath the path of the resource to get the access rights for
+        * @return map of access rights.  Key is the user/group principal, 
value contains the granted/denied privileges
+        * @throws RepositoryException
+        */
+       public Map<Principal, AccessRights> getDeclaredAccessRights(Session 
session, String absPath) throws RepositoryException {
+               Map<Principal, AccessRights> accessMap = new 
LinkedHashMap<Principal, AccessRights>();
+               AccessControlEntry[] entries = 
getDeclaredAccessControlEntries(session, absPath);
+               if (entries != null) {
+                       for (AccessControlEntry ace : entries) {
+                               Principal principal = ace.getPrincipal();
+                               AccessRights accessPrivleges = 
accessMap.get(principal);
+                               if (accessPrivleges == null) {
+                                       accessPrivleges = new AccessRights();
+                                       accessMap.put(principal, 
accessPrivleges);
+                               }
+                               boolean allow = AccessControlUtil.isAllow(ace);
+                               if (allow) {
+                                       
accessPrivleges.getGranted().addAll(Arrays.asList(ace.getPrivileges()));
+                               } else {
+                                       
accessPrivleges.getDenied().addAll(Arrays.asList(ace.getPrivileges()));
+                               }
+                       }
+               }
+               
+               return accessMap;
+       }
+
+       private AccessControlEntry[] getDeclaredAccessControlEntries(Session 
session, String absPath) throws RepositoryException {
+               AccessControlManager accessControlManager = 
AccessControlUtil.getAccessControlManager(session);
+               AccessControlPolicy[] policies = 
accessControlManager.getPolicies(absPath);
+               for (AccessControlPolicy accessControlPolicy : policies) {
+                       if (accessControlPolicy instanceof AccessControlList) {
+                               AccessControlEntry[] accessControlEntries = 
((AccessControlList)accessControlPolicy).getAccessControlEntries();
+                               return accessControlEntries;
+                       }
+               }
+               return new AccessControlEntry[0];
+       }
+
+       /**
+        * Returns the declared access rights for the specified Node for the 
given
+        * principalId.
+        * 
+        * @param node the JCR node to retrieve the access rights for
+        * @param principalId the principalId to get the access rights for
+        * @return access rights for the specified principal
+        * @throws RepositoryException
+        */
+       public AccessRights getDeclaredAccessRightsForPrincipal(Node node, 
String principalId) throws RepositoryException {
+               return getDeclaredAccessRightsForPrincipal(node.getSession(), 
node.getPath(), principalId);
+       }
+
+       /**
+        * Returns the declared access rights for the resource at the specified 
path for the given
+        * principalId.
+        * 
+        * @param session the current JCR session
+        * @param absPath the path of the resource to retrieve the rights for
+        * @param principalId the principalId to get the access rights for
+        * @return access rights for the specified principal
+        * @throws RepositoryException
+        */
+       public AccessRights getDeclaredAccessRightsForPrincipal(Session 
session, String absPath, String principalId) throws RepositoryException {
+               AccessRights rights = new AccessRights();
+               if (principalId != null && principalId.length() > 0) {
+                       AccessControlManager accessControlManager = 
AccessControlUtil.getAccessControlManager(session);
+                       AccessControlPolicy[] policies = 
accessControlManager.getPolicies(absPath);
+                       for (AccessControlPolicy accessControlPolicy : 
policies) {
+                               if (accessControlPolicy instanceof 
AccessControlList) {
+                                       AccessControlEntry[] 
accessControlEntries = 
((AccessControlList)accessControlPolicy).getAccessControlEntries();
+                                       for (AccessControlEntry ace : 
accessControlEntries) {
+                                               if 
(principalId.equals(ace.getPrincipal().getName())) {
+                                                       boolean isAllow = 
AccessControlUtil.isAllow(ace);
+                                                       if (isAllow) {
+                                                               
rights.getGranted().addAll(Arrays.asList(ace.getPrivileges()));
+                                                       } else {
+                                                               
rights.getDenied().addAll(Arrays.asList(ace.getPrivileges()));
+                                                       }
+                                               }
+                                       }
+                               }
+                       }
+               }
+               
+               return rights;
+       }
+       
+
+       
+       
+       /**
+        * Returns the mapping of effective access rights that have been set 
for the resource at
+        * the given path. 
+        * 
+        * @param node the node to get the access rights for
+        * @return map of access rights.  Key is the user/group principal, 
value contains the granted/denied privileges
+        * @throws RepositoryException
+        */
+       public Map<Principal, AccessRights> getEffectiveAccessRights(Node node) 
throws RepositoryException {
+               Map<Principal, AccessRights> accessRights = 
getEffectiveAccessRights(node.getSession(), node.getPath());
+               return accessRights;
+       }
+       
+       /**
+        * Returns the mapping of effective access rights that have been set 
for the resource at
+        * the given path. 
+        * 
+        * @param session the current user session.
+        * @param absPath the path of the resource to get the access rights for
+        * @return map of access rights.  Key is the user/group principal, 
value contains the granted/denied privileges
+        * @throws RepositoryException
+        */
+       public Map<Principal, AccessRights> getEffectiveAccessRights(Session 
session, String absPath) throws RepositoryException {
+               Map<Principal, AccessRights> accessMap = new 
LinkedHashMap<Principal, AccessRights>();
+               AccessControlEntry[] entries = 
getEffectiveAccessControlEntries(session, absPath);
+               if (entries != null) {
+                       for (AccessControlEntry ace : entries) {
+                               Principal principal = ace.getPrincipal();
+                               AccessRights accessPrivleges = 
accessMap.get(principal);
+                               if (accessPrivleges == null) {
+                                       accessPrivleges = new AccessRights();
+                                       accessMap.put(principal, 
accessPrivleges);
+                               }
+                               boolean allow = AccessControlUtil.isAllow(ace);
+                               if (allow) {
+                                       
accessPrivleges.getGranted().addAll(Arrays.asList(ace.getPrivileges()));
+                               } else {
+                                       
accessPrivleges.getDenied().addAll(Arrays.asList(ace.getPrivileges()));
+                               }
+                       }
+               }
+               
+               return accessMap;
+       }
+       
+       private AccessControlEntry[] getEffectiveAccessControlEntries(Session 
session, String absPath) throws RepositoryException {
+               AccessControlManager accessControlManager = 
AccessControlUtil.getAccessControlManager(session);
+               AccessControlPolicy[] policies = 
accessControlManager.getEffectivePolicies(absPath);
+               for (AccessControlPolicy accessControlPolicy : policies) {
+                       if (accessControlPolicy instanceof AccessControlList) {
+                               AccessControlEntry[] accessControlEntries = 
((AccessControlList)accessControlPolicy).getAccessControlEntries();
+                               return accessControlEntries;
+                       }
+               }
+               return new AccessControlEntry[0];
+       }
+
+       /**
+        * Returns the effective access rights for the specified Node for the 
given
+        * principalId.
+        * 
+        * @param node the JCR node to retrieve the access rights for
+        * @param principalId the principalId to get the access rights for
+        * @return access rights for the specified principal
+        * @throws RepositoryException
+        */
+       public AccessRights getEffectiveAccessRightsForPrincipal(Node node, 
String principalId) throws RepositoryException {
+               return getEffectiveAccessRightsForPrincipal(node.getSession(), 
node.getPath(), principalId);
+       }
+
+       /**
+        * Returns the effective access rights for the resource at the 
specified path for the given
+        * principalId.
+        * 
+        * @param session the current JCR session
+        * @param absPath the path of the resource to retrieve the rights for
+        * @param principalId the principalId to get the access rights for
+        * @return access rights for the specified principal
+        * @throws RepositoryException
+        */
+       public AccessRights getEffectiveAccessRightsForPrincipal(Session 
session, String absPath, String principalId) throws RepositoryException {
+               AccessRights rights = new AccessRights();
+               if (principalId != null && principalId.length() > 0) {
+                       AccessControlManager accessControlManager = 
AccessControlUtil.getAccessControlManager(session);
+                       AccessControlPolicy[] policies = 
accessControlManager.getEffectivePolicies(absPath);
+                       for (AccessControlPolicy accessControlPolicy : 
policies) {
+                               if (accessControlPolicy instanceof 
AccessControlList) {
+                                       AccessControlEntry[] 
accessControlEntries = 
((AccessControlList)accessControlPolicy).getAccessControlEntries();
+                                       for (AccessControlEntry ace : 
accessControlEntries) {
+                                               if 
(principalId.equals(ace.getPrincipal().getName())) {
+                                                       boolean isAllow = 
AccessControlUtil.isAllow(ace);
+                                                       if (isAllow) {
+                                                               
rights.getGranted().addAll(Arrays.asList(ace.getPrivileges()));
+                                                       } else {
+                                                               
rights.getDenied().addAll(Arrays.asList(ace.getPrivileges()));
+                                                       }
+                                               }
+                                       }
+                               }
+                       }
+               }
+               
+               return rights;
+       }
+       
+       
+       
+       /**
+        * Checks whether the current user has been granted privileges
+        * to add children to the specified node.
+        *  
+        * @param node the node to check
+        * @return true if the current user has the privileges, false otherwise
+        */
+       public boolean canAddChildren(Node node) {
+               try {
+                       return canAddChildren(node.getSession(), 
node.getPath());
+               } catch (RepositoryException e) {
+                       return false;
+               }
+       }
+       
+       /**
+        * Checks whether the current user has been granted privileges
+        * to add children to the specified path.
+        *  
+        * @param session the JCR session of the current user
+        * @param absPath the path of the resource to check
+        * @return true if the current user has the privileges, false otherwise
+        */
+       public boolean canAddChildren(Session session, String absPath) {
+               try {
+                       AccessControlManager accessControlManager = 
AccessControlUtil.getAccessControlManager(session);
+                       return accessControlManager.hasPrivileges(absPath, new 
Privilege[] {
+                                                       
accessControlManager.privilegeFromName(Privilege.JCR_ADD_CHILD_NODES)
+                                               });
+               } catch (RepositoryException e) {
+                       return false;
+               }
+       }
+       
+       /**
+        * Checks whether the current user has been granted privileges
+        * to delete children to the specified node.
+        *  
+        * @param node the node to check
+        * @return true if the current user has the privileges, false otherwise
+        */
+       public boolean canDeleteChildren(Node node) {
+               try {
+                       return canDeleteChildren(node.getSession(), 
node.getPath());
+               } catch (RepositoryException e) {
+                       return false;
+               }
+       }
+
+       /**
+        * Checks whether the current user has been granted privileges
+        * to delete children of the specified path.
+        *  
+        * @param session the JCR session of the current user
+        * @param absPath the path of the resource to check
+        * @return true if the current user has the privileges, false otherwise
+        */
+       public boolean canDeleteChildren(Session session, String absPath) {
+               try {
+                       AccessControlManager accessControlManager = 
AccessControlUtil.getAccessControlManager(session);
+                       
+                       return accessControlManager.hasPrivileges(absPath, new 
Privilege[] {
+                                                       
accessControlManager.privilegeFromName(Privilege.JCR_REMOVE_CHILD_NODES)
+                                               });
+               } catch (RepositoryException e) {
+                       return false;
+               }
+       }
+       
+       /**
+        * Checks whether the current user has been granted privileges
+        * to delete the specified node.
