Modified: 
jackrabbit/oak/trunk/oak-core/src/main/java/org/apache/jackrabbit/oak/security/user/PasswordHistory.java
URL: 
http://svn.apache.org/viewvc/jackrabbit/oak/trunk/oak-core/src/main/java/org/apache/jackrabbit/oak/security/user/PasswordHistory.java?rev=1836177&r1=1836176&r2=1836177&view=diff
==============================================================================
--- 
jackrabbit/oak/trunk/oak-core/src/main/java/org/apache/jackrabbit/oak/security/user/PasswordHistory.java
 (original)
+++ 
jackrabbit/oak/trunk/oak-core/src/main/java/org/apache/jackrabbit/oak/security/user/PasswordHistory.java
 Wed Jul 18 14:37:06 2018
@@ -18,7 +18,6 @@ package org.apache.jackrabbit.oak.securi
 
 import java.util.ArrayList;
 import java.util.List;
-import javax.annotation.Nonnull;
 import javax.jcr.AccessDeniedException;
 import javax.jcr.nodetype.ConstraintViolationException;
 
@@ -31,6 +30,7 @@ import org.apache.jackrabbit.oak.spi.sec
 import org.apache.jackrabbit.oak.spi.security.user.UserConstants;
 import org.apache.jackrabbit.oak.spi.security.user.util.PasswordUtil;
 import org.apache.jackrabbit.oak.plugins.tree.TreeUtil;
+import org.jetbrains.annotations.NotNull;
 
 /**
  * Helper class for the password history feature.
@@ -42,7 +42,7 @@ final class PasswordHistory implements U
     private final int maxSize;
     private final boolean isEnabled;
 
-    public PasswordHistory(@Nonnull ConfigurationParameters config) {
+    public PasswordHistory(@NotNull ConfigurationParameters config) {
         maxSize = Math.min(HISTORY_MAX_SIZE, 
config.getConfigValue(UserConstants.PARAM_PASSWORD_HISTORY_SIZE, 
UserConstants.PASSWORD_HISTORY_DISABLED_SIZE));
         isEnabled = maxSize > UserConstants.PASSWORD_HISTORY_DISABLED_SIZE;
     }
@@ -61,7 +61,7 @@ final class PasswordHistory implements U
      * @throws javax.jcr.AccessDeniedException If the rep:pwd tree cannot be
      * accessed.
      */
-    boolean updatePasswordHistory(@Nonnull Tree userTree, @Nonnull String 
password) throws ConstraintViolationException, AccessDeniedException {
+    boolean updatePasswordHistory(@NotNull Tree userTree, @NotNull String 
password) throws ConstraintViolationException, AccessDeniedException {
         boolean updated = false;
         if (isEnabled) {
             checkPasswordInHistory(userTree, password);
@@ -79,7 +79,7 @@ final class PasswordHistory implements U
      * @throws AccessDeniedException If the editing session cannot access or
      * create the rep:pwd node.
      */
-    private void shiftPasswordHistory(@Nonnull Tree userTree) throws 
AccessDeniedException {
+    private void shiftPasswordHistory(@NotNull Tree userTree) throws 
AccessDeniedException {
         String currentPasswordHash = TreeUtil.getString(userTree, 
UserConstants.REP_PASSWORD);
         if (currentPasswordHash != null) {
             Tree passwordTree = getPasswordTree(userTree, true);
@@ -108,7 +108,7 @@ final class PasswordHistory implements U
      * @throws ConstraintViolationException If the passsword is found in the 
history
      * @throws AccessDeniedException If the editing session cannot access the 
rep:pwd node.
      */
-    private void checkPasswordInHistory(@Nonnull Tree userTree, @Nonnull 
String newPassword) throws ConstraintViolationException, AccessDeniedException {
+    private void checkPasswordInHistory(@NotNull Tree userTree, @NotNull 
String newPassword) throws ConstraintViolationException, AccessDeniedException {
         if (PasswordUtil.isSame(TreeUtil.getString(userTree, 
UserConstants.REP_PASSWORD), newPassword)) {
             throw new PasswordHistoryException("New password is identical to 
the current password.");
         }
@@ -125,12 +125,12 @@ final class PasswordHistory implements U
         }
     }
 