+        *  
+        * @param node the node to check
+        * @return true if the current user has the privileges, false otherwise
+        */
+       public boolean canDelete(Node node) {
+               try {
+                       return canDelete(node.getSession(), node.getPath());
+               } catch (RepositoryException e) {
+                       return false;
+               }
+       }
+       
+       /**
+        * Checks whether the current user has been granted privileges
+        * to delete the specified path.
+        *  
+        * @param session the JCR session of the current user
+        * @param absPath the path of the resource to check
+        * @return true if the current user has the privileges, false otherwise
+        */
+       public boolean canDelete(Session session, String absPath) {
+               try {
+                       AccessControlManager accessControlManager = 
AccessControlUtil.getAccessControlManager(session);
+                       
+                       String parentPath = absPath.substring(0, 
absPath.lastIndexOf('/'));
+                       boolean canDelete = 
accessControlManager.hasPrivileges(absPath, new Privilege[] {
+                                                       
accessControlManager.privilegeFromName(Privilege.JCR_REMOVE_NODE)
+                                               }) && 
canDeleteChildren(session, parentPath);
+                       return canDelete;
+               } catch (RepositoryException e) {
+                       return false;
+               }
+       }
+
+       /**
+        * Checks whether the current user has been granted privileges
+        * to modify properties of the specified node.
+        *  
+        * @param node the node to check
+        * @return true if the current user has the privileges, false otherwise
+        */
+       public boolean canModifyProperties(Node node) {
+               try {
+                       return canModifyProperties(node.getSession(), 
node.getPath());
+               } catch (RepositoryException e) {
+                       return false;
+               }
+       }
+       
+       /**
+        * Checks whether the current user has been granted privileges
+        * to modify properties of the specified path.
+        *  
+        * @param session the JCR session of the current user
+        * @param absPath the path of the resource to check
+        * @return true if the current user has the privileges, false otherwise
+        */
+       public boolean canModifyProperties(Session session, String absPath) {
+               try {
+                       AccessControlManager accessControlManager = 
AccessControlUtil.getAccessControlManager(session);
+                       return accessControlManager.hasPrivileges(absPath, new 
Privilege[] {
+                                                       
accessControlManager.privilegeFromName(Privilege.JCR_MODIFY_PROPERTIES)
+                                               });
+               } catch (RepositoryException e) {
+                       return false;
+               }
+       }
+       
+       /**
+        * Checks whether the current user has been granted privileges
+        * to read the access control of the specified node.
+        *  
+        * @param node the node to check
+        * @return true if the current user has the privileges, false otherwise
+        */
+       public boolean canReadAccessControl(Node node) {
+               try {
+                       return canReadAccessControl(node.getSession(), 
node.getPath());
+               } catch (RepositoryException e) {
+                       return false;
+               }
+       }
+       
+       /**
+        * Checks whether the current user has been granted privileges
+        * to read the access control of the specified path.
+        *  
+        * @param session the JCR session of the current user
+        * @param absPath the path of the resource to check
+        * @return true if the current user has the privileges, false otherwise
+        */
+       public boolean canReadAccessControl(Session session, String absPath) {
+               try {
+                       AccessControlManager accessControlManager = 
AccessControlUtil.getAccessControlManager(session);
+                       return accessControlManager.hasPrivileges(absPath, new 
Privilege[] {
+                                                       
accessControlManager.privilegeFromName(Privilege.JCR_READ_ACCESS_CONTROL)
+                                               });
+               } catch (RepositoryException e) {
+                       return false;
+               }
+       }
+       
+       /**
+        * Checks whether the current user has been granted privileges
+        * to modify the access control of the specified node.
+        *  
+        * @param node the node to check
+        * @return true if the current user has the privileges, false otherwise
+        */
+       public boolean canModifyAccessControl(Node node) {
+               try {
+                       return canModifyAccessControl(node.getSession(), 
node.getPath());
+               } catch (RepositoryException e) {
+                       return false;
+               }
+       }
+       
+       /**
+        * Checks whether the current user has been granted privileges
+        * to modify the access control of the specified path.
+        *  
+        * @param session the JCR session of the current user
+        * @param absPath the path of the resource to check
+        * @return true if the current user has the privileges, false otherwise
+        */
+       public boolean canModifyAccessControl(Session session, String absPath) {
+               try {
+                       AccessControlManager accessControlManager = 
AccessControlUtil.getAccessControlManager(session);
+                       return accessControlManager.hasPrivileges(absPath, new 
Privilege[] {
+                                                       
accessControlManager.privilegeFromName(Privilege.JCR_MODIFY_ACCESS_CONTROL)
+                                               });
+               } catch (RepositoryException e) {
+                       return false;
+               }
+       }
+
+
+       /**
+        * Checks whether the current user has been granted privileges
+        * to update the properties of the specified principal.
+        *  
+        * @param session the JCR session for the current user
+        * @param principalID the id of the principal to check
+        * @return true if the current user has the privileges, false otherwise
+        */
+       public boolean canUpdateAuthorizable(Session session, String 
principalID) {
+               try {
+                       PrincipalManager principalManager = 
AccessControlUtil.getPrincipalManager(session);
+                       Principal principal = 
principalManager.getPrincipal(principalID);
+                       if (principal == null) {
+                               return false;
+                       }
+
+                       String path = getAuthorizableItemPath(principal);
+                       return canModifyProperties(session, path);
+               } catch (Exception e) {
+                       //just eat it.
+                       return false;
+               }
+       }
+       private String getAuthorizableItemPath(Principal principal)
+                       throws NoSuchMethodException, IllegalAccessException,
+                       InvocationTargetException {
+               //should check if principal implements ItemBasedPrincipal, but 
it is not visible here so use reflection instead
+               Method method = principal.getClass().getMethod("getPath");
+               String path = (String)method.invoke(principal);
+               return path;
+       }
+       
+       /**
+        * Checks whether the current user has been granted privileges
+        * to delete the specified principal.
+        *  
+        * @param session the JCR session for the current user
+        * @param principalID the id of the principal to check
+        * @return true if the current user has the privileges, false otherwise
+        */
+       public boolean canDeleteAuthorizable(Session session, String 
principalID) {
+               try {
+                       PrincipalManager principalManager = 
AccessControlUtil.getPrincipalManager(session);
+                       Principal principal = 
principalManager.getPrincipal(principalID);
+                       if (principal == null) {
+                               return false;
+                       }
+                       
+                       //should check if principal implements 
ItemBasedPrincipal, but it is not visible here so use reflection instead
+                       String path = getAuthorizableItemPath(principal);
+                       return canDelete(session, path);
+               } catch (Exception e) {
+                       //just eat it.
+                       return false;
+               }
+       }
+}
diff --git 
a/src/main/java/org/apache/sling/jcr/jackrabbit/accessmanager/post/AbstractAccessPostServlet.java
 
b/src/main/java/org/apache/sling/jcr/jackrabbit/accessmanager/post/AbstractAccessPostServlet.java
index aa9cf4c..1d73c6a 100644
--- 
a/src/main/java/org/apache/sling/jcr/jackrabbit/accessmanager/post/AbstractAccessPostServlet.java
+++ 
b/src/main/java/org/apache/sling/jcr/jackrabbit/accessmanager/post/AbstractAccessPostServlet.java
@@ -1,254 +1,254 @@
-/*
- * Licensed to the Apache Software Foundation (ASF) under one or more
- * contributor license agreements.  See the NOTICE file distributed with
- * this work for additional information regarding copyright ownership.
- * The ASF licenses this file to You under the Apache License, Version 2.0
- * (the "License"); you may not use this file except in compliance with
- * the License.  You may obtain a copy of the License at
- *
- *      http://www.apache.org/licenses/LICENSE-2.0
- *
- * Unless required by applicable law or agreed to in writing, software
- * distributed under the License is distributed on an "AS IS" BASIS,
- * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
- * See the License for the specific language governing permissions and
- * limitations under the License.
- */
-package org.apache.sling.jcr.jackrabbit.accessmanager.post;
-
-import java.io.IOException;
-import java.util.ArrayList;
-import java.util.List;
-
-import javax.jcr.RepositoryException;
-import javax.jcr.Session;
-import javax.servlet.ServletException;
-import javax.servlet.http.HttpServletRequest;
-import javax.servlet.http.HttpServletResponse;
-
-import org.apache.sling.api.SlingHttpServletRequest;
-import org.apache.sling.api.SlingHttpServletResponse;
-import org.apache.sling.api.resource.ResourceNotFoundException;
-import org.apache.sling.api.resource.ResourceUtil;
-import org.apache.sling.api.servlets.HtmlResponse;
-import org.apache.sling.api.servlets.SlingAllMethodsServlet;
-import org.apache.sling.api.wrappers.SlingRequestPaths;
-import org.apache.sling.servlets.post.Modification;
-import org.apache.sling.servlets.post.SlingPostConstants;
-import org.slf4j.Logger;
-import org.slf4j.LoggerFactory;
-
-/**
- * Base class for all the POST servlets for the AccessManager operations 
- */
-public abstract class AbstractAccessPostServlet extends SlingAllMethodsServlet 
{
-       private static final long serialVersionUID = -5918670409789895333L;
-
-       /**
-     * default log
-     */
-    private final Logger log = LoggerFactory.getLogger(getClass());
-    
-       /* (non-Javadoc)
-        * @see 
org.apache.sling.api.servlets.SlingAllMethodsServlet#doPost(org.apache.sling.api.SlingHttpServletRequest,
 org.apache.sling.api.SlingHttpServletResponse)
-        */
-       @Override
-       protected void doPost(SlingHttpServletRequest request,
-                       SlingHttpServletResponse httpResponse) throws 
ServletException,
-                       IOException {
-        // prepare the response
-        HtmlResponse htmlResponse = new HtmlResponse();
-        htmlResponse.setReferer(request.getHeader("referer"));
-
-        // calculate the paths
-        String path = getItemPath(request);
-        htmlResponse.setPath(path);
-
-        // location
-        htmlResponse.setLocation(externalizePath(request, path));
-
-        // parent location
-        path = ResourceUtil.getParent(path);
-        if (path != null) {
-               htmlResponse.setParentLocation(externalizePath(request, path));
-        }
-
-        Session session = request.getResourceResolver().adaptTo(Session.class);
-
-        final List<Modification> changes = new ArrayList<Modification>();
-        
-        try {
-            handleOperation(request, htmlResponse, changes);
-            
-            //TODO: maybe handle SlingAuthorizablePostProcessor handlers here
-            
-            // set changes on html response
-            for(Modification change : changes) {
-                switch ( change.getType() ) {
-                    case MODIFY : htmlResponse.onModified(change.getSource()); 
break;
-                    case DELETE : htmlResponse.onDeleted(change.getSource()); 
break;
-                    case MOVE :   htmlResponse.onMoved(change.getSource(), 
change.getDestination()); break;
-                    case COPY :   htmlResponse.onCopied(change.getSource(), 
change.getDestination()); break;
-                    case CREATE : htmlResponse.onCreated(change.getSource()); 
break;
-                    case ORDER : htmlResponse.onChange("ordered", 
change.getSource(), change.getDestination()); break;
-                }
-            }
-            
-            if (session.hasPendingChanges()) {
-                session.save();
-            }
-        } catch (ResourceNotFoundException rnfe) {
-            htmlResponse.setStatus(HttpServletResponse.SC_NOT_FOUND,
-                rnfe.getMessage());
-        } catch (Throwable throwable) {
-            log.debug("Exception while handling POST "
-                + request.getResource().getPath() + " with "
-                + getClass().getName(), throwable);
-            htmlResponse.setError(throwable);
-        } finally {
-            try {
-                if (session.hasPendingChanges()) {
-                    session.refresh(false);
-                }
-            } catch (RepositoryException e) {
-                log.warn("RepositoryException in finally block: {}",
-                    e.getMessage(), e);
-            }
-        }
-        
-        // check for redirect URL if processing succeeded
-        if (htmlResponse.isSuccessful()) {
-            String redirect = getRedirectUrl(request, htmlResponse);
-            if (redirect != null) {
-                httpResponse.sendRedirect(redirect);
-                return;
-            }
-        }
-
-        // create a html response and send if unsuccessful or no redirect
-        htmlResponse.send(httpResponse, isSetStatus(request));
-       }
-
-       /**
-        * Extending Servlet should implement this operation to do the work
-        * 
-        * @param request the sling http request to process
-        * @param htmlResponse the response 
-        * @param changes 
-        */
-       abstract protected void handleOperation(SlingHttpServletRequest request,
-                       HtmlResponse htmlResponse, List<Modification> changes) 
throws RepositoryException;
-       
-       
-    /**
-     * compute redirect URL (SLING-126)
-     *
-     * @param ctx the post processor
-     * @return the redirect location or <code>null</code>
-     */
-    protected String getRedirectUrl(HttpServletRequest request, HtmlResponse 
ctx) {
-        // redirect param has priority (but see below, magic star)
-        String result = 
request.getParameter(SlingPostConstants.RP_REDIRECT_TO);
-        if (result != null && ctx.getPath() != null) {
-
-            // redirect to created/modified Resource
-            int star = result.indexOf('*');
-            if (star >= 0) {
-                StringBuffer buf = new StringBuffer();
-
-                // anything before the star
-                if (star > 0) {
-                    buf.append(result.substring(0, star));
-                }
-
-                // append the name of the manipulated node
-                buf.append(ResourceUtil.getName(ctx.getPath()));
-
-                // anything after the star
-                if (star < result.length() - 1) {
-                    buf.append(result.substring(star + 1));
-                }
-
-                // use the created path as the redirect result
-                result = buf.toString();
-
-            } else if 
(result.endsWith(SlingPostConstants.DEFAULT_CREATE_SUFFIX)) {
-                // if the redirect has a trailing slash, append modified node
-                // name
-                result = result.concat(ResourceUtil.getName(ctx.getPath()));
-            }
-
-            if (log.isDebugEnabled()) {
-                log.debug("Will redirect to " + result);
-            }
-        }
-        return result;
-    }
-
-    protected boolean isSetStatus(SlingHttpServletRequest request) {
-        String statusParam = 
request.getParameter(SlingPostConstants.RP_STATUS);
-        if (statusParam == null) {
-            log.debug(
-                "getStatusMode: Parameter {} not set, assuming standard status 
code",
-                SlingPostConstants.RP_STATUS);
-            return true;
-        }
-
-        if (SlingPostConstants.STATUS_VALUE_BROWSER.equals(statusParam)) {
-            log.debug(
-                "getStatusMode: Parameter {} asks for user-friendly status 
code",
-                SlingPostConstants.RP_STATUS);
-            return false;
-        }
-
-        if (SlingPostConstants.STATUS_VALUE_STANDARD.equals(statusParam)) {
-            log.debug(
-                "getStatusMode: Parameter {} asks for standard status code",
-                SlingPostConstants.RP_STATUS);
-            return true;
-        }
-
-        log.debug(
-            "getStatusMode: Parameter {} set to unknown value {}, assuming 
standard status code",
-            SlingPostConstants.RP_STATUS);
-        return true;
-    }
-       
-       // ------ These methods were copied from AbstractSlingPostOperation 
------
-
-    /**
-     * Returns the path of the resource of the request as the item path.
-     * <p>
-     * This method may be overwritten by extension if the operation has
-     * different requirements on path processing.
-     */
-    protected String getItemPath(SlingHttpServletRequest request) {
-        return request.getResource().getPath();
-    }
-
-    /**
-     * Returns an external form of the given path prepending the context path
-     * and appending a display extension.
-     *
-     * @param path the path to externalize
-     * @return the url
-     */
-    protected final String externalizePath(SlingHttpServletRequest request,
-            String path) {
-        StringBuffer ret = new StringBuffer();
-        ret.append(SlingRequestPaths.getContextPath(request));
-        ret.append(request.getResourceResolver().map(path));
-
-        // append optional extension
-        String ext = 
request.getParameter(SlingPostConstants.RP_DISPLAY_EXTENSION);
-        if (ext != null && ext.length() > 0) {
-            if (ext.charAt(0) != '.') {
-                ret.append('.');
-            }
-            ret.append(ext);
-        }
-
-        return ret.toString();
-    }
-    
-}
+/*
+ * Licensed to the Apache Software Foundation (ASF) under one or more
+ * contributor license agreements.  See the NOTICE file distributed with
+ * this work for additional information regarding copyright ownership.
+ * The ASF licenses this file to You under the Apache License, Version 2.0
+ * (the "License"); you may not use this file except in compliance with
+ * the License.  You may obtain a copy of the License at
+ *
+ *      http://www.apache.org/licenses/LICENSE-2.0
+ *
+ * Unless required by applicable law or agreed to in writing, software
+ * distributed under the License is distributed on an "AS IS" BASIS,
+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+ * See the License for the specific language governing permissions and
+ * limitations under the License.
+ */
+package org.apache.sling.jcr.jackrabbit.accessmanager.post;
+
+import java.io.IOException;
+import java.util.ArrayList;
+import java.util.List;
+
+import javax.jcr.RepositoryException;
+import javax.jcr.Session;
+import javax.servlet.ServletException;
+import javax.servlet.http.HttpServletRequest;
+import javax.servlet.http.HttpServletResponse;
+
+import org.apache.sling.api.SlingHttpServletRequest;
+import org.apache.sling.api.SlingHttpServletResponse;
+import org.apache.sling.api.resource.ResourceNotFoundException;
+import org.apache.sling.api.resource.ResourceUtil;
+import org.apache.sling.api.servlets.HtmlResponse;
+import org.apache.sling.api.servlets.SlingAllMethodsServlet;
+import org.apache.sling.api.wrappers.SlingRequestPaths;
+import org.apache.sling.servlets.post.Modification;
+import org.apache.sling.servlets.post.SlingPostConstants;
+import org.slf4j.Logger;
+import org.slf4j.LoggerFactory;
+
+/**
+ * Base class for all the POST servlets for the AccessManager operations 
+ */
+public abstract class AbstractAccessPostServlet extends SlingAllMethodsServlet 
{
+       private static final long serialVersionUID = -5918670409789895333L;
+
+       /**
+     * default log
+     */
+    private final Logger log = LoggerFactory.getLogger(getClass());
+    
+       /* (non-Javadoc)
+        * @see 
org.apache.sling.api.servlets.SlingAllMethodsServlet#doPost(org.apache.sling.api.SlingHttpServletRequest,
 org.apache.sling.api.SlingHttpServletResponse)
+        */
+       @Override
+       protected void doPost(SlingHttpServletRequest request,
+                       SlingHttpServletResponse httpResponse) throws 
ServletException,
+                       IOException {
+        // prepare the response
+        HtmlResponse htmlResponse = new HtmlResponse();
+        htmlResponse.setReferer(request.getHeader("referer"));
+
+        // calculate the paths
+        String path = getItemPath(request);
+        htmlResponse.setPath(path);
+
+        // location
+        htmlResponse.setLocation(externalizePath(request, path));
+
+        // parent location
+        path = ResourceUtil.getParent(path);
+        if (path != null) {
+               htmlResponse.setParentLocation(externalizePath(request, path));
+        }
+
+        Session session = request.getResourceResolver().adaptTo(Session.class);
+
+        final List<Modification> changes = new ArrayList<Modification>();
+        
+        try {
+            handleOperation(request, htmlResponse, changes);
+            
+            //TODO: maybe handle SlingAuthorizablePostProcessor handlers here
+            
+            // set changes on html response
+            for(Modification change : changes) {
+                switch ( change.getType() ) {
+                    case MODIFY : htmlResponse.onModified(change.getSource()); 
break;
+                    case DELETE : htmlResponse.onDeleted(change.getSource()); 
break;
+                    case MOVE :   htmlResponse.onMoved(change.getSource(), 
change.getDestination()); break;
+                    case COPY :   htmlResponse.onCopied(change.getSource(), 
change.getDestination()); break;
+                    case CREATE : htmlResponse.onCreated(change.getSource()); 
break;
+                    case ORDER : htmlResponse.onChange("ordered", 
change.getSource(), change.getDestination()); break;
+                }
+            }
+            
+            if (session.hasPendingChanges()) {
+                session.save();
+            }
+        } catch (ResourceNotFoundException rnfe) {
+            htmlResponse.setStatus(HttpServletResponse.SC_NOT_FOUND,
+                rnfe.getMessage());
+        } catch (Throwable throwable) {
+            log.debug("Exception while handling POST "
+                + request.getResource().getPath() + " with "
+                + getClass().getName(), throwable);
+            htmlResponse.setError(throwable);
+        } finally {
+            try {
+                if (session.hasPendingChanges()) {
+                    session.refresh(false);
+                }
+            } catch (RepositoryException e) {
+                log.warn("RepositoryException in finally block: {}",
+                    e.getMessage(), e);
+            }
+        }
+        
+        // check for redirect URL if processing succeeded
+        if (htmlResponse.isSuccessful()) {
+            String redirect = getRedirectUrl(request, htmlResponse);
+            if (redirect != null) {
+                httpResponse.sendRedirect(redirect);
+                return;
+            }
+        }
+
+        // create a html response and send if unsuccessful or no redirect
+        htmlResponse.send(httpResponse, isSetStatus(request));
+       }
+
+       /**
+        * Extending Servlet should implement this operation to do the work
+        * 
+        * @param request the sling http request to process
+        * @param htmlResponse the response 
+        * @param changes 
+        */
+       abstract protected void handleOperation(SlingHttpServletRequest request,
+                       HtmlResponse htmlResponse, List<Modification> changes) 
throws RepositoryException;
+       
+       
+    /**
+     * compute redirect URL (SLING-126)
+     *
+     * @param ctx the post processor
+     * @return the redirect location or <code>null</code>
+     */
+    protected String getRedirectUrl(HttpServletRequest request, HtmlResponse 
ctx) {
+        // redirect param has priority (but see below, magic star)
+        String result = 
request.getParameter(SlingPostConstants.RP_REDIRECT_TO);
+        if (result != null && ctx.getPath() != null) {
+
+            // redirect to created/modified Resource
+            int star = result.indexOf('*');
+            if (star >= 0) {
+                StringBuffer buf = new StringBuffer();
+
+                // anything before the star
+                if (star > 0) {
+                    buf.append(result.substring(0, star));
+                }
+
+                // append the name of the manipulated node
+                buf.append(ResourceUtil.getName(ctx.getPath()));
+
+                // anything after the star
+                if (star < result.length() - 1) {
+                    buf.append(result.substring(star + 1));
+                }
+
+                // use the created path as the redirect result
+                result = buf.toString();
+
+            } else if 
(result.endsWith(SlingPostConstants.DEFAULT_CREATE_SUFFIX)) {
+                // if the redirect has a trailing slash, append modified node
+                // name
+                result = result.concat(ResourceUtil.getName(ctx.getPath()));
+            }
+
+            if (log.isDebugEnabled()) {
+                log.debug("Will redirect to " + result);
+            }
+        }
+        return result;
+    }
+
+    protected boolean isSetStatus(SlingHttpServletRequest request) {
+        String statusParam = 
request.getParameter(SlingPostConstants.RP_STATUS);
+        if (statusParam == null) {
+            log.debug(
+                "getStatusMode: Parameter {} not set, assuming standard status 
code",
+                SlingPostConstants.RP_STATUS);
+            return true;
+        }
+
+        if (SlingPostConstants.STATUS_VALUE_BROWSER.equals(statusParam)) {
+            log.debug(
+                "getStatusMode: Parameter {} asks for user-friendly status 
code",
+                SlingPostConstants.RP_STATUS);
+            return false;
+        }
+
+        if (SlingPostConstants.STATUS_VALUE_STANDARD.equals(statusParam)) {
+            log.debug(
+                "getStatusMode: Parameter {} asks for standard status code",
+                SlingPostConstants.RP_STATUS);
+            return true;
+        }
+
+        log.debug(
+            "getStatusMode: Parameter {} set to unknown value {}, assuming 
standard status code",
+            SlingPostConstants.RP_STATUS);
+        return true;
+    }
+       
+       // ------ These methods were copied from AbstractSlingPostOperation 
------
+
+    /**
+     * Returns the path of the resource of the request as the item path.