-    @Nonnull
-    private static Tree getPasswordTree(@Nonnull Tree userTree, boolean 
doCreate) throws AccessDeniedException {
+    @NotNull
+    private static Tree getPasswordTree(@NotNull Tree userTree, boolean 
doCreate) throws AccessDeniedException {
         if (doCreate) {
             return TreeUtil.getOrAddChild(userTree, UserConstants.REP_PWD, 
UserConstants.NT_REP_PASSWORD);
         } else {
             return userTree.getChild(UserConstants.REP_PWD);
         }
     }
-}
\ No newline at end of file
+}

Modified: 
jackrabbit/oak/trunk/oak-core/src/main/java/org/apache/jackrabbit/oak/security/user/RandomAuthorizableNodeName.java
URL: 
http://svn.apache.org/viewvc/jackrabbit/oak/trunk/oak-core/src/main/java/org/apache/jackrabbit/oak/security/user/RandomAuthorizableNodeName.java?rev=1836177&r1=1836176&r2=1836177&view=diff
==============================================================================
--- 
jackrabbit/oak/trunk/oak-core/src/main/java/org/apache/jackrabbit/oak/security/user/RandomAuthorizableNodeName.java
 (original)
+++ 
jackrabbit/oak/trunk/oak-core/src/main/java/org/apache/jackrabbit/oak/security/user/RandomAuthorizableNodeName.java
 Wed Jul 18 14:37:06 2018
@@ -20,9 +20,8 @@ import static org.apache.jackrabbit.oak.
 
 import java.security.SecureRandom;
 import java.util.Random;
-import javax.annotation.Nonnull;
-
 import org.apache.jackrabbit.oak.spi.security.user.AuthorizableNodeName;
+import org.jetbrains.annotations.NotNull;
 import org.osgi.service.component.annotations.Activate;
 import org.osgi.service.component.annotations.Component;
 import org.osgi.service.component.annotations.ConfigurationPolicy;
@@ -85,9 +84,9 @@ public class RandomAuthorizableNodeName
 
     private int length = DEFAULT_LENGTH;
 
-    @Nonnull
+    @NotNull
     @Override
-    public String generateNodeName(@Nonnull String authorizableId) {
+    public String generateNodeName(@NotNull String authorizableId) {
         Random random = new SecureRandom();
         char[] chars = new char[length];
         for (int i = 0; i < length; i++) {

Modified: 
jackrabbit/oak/trunk/oak-core/src/main/java/org/apache/jackrabbit/oak/security/user/RepMembersConflictHandler.java
URL: 
http://svn.apache.org/viewvc/jackrabbit/oak/trunk/oak-core/src/main/java/org/apache/jackrabbit/oak/security/user/RepMembersConflictHandler.java?rev=1836177&r1=1836176&r2=1836177&view=diff
==============================================================================
--- 
jackrabbit/oak/trunk/oak-core/src/main/java/org/apache/jackrabbit/oak/security/user/RepMembersConflictHandler.java
 (original)
+++ 
jackrabbit/oak/trunk/oak-core/src/main/java/org/apache/jackrabbit/oak/security/user/RepMembersConflictHandler.java
 Wed Jul 18 14:37:06 2018
@@ -20,8 +20,6 @@ package org.apache.jackrabbit.oak.securi
 
 import java.util.Set;
 
-import javax.annotation.Nonnull;
-
 import org.apache.jackrabbit.oak.api.PropertyState;
 import org.apache.jackrabbit.oak.api.Type;
 import org.apache.jackrabbit.oak.plugins.memory.PropertyBuilder;
@@ -29,6 +27,7 @@ import org.apache.jackrabbit.oak.spi.com
 import org.apache.jackrabbit.oak.spi.security.user.UserConstants;
 import org.apache.jackrabbit.oak.spi.state.NodeBuilder;
 import org.apache.jackrabbit.oak.spi.state.NodeState;
+import org.jetbrains.annotations.NotNull;
 
 import com.google.common.collect.Sets;
 
@@ -46,10 +45,10 @@ import com.google.common.collect.Sets;
  */
 public class RepMembersConflictHandler implements ThreeWayConflictHandler {
 
-    @Nonnull
+    @NotNull
     @Override
-    public Resolution addExistingProperty(@Nonnull NodeBuilder parent, 
@Nonnull PropertyState ours,
-            @Nonnull PropertyState theirs) {
+    public Resolution addExistingProperty(@NotNull NodeBuilder parent, 
@NotNull PropertyState ours,
+            @NotNull PropertyState theirs) {
         if (isRepMembersProperty(theirs)) {
             mergeChange(parent, ours, theirs,Sets.newHashSet());
             return Resolution.MERGED;
@@ -59,9 +58,9 @@ public class RepMembersConflictHandler i
     }
 