+     * <p>
+     * This method may be overwritten by extension if the operation has
+     * different requirements on path processing.
+     */
+    protected String getItemPath(SlingHttpServletRequest request) {
+        return request.getResource().getPath();
+    }
+
+    /**
+     * Returns an external form of the given path prepending the context path
+     * and appending a display extension.
+     *
+     * @param path the path to externalize
+     * @return the url
+     */
+    protected final String externalizePath(SlingHttpServletRequest request,
+            String path) {
+        StringBuffer ret = new StringBuffer();
+        ret.append(SlingRequestPaths.getContextPath(request));
+        ret.append(request.getResourceResolver().map(path));
+
+        // append optional extension
+        String ext = 
request.getParameter(SlingPostConstants.RP_DISPLAY_EXTENSION);
+        if (ext != null && ext.length() > 0) {
+            if (ext.charAt(0) != '.') {
+                ret.append('.');
+            }
+            ret.append(ext);
+        }
+
+        return ret.toString();
+    }
+    
+}
diff --git 
a/src/main/java/org/apache/sling/jcr/jackrabbit/accessmanager/post/DeleteAcesServlet.java
 
b/src/main/java/org/apache/sling/jcr/jackrabbit/accessmanager/post/DeleteAcesServlet.java
index bcb0a3e..3c5b28d 100644
--- 
a/src/main/java/org/apache/sling/jcr/jackrabbit/accessmanager/post/DeleteAcesServlet.java
+++ 
b/src/main/java/org/apache/sling/jcr/jackrabbit/accessmanager/post/DeleteAcesServlet.java
@@ -1,128 +1,128 @@
-/*
- * Licensed to the Apache Software Foundation (ASF) under one or more
- * contributor license agreements.  See the NOTICE file distributed with
- * this work for additional information regarding copyright ownership.
- * The ASF licenses this file to You under the Apache License, Version 2.0
- * (the "License"); you may not use this file except in compliance with
- * the License.  You may obtain a copy of the License at
- *
- *      http://www.apache.org/licenses/LICENSE-2.0
- *
- * Unless required by applicable law or agreed to in writing, software
- * distributed under the License is distributed on an "AS IS" BASIS,
- * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
- * See the License for the specific language governing permissions and
- * limitations under the License.
- */
-package org.apache.sling.jcr.jackrabbit.accessmanager.post;
-
-import java.util.ArrayList;
-import java.util.Arrays;
-import java.util.HashSet;
-import java.util.List;
-import java.util.Set;
-
-import javax.jcr.Item;
-import javax.jcr.RepositoryException;
-import javax.jcr.Session;
-
-import org.apache.jackrabbit.api.jsr283.security.AccessControlEntry;
-import org.apache.jackrabbit.api.jsr283.security.AccessControlList;
-import org.apache.jackrabbit.api.jsr283.security.AccessControlManager;
-import org.apache.jackrabbit.api.jsr283.security.AccessControlPolicy;
-import org.apache.jackrabbit.api.jsr283.security.AccessControlPolicyIterator;
-import org.apache.sling.api.SlingHttpServletRequest;
-import org.apache.sling.api.resource.Resource;
-import org.apache.sling.api.resource.ResourceNotFoundException;
-import org.apache.sling.api.servlets.HtmlResponse;
-import org.apache.sling.jcr.base.util.AccessControlUtil;
-import org.apache.sling.servlets.post.Modification;
-import org.apache.sling.servlets.post.SlingPostConstants;
-
-/**
- * Sling Post Servlet implementation for deleting the ACE for a set of 
principals on
- * a JCR resource.
- * 
- * @scr.component immediate="true" 
- * @scr.service interface="javax.servlet.Servlet"
- * @scr.property name="sling.servlet.resourceTypes" 
value="sling/servlet/default"
- * @scr.property name="sling.servlet.methods" value="POST" 
- * @scr.property name="sling.servlet.selectors" value="deleteAce" 
- */
-public class DeleteAcesServlet extends AbstractAccessPostServlet {
-       private static final long serialVersionUID = 3784866802938282971L;
-
-       /* (non-Javadoc)
-        * @see 
org.apache.sling.jackrabbit.accessmanager.post.AbstractAccessPostServlet#handleOperation(org.apache.sling.api.SlingHttpServletRequest,
 org.apache.sling.api.servlets.HtmlResponse, java.util.List)
-        */
-       @Override
-       protected void handleOperation(SlingHttpServletRequest request,
-                       HtmlResponse htmlResponse, List<Modification> changes)
-                       throws RepositoryException {
-               
-        String[] applyTo = 
request.getParameterValues(SlingPostConstants.RP_APPLY_TO);
-        if (applyTo == null) {
-                       throw new RepositoryException("principalIds were not 
sumitted.");
-        } else {
-               String resourcePath = null;
-               Resource resource = request.getResource();
-               if (resource == null) {
-                       throw new ResourceNotFoundException("Resource not 
found.");
-               } else {
-                       Item item = resource.adaptTo(Item.class);
-                       if (item != null) {
-                               resourcePath = item.getPath();
-                       } else {
-                               throw new ResourceNotFoundException("Resource 
is not a JCR Node");
-                       }
-               }
-               
-               Session session = 
request.getResourceResolver().adaptTo(Session.class);
-               if (session == null) {
-                       throw new RepositoryException("JCR Session not found");
-               }
-               
-               //load the principalIds array into a set for quick lookup below
-                       Set<String> pidSet = new HashSet<String>();
-                       pidSet.addAll(Arrays.asList(applyTo));
-                       
-                       try {
-                               AccessControlManager accessControlManager = 
AccessControlUtil.getAccessControlManager(session);
-                               AccessControlList updatedAcl = null;
-                               AccessControlPolicyIterator applicablePolicies 
= accessControlManager.getApplicablePolicies(resourcePath);
-                               while (applicablePolicies.hasNext()) {
-                                       AccessControlPolicy policy = 
applicablePolicies.nextAccessControlPolicy();
-                                       if (policy instanceof 
AccessControlList) {
-                                               updatedAcl = 
(AccessControlList)policy;
-                                               break;
-                                       }
-                               }
-                               if (updatedAcl == null) {
-                                       throw new RepositoryException("Unable 
to find an access control policy to update.");
-                               }
-                               
-                               //keep track of the existing Aces for the 
target principal
-                               AccessControlEntry[] accessControlEntries = 
updatedAcl.getAccessControlEntries();
-                               List<AccessControlEntry> oldAces = new 
ArrayList<AccessControlEntry>();
-                               for (AccessControlEntry ace : 
accessControlEntries) {
-                                       if 
(pidSet.contains(ace.getPrincipal().getName())) {
-                                               oldAces.add(ace);
-                                       }
-                               }
-
-                               //remove the old aces
-                               if (!oldAces.isEmpty()) {
-                                       for (AccessControlEntry ace : oldAces) {
-                                               
updatedAcl.removeAccessControlEntry(ace);
-                                       }
-                               }
-                               
-                               //apply the changed policy
-                               accessControlManager.setPolicy(resourcePath, 
updatedAcl);
-                       } catch (RepositoryException re) {
-                               throw new RepositoryException("Failed to delete 
access control.", re);
-                       }
-        }
-       }
-
-}
+/*
+ * Licensed to the Apache Software Foundation (ASF) under one or more
+ * contributor license agreements.  See the NOTICE file distributed with
+ * this work for additional information regarding copyright ownership.
+ * The ASF licenses this file to You under the Apache License, Version 2.0
+ * (the "License"); you may not use this file except in compliance with
+ * the License.  You may obtain a copy of the License at
+ *
+ *      http://www.apache.org/licenses/LICENSE-2.0
+ *
+ * Unless required by applicable law or agreed to in writing, software
+ * distributed under the License is distributed on an "AS IS" BASIS,
+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+ * See the License for the specific language governing permissions and
+ * limitations under the License.
+ */
+package org.apache.sling.jcr.jackrabbit.accessmanager.post;
+
+import java.util.ArrayList;
+import java.util.Arrays;
+import java.util.HashSet;
+import java.util.List;
+import java.util.Set;
+
+import javax.jcr.Item;
+import javax.jcr.RepositoryException;
+import javax.jcr.Session;
+
+import org.apache.jackrabbit.api.jsr283.security.AccessControlEntry;
+import org.apache.jackrabbit.api.jsr283.security.AccessControlList;
+import org.apache.jackrabbit.api.jsr283.security.AccessControlManager;
+import org.apache.jackrabbit.api.jsr283.security.AccessControlPolicy;
+import org.apache.jackrabbit.api.jsr283.security.AccessControlPolicyIterator;
+import org.apache.sling.api.SlingHttpServletRequest;
+import org.apache.sling.api.resource.Resource;
+import org.apache.sling.api.resource.ResourceNotFoundException;
+import org.apache.sling.api.servlets.HtmlResponse;
+import org.apache.sling.jcr.base.util.AccessControlUtil;
+import org.apache.sling.servlets.post.Modification;
+import org.apache.sling.servlets.post.SlingPostConstants;
+
+/**
+ * Sling Post Servlet implementation for deleting the ACE for a set of 
principals on
+ * a JCR resource.
+ * 
+ * @scr.component immediate="true" 
+ * @scr.service interface="javax.servlet.Servlet"
+ * @scr.property name="sling.servlet.resourceTypes" 
value="sling/servlet/default"
+ * @scr.property name="sling.servlet.methods" value="POST" 
+ * @scr.property name="sling.servlet.selectors" value="deleteAce" 
+ */
+public class DeleteAcesServlet extends AbstractAccessPostServlet {
+       private static final long serialVersionUID = 3784866802938282971L;
+
+       /* (non-Javadoc)
+        * @see 
org.apache.sling.jackrabbit.accessmanager.post.AbstractAccessPostServlet#handleOperation(org.apache.sling.api.SlingHttpServletRequest,
 org.apache.sling.api.servlets.HtmlResponse, java.util.List)
+        */
+       @Override
+       protected void handleOperation(SlingHttpServletRequest request,
+                       HtmlResponse htmlResponse, List<Modification> changes)
+                       throws RepositoryException {
+               
+        String[] applyTo = 
request.getParameterValues(SlingPostConstants.RP_APPLY_TO);
+        if (applyTo == null) {
+                       throw new RepositoryException("principalIds were not 
sumitted.");
+        } else {
+               String resourcePath = null;
+               Resource resource = request.getResource();
+               if (resource == null) {
+                       throw new ResourceNotFoundException("Resource not 
found.");
+               } else {
+                       Item item = resource.adaptTo(Item.class);
+                       if (item != null) {
+                               resourcePath = item.getPath();
+                       } else {
+                               throw new ResourceNotFoundException("Resource 
is not a JCR Node");
+                       }
+               }
+               
+               Session session = 
request.getResourceResolver().adaptTo(Session.class);
+               if (session == null) {
+                       throw new RepositoryException("JCR Session not found");
+               }
+               
+               //load the principalIds array into a set for quick lookup below
+                       Set<String> pidSet = new HashSet<String>();
+                       pidSet.addAll(Arrays.asList(applyTo));
+                       
+                       try {
+                               AccessControlManager accessControlManager = 
AccessControlUtil.getAccessControlManager(session);
+                               AccessControlList updatedAcl = null;
+                               AccessControlPolicyIterator applicablePolicies 
= accessControlManager.getApplicablePolicies(resourcePath);
+                               while (applicablePolicies.hasNext()) {
+                                       AccessControlPolicy policy = 
applicablePolicies.nextAccessControlPolicy();
+                                       if (policy instanceof 
AccessControlList) {
+                                               updatedAcl = 
(AccessControlList)policy;
+                                               break;
+                                       }
+                               }
+                               if (updatedAcl == null) {
+                                       throw new RepositoryException("Unable 
to find an access control policy to update.");
+                               }
+                               
+                               //keep track of the existing Aces for the 
target principal
+                               AccessControlEntry[] accessControlEntries = 
updatedAcl.getAccessControlEntries();
+                               List<AccessControlEntry> oldAces = new 
ArrayList<AccessControlEntry>();
+                               for (AccessControlEntry ace : 
accessControlEntries) {
+                                       if 
(pidSet.contains(ace.getPrincipal().getName())) {
+                                               oldAces.add(ace);
+                                       }
+                               }
+
+                               //remove the old aces
+                               if (!oldAces.isEmpty()) {
+                                       for (AccessControlEntry ace : oldAces) {
+                                               
updatedAcl.removeAccessControlEntry(ace);
+                                       }
+                               }
+                               
+                               //apply the changed policy
+                               accessControlManager.setPolicy(resourcePath, 
updatedAcl);
+                       } catch (RepositoryException re) {
+                               throw new RepositoryException("Failed to delete 
access control.", re);
+                       }
+        }
+       }
+
+}
diff --git 
a/src/main/java/org/apache/sling/jcr/jackrabbit/accessmanager/post/GetAclServlet.java
 
b/src/main/java/org/apache/sling/jcr/jackrabbit/accessmanager/post/GetAclServlet.java
index 1104e24..586ec57 100644
--- 
a/src/main/java/org/apache/sling/jcr/jackrabbit/accessmanager/post/GetAclServlet.java
+++ 
b/src/main/java/org/apache/sling/jcr/jackrabbit/accessmanager/post/GetAclServlet.java
@@ -1,180 +1,180 @@
-/*
- * Licensed to the Apache Software Foundation (ASF) under one or more
- * contributor license agreements.  See the NOTICE file distributed with
- * this work for additional information regarding copyright ownership.
- * The ASF licenses this file to You under the Apache License, Version 2.0
- * (the "License"); you may not use this file except in compliance with
- * the License.  You may obtain a copy of the License at
- *
- *      http://www.apache.org/licenses/LICENSE-2.0
- *
- * Unless required by applicable law or agreed to in writing, software
- * distributed under the License is distributed on an "AS IS" BASIS,
- * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
- * See the License for the specific language governing permissions and
- * limitations under the License.
- */
-package org.apache.sling.jcr.jackrabbit.accessmanager.post;
-
-import java.io.IOException;
-import java.security.Principal;
-import java.util.LinkedHashMap;
-import java.util.LinkedHashSet;
-import java.util.Map;
-import java.util.Set;
-import java.util.Map.Entry;
-
-import javax.jcr.AccessDeniedException;
-import javax.jcr.Item;
-import javax.jcr.RepositoryException;
-import javax.jcr.Session;
-import javax.servlet.ServletException;
-import javax.servlet.http.HttpServletResponse;
-
-import org.apache.jackrabbit.api.jsr283.security.AccessControlEntry;
-import org.apache.jackrabbit.api.jsr283.security.AccessControlList;
-import org.apache.jackrabbit.api.jsr283.security.AccessControlManager;
-import org.apache.jackrabbit.api.jsr283.security.AccessControlPolicy;
-import org.apache.jackrabbit.api.jsr283.security.Privilege;
-import org.apache.sling.api.SlingHttpServletRequest;
-import org.apache.sling.api.SlingHttpServletResponse;
-import org.apache.sling.api.resource.Resource;
-import org.apache.sling.api.resource.ResourceNotFoundException;
-import org.apache.sling.api.servlets.SlingAllMethodsServlet;
-import org.apache.sling.commons.json.JSONObject;
-import org.apache.sling.jcr.base.util.AccessControlUtil;
-import org.slf4j.Logger;
-import org.slf4j.LoggerFactory;
-
-/**
- * Sling GET servlet implementation for dumping the declared ACL of a resource
- * to JSON.
- * 
- * @scr.component immediate="true" 
- * @scr.service interface="javax.servlet.Servlet"
- * @scr.property name="sling.servlet.resourceTypes" 
value="sling/servlet/default"
- * @scr.property name="sling.servlet.methods" value="GET" 
- * @scr.property name="sling.servlet.selectors" value="acl" 
- * @scr.property name="sling.servlet.extensions " value="json" 
- */
-public class GetAclServlet extends SlingAllMethodsServlet {
-       private static final long serialVersionUID = 3391376559396223184L;
-
-       /**
-     * default log
-     */
-    private final Logger log = LoggerFactory.getLogger(getClass());
-
-       /* (non-Javadoc)
-        * @see 
org.apache.sling.api.servlets.SlingSafeMethodsServlet#doGet(org.apache.sling.api.SlingHttpServletRequest,
 org.apache.sling.api.SlingHttpServletResponse)
-        */
-       @Override
-       protected void doGet(SlingHttpServletRequest request,
-                       SlingHttpServletResponse response) throws 
ServletException,
-                       IOException {
-               
-        try {
-               Session session = 
request.getResourceResolver().adaptTo(Session.class);
-               if (session == null) {
-                       throw new RepositoryException("JCR Session not found");
-               }
-               
-               String resourcePath = null;
-               Resource resource = request.getResource();
-               if (resource == null) {
-                       throw new ResourceNotFoundException("Resource not 
found.");
-               } else {
-                       Item item = resource.adaptTo(Item.class);
-                       if (item != null) {
-                               resourcePath = item.getPath();
-                       } else {
-                               throw new ResourceNotFoundException("Resource 
is not a JCR Node");
-                       }
-               }
-
-               AccessControlEntry[] declaredAccessControlEntries = 
getDeclaredAccessControlEntries(session, resourcePath);
-               Map<String, Map<String, Set<String>>> aclMap = new 
LinkedHashMap<String, Map<String,Set<String>>>();
-               for (AccessControlEntry ace : declaredAccessControlEntries) {
-                       Principal principal = ace.getPrincipal();
-                       Map<String, Set<String>> map = 
aclMap.get(principal.getName());
-                       if (map == null) {
-                               map = new LinkedHashMap<String, Set<String>>();
-                               aclMap.put(principal.getName(), map);
-                       }
-
-                       boolean allow = AccessControlUtil.isAllow(ace);
-                       if (allow) {
-                               Set<String> grantedSet = map.get("granted");
-                               if (grantedSet == null) {
-                                       grantedSet = new 
LinkedHashSet<String>();
-                                       map.put("granted", grantedSet);
-                               }
-                               Privilege[] privileges = ace.getPrivileges();
-                               for (Privilege privilege : privileges) {
-                                       grantedSet.add(privilege.getName());
-                               }
-                       } else {
-                               Set<String> deniedSet = map.get("denied");
-                               if (deniedSet == null) {
-                                       deniedSet = new LinkedHashSet<String>();
-                                       map.put("denied", deniedSet);
-                               }
-                               Privilege[] privileges = ace.getPrivileges();
-                               for (Privilege privilege : privileges) {
-                                       deniedSet.add(privilege.getName());
-                               }
-                       }
-               }
-               
-
-               response.setContentType("application/json");
-               response.setCharacterEncoding("UTF-8");
-
-               JSONObject jsonObj = new JSONObject();
-               Set<Entry<String, Map<String, Set<String>>>> entrySet = 
aclMap.entrySet();
-               for (Entry<String, Map<String, Set<String>>> entry : entrySet) {
-                       String principalName = entry.getKey();
-                       Map<String, Set<String>> value = entry.getValue();
-                       
-                       JSONObject aceObject = new JSONObject();
-                       Set<String> grantedSet = value.get("granted");
-                       if (grantedSet != null) {
-                       aceObject.put("granted", grantedSet);
-                       }
-                       
-                       Set<String> deniedSet = value.get("denied");
-                       if (deniedSet != null) {
-                               aceObject.put("denied", deniedSet);
-                       }
-
-                       jsonObj.put(principalName, aceObject);
-                       }
-               
-
-            // do the dump
-               jsonObj.write(response.getWriter());
-        } catch (AccessDeniedException ade) {
-               response.sendError(HttpServletResponse.SC_NOT_FOUND);
-        } catch (ResourceNotFoundException rnfe) {
-               response.sendError(HttpServletResponse.SC_NOT_FOUND, 
rnfe.getMessage());
-        } catch (Throwable throwable) {
-            log.debug("Exception while handling GET "
-                + request.getResource().getPath() + " with "
-                + getClass().getName(), throwable);
-            throw new ServletException(throwable);
-        }
-       }
-
-       private AccessControlEntry[] getDeclaredAccessControlEntries(Session 
session, String absPath) throws RepositoryException {
-               AccessControlManager accessControlManager = 
AccessControlUtil.getAccessControlManager(session);
-               AccessControlPolicy[] policies = 
accessControlManager.getPolicies(absPath);
-               for (AccessControlPolicy accessControlPolicy : policies) {
-                       if (accessControlPolicy instanceof AccessControlList) {
-                               AccessControlEntry[] accessControlEntries = 
((AccessControlList)accessControlPolicy).getAccessControlEntries();
-                               return accessControlEntries;
-                       }
-               }
-               return new AccessControlEntry[0];
-       }
-       
-}
+/*
+ * Licensed to the Apache Software Foundation (ASF) under one or more
+ * contributor license agreements.  See the NOTICE file distributed with
+ * this work for additional information regarding copyright ownership.