     @Override
-    @Nonnull
-    public Resolution changeDeletedProperty(@Nonnull NodeBuilder parent, 
@Nonnull PropertyState ours,
-            @Nonnull PropertyState base) {
+    @NotNull
+    public Resolution changeDeletedProperty(@NotNull NodeBuilder parent, 
@NotNull PropertyState ours,
+            @NotNull PropertyState base) {
         if (isRepMembersProperty(ours)) {
             // removing the members property takes precedence
             return Resolution.THEIRS;
@@ -70,10 +69,10 @@ public class RepMembersConflictHandler i
         }
     }
 
-    @Nonnull
+    @NotNull
     @Override
-    public Resolution changeChangedProperty(@Nonnull NodeBuilder parent, 
@Nonnull PropertyState ours,
-            @Nonnull PropertyState theirs, @Nonnull PropertyState base) {
+    public Resolution changeChangedProperty(@NotNull NodeBuilder parent, 
@NotNull PropertyState ours,
+            @NotNull PropertyState theirs, @NotNull PropertyState base) {
         if (isRepMembersProperty(theirs)) {
             Set<String> baseMembers = 
Sets.newHashSet(base.getValue(Type.STRINGS));
             mergeChange(parent, ours, theirs, baseMembers);
@@ -83,17 +82,17 @@ public class RepMembersConflictHandler i
         }
     }
 
-    @Nonnull
+    @NotNull
     @Override
-    public Resolution deleteDeletedProperty(@Nonnull NodeBuilder parent, 
@Nonnull PropertyState base) {
+    public Resolution deleteDeletedProperty(@NotNull NodeBuilder parent, 
@NotNull PropertyState base) {
         // both are removing the members property, ignoring
         return Resolution.IGNORED;
     }
 
-    @Nonnull
+    @NotNull
     @Override
-    public Resolution deleteChangedProperty(@Nonnull NodeBuilder parent, 
@Nonnull PropertyState theirs,
-            @Nonnull PropertyState base) {
+    public Resolution deleteChangedProperty(@NotNull NodeBuilder parent, 
@NotNull PropertyState theirs,
+            @NotNull PropertyState base) {
         if (isRepMembersProperty(theirs)) {
             // removing the members property takes precedence
             return Resolution.OURS;
@@ -103,30 +102,30 @@ public class RepMembersConflictHandler i
     }
 
 
-    @Nonnull
+    @NotNull
     @Override
-    public Resolution addExistingNode(@Nonnull NodeBuilder parent, @Nonnull 
String name, @Nonnull NodeState ours,
-            @Nonnull NodeState theirs) {
+    public Resolution addExistingNode(@NotNull NodeBuilder parent, @NotNull 
String name, @NotNull NodeState ours,
+            @NotNull NodeState theirs) {
         return Resolution.IGNORED;
     }
 
-    @Nonnull
+    @NotNull
     @Override
-    public Resolution changeDeletedNode(@Nonnull NodeBuilder parent, @Nonnull 
String name, @Nonnull NodeState ours,
-            @Nonnull NodeState base) {
+    public Resolution changeDeletedNode(@NotNull NodeBuilder parent, @NotNull 
String name, @NotNull NodeState ours,
+            @NotNull NodeState base) {
         return Resolution.IGNORED;
     }
 
-    @Nonnull
+    @NotNull
     @Override
-    public Resolution deleteChangedNode(@Nonnull NodeBuilder parent, @Nonnull 
String name, @Nonnull NodeState theirs,
-            @Nonnull NodeState base) {
+    public Resolution deleteChangedNode(@NotNull NodeBuilder parent, @NotNull 
String name, @NotNull NodeState theirs,
+            @NotNull NodeState base) {
         return Resolution.IGNORED;
     }
 
-    @Nonnull
+    @NotNull
     @Override
-    public Resolution deleteDeletedNode(@Nonnull NodeBuilder parent, @Nonnull 
String name, @Nonnull NodeState base) {
+    public Resolution deleteDeletedNode(@NotNull NodeBuilder parent, @NotNull 
String name, @NotNull NodeState base) {
         return Resolution.IGNORED;
     }
 