+ * The ASF licenses this file to You under the Apache License, Version 2.0
+ * (the "License"); you may not use this file except in compliance with
+ * the License.  You may obtain a copy of the License at
+ *
+ *      http://www.apache.org/licenses/LICENSE-2.0
+ *
+ * Unless required by applicable law or agreed to in writing, software
+ * distributed under the License is distributed on an "AS IS" BASIS,
+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+ * See the License for the specific language governing permissions and
+ * limitations under the License.
+ */
+package org.apache.sling.jcr.jackrabbit.accessmanager.post;
+
+import java.io.IOException;
+import java.security.Principal;
+import java.util.LinkedHashMap;
+import java.util.LinkedHashSet;
+import java.util.Map;
+import java.util.Set;
+import java.util.Map.Entry;
+
+import javax.jcr.AccessDeniedException;
+import javax.jcr.Item;
+import javax.jcr.RepositoryException;
+import javax.jcr.Session;
+import javax.servlet.ServletException;
+import javax.servlet.http.HttpServletResponse;
+
+import org.apache.jackrabbit.api.jsr283.security.AccessControlEntry;
+import org.apache.jackrabbit.api.jsr283.security.AccessControlList;
+import org.apache.jackrabbit.api.jsr283.security.AccessControlManager;
+import org.apache.jackrabbit.api.jsr283.security.AccessControlPolicy;
+import org.apache.jackrabbit.api.jsr283.security.Privilege;
+import org.apache.sling.api.SlingHttpServletRequest;
+import org.apache.sling.api.SlingHttpServletResponse;
+import org.apache.sling.api.resource.Resource;
+import org.apache.sling.api.resource.ResourceNotFoundException;
+import org.apache.sling.api.servlets.SlingAllMethodsServlet;
+import org.apache.sling.commons.json.JSONObject;
+import org.apache.sling.jcr.base.util.AccessControlUtil;
+import org.slf4j.Logger;
+import org.slf4j.LoggerFactory;
+
+/**
+ * Sling GET servlet implementation for dumping the declared ACL of a resource
+ * to JSON.
+ * 
+ * @scr.component immediate="true" 
+ * @scr.service interface="javax.servlet.Servlet"
+ * @scr.property name="sling.servlet.resourceTypes" 
value="sling/servlet/default"
+ * @scr.property name="sling.servlet.methods" value="GET" 
+ * @scr.property name="sling.servlet.selectors" value="acl" 
+ * @scr.property name="sling.servlet.extensions " value="json" 
+ */
+public class GetAclServlet extends SlingAllMethodsServlet {
+       private static final long serialVersionUID = 3391376559396223184L;
+
+       /**
+     * default log
+     */
+    private final Logger log = LoggerFactory.getLogger(getClass());
+
+       /* (non-Javadoc)
+        * @see 
org.apache.sling.api.servlets.SlingSafeMethodsServlet#doGet(org.apache.sling.api.SlingHttpServletRequest,
 org.apache.sling.api.SlingHttpServletResponse)
+        */
+       @Override
+       protected void doGet(SlingHttpServletRequest request,
+                       SlingHttpServletResponse response) throws 
ServletException,
+                       IOException {
+               
+        try {
+               Session session = 
request.getResourceResolver().adaptTo(Session.class);
+               if (session == null) {
+                       throw new RepositoryException("JCR Session not found");
+               }
+               
+               String resourcePath = null;
+               Resource resource = request.getResource();
+               if (resource == null) {
+                       throw new ResourceNotFoundException("Resource not 
found.");
+               } else {
+                       Item item = resource.adaptTo(Item.class);
+                       if (item != null) {
+                               resourcePath = item.getPath();
+                       } else {
+                               throw new ResourceNotFoundException("Resource 
is not a JCR Node");
+                       }
+               }
+
+               AccessControlEntry[] declaredAccessControlEntries = 
getDeclaredAccessControlEntries(session, resourcePath);
+               Map<String, Map<String, Set<String>>> aclMap = new 
LinkedHashMap<String, Map<String,Set<String>>>();
+               for (AccessControlEntry ace : declaredAccessControlEntries) {
+                       Principal principal = ace.getPrincipal();
+                       Map<String, Set<String>> map = 
aclMap.get(principal.getName());
+                       if (map == null) {
+                               map = new LinkedHashMap<String, Set<String>>();
+                               aclMap.put(principal.getName(), map);
+                       }
+
+                       boolean allow = AccessControlUtil.isAllow(ace);
+                       if (allow) {
+                               Set<String> grantedSet = map.get("granted");
+                               if (grantedSet == null) {
+                                       grantedSet = new 
LinkedHashSet<String>();
+                                       map.put("granted", grantedSet);
+                               }
+                               Privilege[] privileges = ace.getPrivileges();
+                               for (Privilege privilege : privileges) {
+                                       grantedSet.add(privilege.getName());
+                               }
+                       } else {
+                               Set<String> deniedSet = map.get("denied");
+                               if (deniedSet == null) {
+                                       deniedSet = new LinkedHashSet<String>();
+                                       map.put("denied", deniedSet);
+                               }
+                               Privilege[] privileges = ace.getPrivileges();
+                               for (Privilege privilege : privileges) {
+                                       deniedSet.add(privilege.getName());
+                               }
+                       }
+               }
+               
+
+               response.setContentType("application/json");
+               response.setCharacterEncoding("UTF-8");
+
+               JSONObject jsonObj = new JSONObject();
+               Set<Entry<String, Map<String, Set<String>>>> entrySet = 
aclMap.entrySet();
+               for (Entry<String, Map<String, Set<String>>> entry : entrySet) {
+                       String principalName = entry.getKey();
+                       Map<String, Set<String>> value = entry.getValue();
+                       
+                       JSONObject aceObject = new JSONObject();
+                       Set<String> grantedSet = value.get("granted");
+                       if (grantedSet != null) {
+                       aceObject.put("granted", grantedSet);
+                       }
+                       
+                       Set<String> deniedSet = value.get("denied");
+                       if (deniedSet != null) {
+                               aceObject.put("denied", deniedSet);
+                       }
+
+                       jsonObj.put(principalName, aceObject);
+                       }
+               
+
+            // do the dump
+               jsonObj.write(response.getWriter());
+        } catch (AccessDeniedException ade) {
+               response.sendError(HttpServletResponse.SC_NOT_FOUND);
+        } catch (ResourceNotFoundException rnfe) {
+               response.sendError(HttpServletResponse.SC_NOT_FOUND, 
rnfe.getMessage());
+        } catch (Throwable throwable) {
+            log.debug("Exception while handling GET "
+                + request.getResource().getPath() + " with "
+                + getClass().getName(), throwable);
+            throw new ServletException(throwable);
+        }
+       }
+
+       private AccessControlEntry[] getDeclaredAccessControlEntries(Session 
session, String absPath) throws RepositoryException {
+               AccessControlManager accessControlManager = 
AccessControlUtil.getAccessControlManager(session);
+               AccessControlPolicy[] policies = 
accessControlManager.getPolicies(absPath);
+               for (AccessControlPolicy accessControlPolicy : policies) {
+                       if (accessControlPolicy instanceof AccessControlList) {
+                               AccessControlEntry[] accessControlEntries = 
((AccessControlList)accessControlPolicy).getAccessControlEntries();
+                               return accessControlEntries;
+                       }
+               }
+               return new AccessControlEntry[0];
+       }
+       
+}
diff --git 
a/src/main/java/org/apache/sling/jcr/jackrabbit/accessmanager/post/ModifyAceServlet.java
 
b/src/main/java/org/apache/sling/jcr/jackrabbit/accessmanager/post/ModifyAceServlet.java
index b98f7ac..b6ed930 100644
--- 
a/src/main/java/org/apache/sling/jcr/jackrabbit/accessmanager/post/ModifyAceServlet.java
+++ 
b/src/main/java/org/apache/sling/jcr/jackrabbit/accessmanager/post/ModifyAceServlet.java
@@ -1,241 +1,241 @@
-/*
- * Licensed to the Apache Software Foundation (ASF) under one or more
- * contributor license agreements.  See the NOTICE file distributed with
- * this work for additional information regarding copyright ownership.
- * The ASF licenses this file to You under the Apache License, Version 2.0
- * (the "License"); you may not use this file except in compliance with
- * the License.  You may obtain a copy of the License at
- *
- *      http://www.apache.org/licenses/LICENSE-2.0
- *
- * Unless required by applicable law or agreed to in writing, software
- * distributed under the License is distributed on an "AS IS" BASIS,
- * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
- * See the License for the specific language governing permissions and
- * limitations under the License.
- */
-package org.apache.sling.jcr.jackrabbit.accessmanager.post;
-
-import java.security.Principal;
-import java.util.ArrayList;
-import java.util.Enumeration;
-import java.util.List;
-
-import javax.jcr.Item;
-import javax.jcr.RepositoryException;
-import javax.jcr.Session;
-
-import org.apache.jackrabbit.api.jsr283.security.AccessControlEntry;
-import org.apache.jackrabbit.api.jsr283.security.AccessControlList;
-import org.apache.jackrabbit.api.jsr283.security.AccessControlManager;
-import org.apache.jackrabbit.api.jsr283.security.AccessControlPolicy;
-import org.apache.jackrabbit.api.jsr283.security.AccessControlPolicyIterator;
-import org.apache.jackrabbit.api.jsr283.security.Privilege;
-import org.apache.jackrabbit.api.security.user.Authorizable;
-import org.apache.jackrabbit.api.security.user.UserManager;
-import org.apache.sling.api.SlingHttpServletRequest;
-import org.apache.sling.api.resource.Resource;
-import org.apache.sling.api.resource.ResourceNotFoundException;
-import org.apache.sling.api.servlets.HtmlResponse;
-import org.apache.sling.jcr.base.util.AccessControlUtil;
-import org.apache.sling.servlets.post.Modification;
-import org.slf4j.Logger;
-import org.slf4j.LoggerFactory;
-
-/**
- * Sling Post Servlet implementation for modifying the ACE for a principal on
- * a JCR resource.