Modified: 
jackrabbit/oak/trunk/oak-core/src/main/java/org/apache/jackrabbit/oak/security/user/SystemUserImpl.java
URL: 
http://svn.apache.org/viewvc/jackrabbit/oak/trunk/oak-core/src/main/java/org/apache/jackrabbit/oak/security/user/SystemUserImpl.java?rev=1836177&r1=1836176&r2=1836177&view=diff
==============================================================================
--- 
jackrabbit/oak/trunk/oak-core/src/main/java/org/apache/jackrabbit/oak/security/user/SystemUserImpl.java
 (original)
+++ 
jackrabbit/oak/trunk/oak-core/src/main/java/org/apache/jackrabbit/oak/security/user/SystemUserImpl.java
 Wed Jul 18 14:37:06 2018
@@ -17,24 +17,24 @@
 package org.apache.jackrabbit.oak.security.user;
 
 import java.security.Principal;
-import javax.annotation.Nonnull;
 import javax.jcr.RepositoryException;
 import javax.jcr.UnsupportedRepositoryOperationException;
 
 import org.apache.jackrabbit.oak.api.Tree;
 import org.apache.jackrabbit.oak.spi.security.user.util.UserUtil;
+import org.jetbrains.annotations.NotNull;
 
 /**
  * Default implementation for a system user.
  */
 class SystemUserImpl extends UserImpl {
 
-    SystemUserImpl(@Nonnull String id, @Nonnull Tree tree, @Nonnull 
UserManagerImpl userManager) throws RepositoryException {
+    SystemUserImpl(@NotNull String id, @NotNull Tree tree, @NotNull 
UserManagerImpl userManager) throws RepositoryException {
         super(id, tree, userManager);
     }
 
     @Override
-    void checkValidTree(@Nonnull Tree tree) throws RepositoryException {
+    void checkValidTree(@NotNull Tree tree) throws RepositoryException {
         super.checkValidTree(tree);
         if (!UserUtil.isSystemUser(tree)) {
             throw new IllegalArgumentException("Invalid user node: node type 
rep:SystemUser expected.");
@@ -65,4 +65,4 @@ class SystemUserImpl extends UserImpl {
     public void changePassword(String password, String oldPassword) throws 
RepositoryException {
         throw new UnsupportedRepositoryOperationException("system user");
     }
-}
\ No newline at end of file
+}

Modified: 
jackrabbit/oak/trunk/oak-core/src/main/java/org/apache/jackrabbit/oak/security/user/SystemUserPrincipalImpl.java
URL: 
http://svn.apache.org/viewvc/jackrabbit/oak/trunk/oak-core/src/main/java/org/apache/jackrabbit/oak/security/user/SystemUserPrincipalImpl.java?rev=1836177&r1=1836176&r2=1836177&view=diff
==============================================================================
--- 
jackrabbit/oak/trunk/oak-core/src/main/java/org/apache/jackrabbit/oak/security/user/SystemUserPrincipalImpl.java
 (original)
+++ 
jackrabbit/oak/trunk/oak-core/src/main/java/org/apache/jackrabbit/oak/security/user/SystemUserPrincipalImpl.java
 Wed Jul 18 14:37:06 2018
@@ -16,11 +16,10 @@
  */
 package org.apache.jackrabbit.oak.security.user;
 
-import javax.annotation.Nonnull;
-
 import org.apache.jackrabbit.oak.api.Tree;
 import org.apache.jackrabbit.oak.namepath.PathMapper;
 import org.apache.jackrabbit.oak.spi.security.principal.SystemUserPrincipal;
+import org.jetbrains.annotations.NotNull;
 
 /**
  * Implementation of the {@code SystemUserPrincipal} for this user management
@@ -28,7 +27,7 @@ import org.apache.jackrabbit.oak.spi.sec
  */
 final class SystemUserPrincipalImpl extends TreeBasedPrincipal implements 
SystemUserPrincipal {
 
-    SystemUserPrincipalImpl(@Nonnull String principalName, @Nonnull Tree tree, 
@Nonnull PathMapper pathMapper) {
+    SystemUserPrincipalImpl(@NotNull String principalName, @NotNull Tree tree, 
@NotNull PathMapper pathMapper) {
         super(principalName, tree, pathMapper);
     }
 }