- * 
- * @scr.component immediate="true" 
- * @scr.service interface="javax.servlet.Servlet"
- * @scr.property name="sling.servlet.resourceTypes" 
value="sling/servlet/default"
- * @scr.property name="sling.servlet.methods" value="POST" 
- * @scr.property name="sling.servlet.selectors" value="modifyAce" 
- */
-public class ModifyAceServlet extends AbstractAccessPostServlet {
-       private static final long serialVersionUID = -9182485466670280437L;
-
-       /**
-     * default log
-     */
-    private final Logger log = LoggerFactory.getLogger(getClass());
-
-       /* (non-Javadoc)
-        * @see 
org.apache.sling.jackrabbit.accessmanager.post.AbstractAccessPostServlet#handleOperation(org.apache.sling.api.SlingHttpServletRequest,
 org.apache.sling.api.servlets.HtmlResponse, java.util.List)
-        */
-       @SuppressWarnings("unchecked")
-       @Override
-       protected void handleOperation(SlingHttpServletRequest request,
-                       HtmlResponse htmlResponse, List<Modification> changes)
-                       throws RepositoryException {
-               Session session = 
request.getResourceResolver().adaptTo(Session.class);
-               if (session == null) {
-                       throw new RepositoryException("JCR Session not found");
-               }
-
-               String principalId = request.getParameter("principalId");
-               if (principalId == null) {
-                       throw new RepositoryException("principalId was not 
submitted.");
-               }
-               UserManager userManager = 
AccessControlUtil.getUserManager(session);
-               Authorizable authorizable = 
userManager.getAuthorizable(principalId);
-               if (authorizable == null) {
-                       throw new RepositoryException("No principal found for 
id: " + principalId);
-               }
-
-       String resourcePath = null;
-       Resource resource = request.getResource();
-       if (resource == null) {
-                       throw new ResourceNotFoundException("Resource not 
found.");
-       } else {
-               Item item = resource.adaptTo(Item.class);
-               if (item != null) {
-                       resourcePath = item.getPath();
-               } else {
-                       throw new ResourceNotFoundException("Resource is not a 
JCR Node");
-               }
-       }
-               
-               
-               List<String> grantedPrivilegeNames = new ArrayList<String>();
-               List<String> deniedPrivilegeNames = new ArrayList<String>();
-               Enumeration parameterNames = request.getParameterNames();
-               while (parameterNames.hasMoreElements()) {
-                       Object nextElement = parameterNames.nextElement();
-                       if (nextElement instanceof String) {
-                               String paramName = (String)nextElement;
-                               if (paramName.startsWith("privilege@")) {
-                                       String parameterValue = 
request.getParameter(paramName);
-                                       if (parameterValue != null && 
parameterValue.length() > 0) {
-                                               if 
("granted".equals(parameterValue)) {
-                                                       String privilegeName = 
paramName.substring(10);
-                                                       
grantedPrivilegeNames.add(privilegeName);
-                                               } else if 
("denied".equals(parameterValue)) {
-                                                       String privilegeName = 
paramName.substring(10);
-                                                       
deniedPrivilegeNames.add(privilegeName);
-                                               }
-                                       }
-                               }
-                       }
-               }
-
-               try {
-                       AccessControlManager accessControlManager = 
AccessControlUtil.getAccessControlManager(session);
-                       AccessControlList updatedAcl = null;
-                       AccessControlPolicyIterator applicablePolicies = 
accessControlManager.getApplicablePolicies(resourcePath);
-                       while (applicablePolicies.hasNext()) {
-                               AccessControlPolicy policy = 
applicablePolicies.nextAccessControlPolicy();
-                               if (policy instanceof AccessControlList) {
-                                       updatedAcl = (AccessControlList)policy;
-                                       break;
-                               }
-                       }
-                       if (updatedAcl == null) {
-                               throw new RepositoryException("Unable to find 
an access conrol policy to update.");
-                       }
-
-                       StringBuilder oldPrivileges = null;
-                       StringBuilder newPrivileges = null;
-                       if (log.isDebugEnabled()) {
-                               oldPrivileges = new StringBuilder();
-                               newPrivileges = new StringBuilder();
-                       }
-
-                       //keep track of the existing Aces for the target 
principal
-                       AccessControlEntry[] accessControlEntries = 
updatedAcl.getAccessControlEntries();
-                       List<AccessControlEntry> oldAces = new 
ArrayList<AccessControlEntry>();
-                       for (AccessControlEntry ace : accessControlEntries) {
-                               if 
(principalId.equals(ace.getPrincipal().getName())) {
-                                       if (log.isDebugEnabled()) {
-                                               log.debug("Found Existing ACE 
for principal {0} on resource: ", new Object[] {principalId, resourcePath});
-                                       }
-                                       oldAces.add(ace);
-                                       
-                                       if (log.isDebugEnabled()) {
-                                               //collect the information for 
debug logging
-                                               boolean isAllow = 
AccessControlUtil.isAllow(ace);
-                                               Privilege[] privileges = 
ace.getPrivileges();
-                                               for (Privilege privilege : 
privileges) {
-                                                       if 
(oldPrivileges.length() > 0) {
-                                                               
oldPrivileges.append(", "); //separate entries by commas
-                                                       }
-                                                       if (isAllow) {
-                                                               
oldPrivileges.append("granted=");
-                                                       } else {
-                                                               
oldPrivileges.append("denied=");
-                                                       }
-                                                       
oldPrivileges.append(privilege.getName());
-                                               }
-                                       }
-                               }
-                       }
-
-                       //remove the old aces
-                       if (!oldAces.isEmpty()) {
-                               for (AccessControlEntry ace : oldAces) {
-                                       
updatedAcl.removeAccessControlEntry(ace);
-                               }
-                       }
-                       
-                       //add a fresh ACE with the granted privileges
-                       List<Privilege> grantedPrivilegeList = new 
ArrayList<Privilege>();
-                       for (String name : grantedPrivilegeNames) {
-                               if (name.length() == 0) {
-                                       continue; //empty, skip it.
-                               }
-                               Privilege privilege = 
accessControlManager.privilegeFromName(name);
-                               grantedPrivilegeList.add(privilege);
-                                       
-                               if (log.isDebugEnabled()) {
-                                       if (newPrivileges.length() > 0) {
-                                               newPrivileges.append(", "); 
//separate entries by commas
-                                       }
-                                       newPrivileges.append("granted=");
-                                       
newPrivileges.append(privilege.getName());
-                               }
-                       }
-                       if (grantedPrivilegeList.size() > 0) {
-                               Principal principal = 
authorizable.getPrincipal();
-                               updatedAcl.addAccessControlEntry(principal, 
grantedPrivilegeList.toArray(new Privilege[grantedPrivilegeList.size()]));
-                       }
-
-                       //if the authorizable is a user (not a group) process 
any denied privileges
-                       if (!authorizable.isGroup()) {
-                               //add a fresh ACE with the denied privileges
-                               List<Privilege> deniedPrivilegeList = new 
ArrayList<Privilege>();
-                               for (String name : deniedPrivilegeNames) {
-                                       if (name.length() == 0) {
-                                               continue; //empty, skip it.
-                                       }
-                                       Privilege privilege = 
accessControlManager.privilegeFromName(name);
-                                       deniedPrivilegeList.add(privilege);
-
-                                       if (log.isDebugEnabled()) {
-                                               if (newPrivileges.length() > 0) 
{
-                                                       newPrivileges.append(", 
"); //separate entries by commas
-                                               }
-                                               newPrivileges.append("denied=");
-                                               
newPrivileges.append(privilege.getName());
-                                       }
-                               }
-                               if (deniedPrivilegeList.size() > 0) {
-                                       Principal principal = 
authorizable.getPrincipal();
-                                       AccessControlUtil.addEntry(updatedAcl, 
principal, deniedPrivilegeList.toArray(new 
Privilege[deniedPrivilegeList.size()]), false);
-                               }
-                       }
-
-                       accessControlManager.setPolicy(resourcePath, 
updatedAcl);
-                       if (session.hasPendingChanges()) {
-                               session.save();
-                       }
-
-                       if (log.isDebugEnabled()) {
-                               log.debug("Updated ACE for principalId {0} for 
resource {1) from {2} to {3}", new Object [] {
-                                               authorizable.getID(), 
resourcePath, oldPrivileges.toString(), newPrivileges.toString()
-                               });
-                       }
-               } catch (RepositoryException re) {
-                       throw new RepositoryException("Failed to create ace.", 
re);
-               }
-       }
-}
+/*
+ * Licensed to the Apache Software Foundation (ASF) under one or more
+ * contributor license agreements.  See the NOTICE file distributed with
+ * this work for additional information regarding copyright ownership.
+ * The ASF licenses this file to You under the Apache License, Version 2.0
+ * (the "License"); you may not use this file except in compliance with
+ * the License.  You may obtain a copy of the License at
+ *
+ *      http://www.apache.org/licenses/LICENSE-2.0
+ *
+ * Unless required by applicable law or agreed to in writing, software
+ * distributed under the License is distributed on an "AS IS" BASIS,
+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+ * See the License for the specific language governing permissions and
+ * limitations under the License.
+ */
+package org.apache.sling.jcr.jackrabbit.accessmanager.post;
+
+import java.security.Principal;
+import java.util.ArrayList;
+import java.util.Enumeration;
+import java.util.List;
+
+import javax.jcr.Item;
+import javax.jcr.RepositoryException;
+import javax.jcr.Session;
+
+import org.apache.jackrabbit.api.jsr283.security.AccessControlEntry;
+import org.apache.jackrabbit.api.jsr283.security.AccessControlList;
+import org.apache.jackrabbit.api.jsr283.security.AccessControlManager;
+import org.apache.jackrabbit.api.jsr283.security.AccessControlPolicy;
+import org.apache.jackrabbit.api.jsr283.security.AccessControlPolicyIterator;
+import org.apache.jackrabbit.api.jsr283.security.Privilege;
+import org.apache.jackrabbit.api.security.user.Authorizable;
+import org.apache.jackrabbit.api.security.user.UserManager;
+import org.apache.sling.api.SlingHttpServletRequest;
+import org.apache.sling.api.resource.Resource;
+import org.apache.sling.api.resource.ResourceNotFoundException;
+import org.apache.sling.api.servlets.HtmlResponse;
+import org.apache.sling.jcr.base.util.AccessControlUtil;
+import org.apache.sling.servlets.post.Modification;
+import org.slf4j.Logger;
+import org.slf4j.LoggerFactory;
+
+/**
+ * Sling Post Servlet implementation for modifying the ACE for a principal on
+ * a JCR resource.