Modified: 
jackrabbit/oak/trunk/oak-core/src/main/java/org/apache/jackrabbit/oak/security/user/UserAuthentication.java
URL: 
http://svn.apache.org/viewvc/jackrabbit/oak/trunk/oak-core/src/main/java/org/apache/jackrabbit/oak/security/user/UserAuthentication.java?rev=1836177&r1=1836176&r2=1836177&view=diff
==============================================================================
--- 
jackrabbit/oak/trunk/oak-core/src/main/java/org/apache/jackrabbit/oak/security/user/UserAuthentication.java
 (original)
+++ 
jackrabbit/oak/trunk/oak-core/src/main/java/org/apache/jackrabbit/oak/security/user/UserAuthentication.java
 Wed Jul 18 14:37:06 2018
@@ -21,9 +21,6 @@ import java.security.NoSuchAlgorithmExce
 import java.security.Principal;
 import java.util.Collections;
 import java.util.concurrent.TimeUnit;
-import javax.annotation.CheckForNull;
-import javax.annotation.Nonnull;
-import javax.annotation.Nullable;
 import javax.jcr.Credentials;
 import javax.jcr.GuestCredentials;
 import javax.jcr.RepositoryException;
@@ -52,6 +49,8 @@ import org.apache.jackrabbit.oak.spi.sec
 import org.apache.jackrabbit.oak.spi.security.user.UserConfiguration;
 import org.apache.jackrabbit.oak.spi.security.user.UserConstants;
 import org.apache.jackrabbit.oak.spi.security.user.util.PasswordUtil;
+import org.jetbrains.annotations.NotNull;
+import org.jetbrains.annotations.Nullable;
 import org.slf4j.Logger;
 import org.slf4j.LoggerFactory;
 
@@ -87,7 +86,7 @@ class UserAuthentication implements Auth
     private String userId;
     private Principal principal;
 
-    UserAuthentication(@Nonnull UserConfiguration config, @Nonnull Root root, 
@Nullable String loginId) {
+    UserAuthentication(@NotNull UserConfiguration config, @NotNull Root root, 
@Nullable String loginId) {
         this.config = config;
         this.root = root;
         this.loginId = loginId;
@@ -156,7 +155,7 @@ class UserAuthentication implements Auth
         return success;
     }
 
-    @CheckForNull
+    @Nullable
     @Override
     public String getUserId() {
         if (userId == null) {
@@ -165,7 +164,7 @@ class UserAuthentication implements Auth
         return userId;
     }
 
-    @CheckForNull
+    @Nullable
     @Override
     public Principal getUserPrincipal() {
         if (principal == null) {
@@ -182,7 +181,7 @@ class UserAuthentication implements Auth
         }
     }
 
-    private static boolean equalUserId(@Nonnull ImpersonationCredentials 
creds, @Nonnull String userId) {
+    private static boolean equalUserId(@NotNull ImpersonationCredentials 
creds, @NotNull String userId) {
         Credentials base = creds.getBaseCredentials();
         return (base instanceof SimpleCredentials) && 
userId.equals(((SimpleCredentials) base).getUserID());
     }
@@ -230,7 +229,7 @@ class UserAuthentication implements Auth
         return false;
     }
 
-    @CheckForNull
+    @Nullable
     private Long getPasswordLastModified(User user) throws RepositoryException 
{
         Tree userTree;
         if (user instanceof UserImpl) {
@@ -242,7 +241,7 @@ class UserAuthentication implements Auth
         return (property != null) ? property.getValue(Type.LONG) : null;
     }
 
-    private boolean isPasswordExpired(@Nonnull User user) throws 
RepositoryException {
+    private boolean isPasswordExpired(@NotNull User user) throws 
RepositoryException {
         // the password of the "admin" user never expires
         if (user.isAdmin()) {
             return false;

Modified: 
jackrabbit/oak/trunk/oak-core/src/main/java/org/apache/jackrabbit/oak/security/user/UserAuthenticationFactoryImpl.java
URL: 
http://svn.apache.org/viewvc/jackrabbit/oak/trunk/oak-core/src/main/java/org/apache/jackrabbit/oak/security/user/UserAuthenticationFactoryImpl.java?rev=1836177&r1=1836176&r2=1836177&view=diff
==============================================================================
--- 
jackrabbit/oak/trunk/oak-core/src/main/java/org/apache/jackrabbit/oak/security/user/UserAuthenticationFactoryImpl.java
 (original)
+++ 
jackrabbit/oak/trunk/oak-core/src/main/java/org/apache/jackrabbit/oak/security/user/UserAuthenticationFactoryImpl.java
 Wed Jul 18 14:37:06 2018
@@ -18,13 +18,12 @@ package org.apache.jackrabbit.oak.securi
 
 import static 
org.apache.jackrabbit.oak.spi.security.RegistrationConstants.OAK_SECURITY_NAME;
 