+ * 
+ * @scr.component immediate="true" 
+ * @scr.service interface="javax.servlet.Servlet"
+ * @scr.property name="sling.servlet.resourceTypes" 
value="sling/servlet/default"
+ * @scr.property name="sling.servlet.methods" value="POST" 
+ * @scr.property name="sling.servlet.selectors" value="modifyAce" 
+ */
+public class ModifyAceServlet extends AbstractAccessPostServlet {
+       private static final long serialVersionUID = -9182485466670280437L;
+
+       /**
+     * default log
+     */
+    private final Logger log = LoggerFactory.getLogger(getClass());
+
+       /* (non-Javadoc)
+        * @see 
org.apache.sling.jackrabbit.accessmanager.post.AbstractAccessPostServlet#handleOperation(org.apache.sling.api.SlingHttpServletRequest,
 org.apache.sling.api.servlets.HtmlResponse, java.util.List)
+        */
+       @SuppressWarnings("unchecked")
+       @Override
+       protected void handleOperation(SlingHttpServletRequest request,
+                       HtmlResponse htmlResponse, List<Modification> changes)
+                       throws RepositoryException {
+               Session session = 
request.getResourceResolver().adaptTo(Session.class);
+               if (session == null) {
+                       throw new RepositoryException("JCR Session not found");
+               }
+
+               String principalId = request.getParameter("principalId");
+               if (principalId == null) {
+                       throw new RepositoryException("principalId was not 
submitted.");
+               }
+               UserManager userManager = 
AccessControlUtil.getUserManager(session);
+               Authorizable authorizable = 
userManager.getAuthorizable(principalId);
+               if (authorizable == null) {
+                       throw new RepositoryException("No principal found for 
id: " + principalId);
+               }
+
+       String resourcePath = null;
+       Resource resource = request.getResource();
+       if (resource == null) {
+                       throw new ResourceNotFoundException("Resource not 
found.");
+       } else {
+               Item item = resource.adaptTo(Item.class);
+               if (item != null) {
+                       resourcePath = item.getPath();
+               } else {
+                       throw new ResourceNotFoundException("Resource is not a 
JCR Node");
+               }
+       }
+               
+               
+               List<String> grantedPrivilegeNames = new ArrayList<String>();
+               List<String> deniedPrivilegeNames = new ArrayList<String>();
+               Enumeration parameterNames = request.getParameterNames();
+               while (parameterNames.hasMoreElements()) {
+                       Object nextElement = parameterNames.nextElement();
+                       if (nextElement instanceof String) {
+                               String paramName = (String)nextElement;
+                               if (paramName.startsWith("privilege@")) {
+                                       String parameterValue = 
request.getParameter(paramName);
+                                       if (parameterValue != null && 
parameterValue.length() > 0) {
+                                               if 
("granted".equals(parameterValue)) {
+                                                       String privilegeName = 
paramName.substring(10);
+                                                       
grantedPrivilegeNames.add(privilegeName);
+                                               } else if 
("denied".equals(parameterValue)) {
+                                                       String privilegeName = 
paramName.substring(10);
+                                                       
deniedPrivilegeNames.add(privilegeName);
+                                               }
+                                       }
+                               }
+                       }
+               }
+
+               try {
+                       AccessControlManager accessControlManager = 
AccessControlUtil.getAccessControlManager(session);
+                       AccessControlList updatedAcl = null;
+                       AccessControlPolicyIterator applicablePolicies = 
accessControlManager.getApplicablePolicies(resourcePath);
+                       while (applicablePolicies.hasNext()) {
+                               AccessControlPolicy policy = 
applicablePolicies.nextAccessControlPolicy();
+                               if (policy instanceof AccessControlList) {
+                                       updatedAcl = (AccessControlList)policy;
+                                       break;
+                               }
+                       }
+                       if (updatedAcl == null) {
+                               throw new RepositoryException("Unable to find 
an access conrol policy to update.");
+                       }
+
+                       StringBuilder oldPrivileges = null;
+                       StringBuilder newPrivileges = null;
+                       if (log.isDebugEnabled()) {
+                               oldPrivileges = new StringBuilder();
+                               newPrivileges = new StringBuilder();
+                       }
+
+                       //keep track of the existing Aces for the target 
principal
+                       AccessControlEntry[] accessControlEntries = 
updatedAcl.getAccessControlEntries();
+                       List<AccessControlEntry> oldAces = new 
ArrayList<AccessControlEntry>();
+                       for (AccessControlEntry ace : accessControlEntries) {
+                               if 
(principalId.equals(ace.getPrincipal().getName())) {
+                                       if (log.isDebugEnabled()) {
+                                               log.debug("Found Existing ACE 
for principal {0} on resource: ", new Object[] {principalId, resourcePath});
+                                       }
+                                       oldAces.add(ace);
+                                       
+                                       if (log.isDebugEnabled()) {
+                                               //collect the information for 
debug logging
+                                               boolean isAllow = 
AccessControlUtil.isAllow(ace);
+                                               Privilege[] privileges = 
ace.getPrivileges();
+                                               for (Privilege privilege : 
privileges) {
+                                                       if 
(oldPrivileges.length() > 0) {
+                                                               
oldPrivileges.append(", "); //separate entries by commas
+                                                       }
+                                                       if (isAllow) {
+                                                               
oldPrivileges.append("granted=");
+                                                       } else {
+                                                               
oldPrivileges.append("denied=");
+                                                       }
+                                                       
oldPrivileges.append(privilege.getName());
+                                               }
+                                       }
+                               }
+                       }
+
+                       //remove the old aces
+                       if (!oldAces.isEmpty()) {
+                               for (AccessControlEntry ace : oldAces) {
+                                       
updatedAcl.removeAccessControlEntry(ace);
+                               }
+                       }
+                       
+                       //add a fresh ACE with the granted privileges
+                       List<Privilege> grantedPrivilegeList = new 
ArrayList<Privilege>();
+                       for (String name : grantedPrivilegeNames) {
+                               if (name.length() == 0) {
+                                       continue; //empty, skip it.
+                               }
+                               Privilege privilege = 
accessControlManager.privilegeFromName(name);
+                               grantedPrivilegeList.add(privilege);
+                                       
+                               if (log.isDebugEnabled()) {
+                                       if (newPrivileges.length() > 0) {
+                                               newPrivileges.append(", "); 
//separate entries by commas
+                                       }
+                                       newPrivileges.append("granted=");
+                                       
newPrivileges.append(privilege.getName());
+                               }
+                       }
+                       if (grantedPrivilegeList.size() > 0) {
+                               Principal principal = 
authorizable.getPrincipal();
+                               updatedAcl.addAccessControlEntry(principal, 
grantedPrivilegeList.toArray(new Privilege[grantedPrivilegeList.size()]));
+                       }
+
+                       //if the authorizable is a user (not a group) process 
any denied privileges
+                       if (!authorizable.isGroup()) {
+                               //add a fresh ACE with the denied privileges
+                               List<Privilege> deniedPrivilegeList = new 
ArrayList<Privilege>();
+                               for (String name : deniedPrivilegeNames) {
+                                       if (name.length() == 0) {
+                                               continue; //empty, skip it.
+                                       }
+                                       Privilege privilege = 
accessControlManager.privilegeFromName(name);
+                                       deniedPrivilegeList.add(privilege);
+
+                                       if (log.isDebugEnabled()) {
+                                               if (newPrivileges.length() > 0) 
{
+                                                       newPrivileges.append(", 
"); //separate entries by commas
+                                               }
+                                               newPrivileges.append("denied=");
+                                               
newPrivileges.append(privilege.getName());
+                                       }
+                               }
+                               if (deniedPrivilegeList.size() > 0) {
+                                       Principal principal = 
authorizable.getPrincipal();
+                                       AccessControlUtil.addEntry(updatedAcl, 
principal, deniedPrivilegeList.toArray(new 
Privilege[deniedPrivilegeList.size()]), false);
+                               }
+                       }
+
+                       accessControlManager.setPolicy(resourcePath, 
updatedAcl);
+                       if (session.hasPendingChanges()) {
+                               session.save();
+                       }
+
+                       if (log.isDebugEnabled()) {
+                               log.debug("Updated ACE for principalId {0} for 
resource {1) from {2} to {3}", new Object [] {
+                                               authorizable.getID(), 
resourcePath, oldPrivileges.toString(), newPrivileges.toString()
+                               });
+                       }
+               } catch (RepositoryException re) {
+                       throw new RepositoryException("Failed to create ace.", 
re);
+               }
+       }
+}
diff --git 
a/src/main/resources/org/apache/sling/jcr/jackrabbit/accessmanager/PrivilegesResources.properties
 
b/src/main/resources/org/apache/sling/jcr/jackrabbit/accessmanager/PrivilegesResources.properties
index a7d1083..9c0112e 100644
--- 
a/src/main/resources/org/apache/sling/jcr/jackrabbit/accessmanager/PrivilegesResources.properties
+++ 
b/src/main/resources/org/apache/sling/jcr/jackrabbit/accessmanager/PrivilegesResources.properties
@@ -1,23 +1,23 @@
-#
-#  Licensed to the Apache Software Foundation (ASF) under one
-#  or more contributor license agreements.  See the NOTICE file
-#  distributed with this work for additional information
-#  regarding copyright ownership.  The ASF licenses this file
-#  to you under the Apache License, Version 2.0 (the
-#  "License"); you may not use this file except in compliance
-#  with the License.  You may obtain a copy of the License at
-#
-#   http://www.apache.org/licenses/LICENSE-2.0
-#
-#  Unless required by applicable law or agreed to in writing,
-#  software distributed under the License is distributed on an
-#  "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY
-#  KIND, either express or implied.  See the License for the
-#  specific language governing permissions and limitations
-#  under the License.
-
-privilegeset.all=Full Control
-privilegeset.readonly=Read Only
-privilegeset.readwrite=Read/Write
-privilegeset.none=None
+#
+#  Licensed to the Apache Software Foundation (ASF) under one
+#  or more contributor license agreements.  See the NOTICE file
+#  distributed with this work for additional information
+#  regarding copyright ownership.  The ASF licenses this file
+#  to you under the Apache License, Version 2.0 (the
+#  "License"); you may not use this file except in compliance
+#  with the License.  You may obtain a copy of the License at
+#
+#   http://www.apache.org/licenses/LICENSE-2.0
+#
+#  Unless required by applicable law or agreed to in writing,
+#  software distributed under the License is distributed on an
+#  "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY
+#  KIND, either express or implied.  See the License for the
+#  specific language governing permissions and limitations
+#  under the License.
+
+privilegeset.all=Full Control
+privilegeset.readonly=Read Only
+privilegeset.readwrite=Read/Write
+privilegeset.none=None
 privilegeset.custom=Custom
\ No newline at end of file

-- 
To stop receiving notification emails like this one, please contact
"[email protected]" <[email protected]>.

Reply via email to