-import javax.annotation.Nonnull;
-import javax.annotation.Nullable;
-
 import org.apache.jackrabbit.oak.api.Root;
 import org.apache.jackrabbit.oak.spi.security.authentication.Authentication;
 import org.apache.jackrabbit.oak.spi.security.user.UserAuthenticationFactory;
 import org.apache.jackrabbit.oak.spi.security.user.UserConfiguration;
+import org.jetbrains.annotations.NotNull;
+import org.jetbrains.annotations.Nullable;
 import org.osgi.service.component.annotations.Component;
 
 @Component(
@@ -32,9 +31,9 @@ import org.osgi.service.component.annota
         property = OAK_SECURITY_NAME + 
"=org.apache.jackrabbit.oak.security.user.UserAuthenticationFactoryImpl")
 public class UserAuthenticationFactoryImpl implements 
UserAuthenticationFactory {
 
-    @Nonnull
+    @NotNull
     @Override
-    public Authentication getAuthentication(@Nonnull UserConfiguration 
userConfiguration, @Nonnull Root root, @Nullable String userId) {
+    public Authentication getAuthentication(@NotNull UserConfiguration 
userConfiguration, @NotNull Root root, @Nullable String userId) {
         return new UserAuthentication(userConfiguration, root, userId);
     }
 }

Modified: 
jackrabbit/oak/trunk/oak-core/src/main/java/org/apache/jackrabbit/oak/security/user/UserConfigurationImpl.java
URL: 
http://svn.apache.org/viewvc/jackrabbit/oak/trunk/oak-core/src/main/java/org/apache/jackrabbit/oak/security/user/UserConfigurationImpl.java?rev=1836177&r1=1836176&r2=1836177&view=diff
==============================================================================
--- 
jackrabbit/oak/trunk/oak-core/src/main/java/org/apache/jackrabbit/oak/security/user/UserConfigurationImpl.java
 (original)
+++ 
jackrabbit/oak/trunk/oak-core/src/main/java/org/apache/jackrabbit/oak/security/user/UserConfigurationImpl.java
 Wed Jul 18 14:37:06 2018
@@ -22,9 +22,6 @@ import java.util.List;
 import java.util.Map;
 import java.util.Set;
 
-import javax.annotation.Nonnull;
-import javax.annotation.Nullable;
-
 import com.google.common.collect.ImmutableList;
 import org.apache.jackrabbit.api.security.user.UserManager;
 import org.apache.jackrabbit.oak.api.Root;
@@ -46,6 +43,8 @@ import org.apache.jackrabbit.oak.spi.sec
 import org.apache.jackrabbit.oak.spi.security.user.util.PasswordUtil;
 import org.apache.jackrabbit.oak.spi.xml.ImportBehavior;
 import org.apache.jackrabbit.oak.spi.xml.ProtectedItemImporter;
+import org.jetbrains.annotations.NotNull;
+import org.jetbrains.annotations.Nullable;
 import org.osgi.service.component.annotations.Activate;
 import org.osgi.service.component.annotations.Component;
 import org.osgi.service.metatype.annotations.AttributeDefinition;
@@ -178,13 +177,13 @@ public class UserConfigurationImpl exten
     }
 
     //----------------------------------------------< SecurityConfiguration 
>---
-    @Nonnull
+    @NotNull
     @Override
     public String getName() {
         return NAME;
     }
 
-    @Nonnull
+    @NotNull
     @Override
     public ConfigurationParameters getParameters() {
         ConfigurationParameters params = super.getParameters();
@@ -197,38 +196,38 @@ public class UserConfigurationImpl exten
         }
     }
 
-    @Nonnull
+    @NotNull
     @Override
     public WorkspaceInitializer getWorkspaceInitializer() {
         return new UserInitializer(getSecurityProvider());
     }
 
-    @Nonnull
+    @NotNull
     @Override
-    public List<? extends ValidatorProvider> getValidators(@Nonnull String 
workspaceName, @Nonnull Set<Principal> principals, @Nonnull MoveTracker 
moveTracker) {
+    public List<? extends ValidatorProvider> getValidators(@NotNull String 
workspaceName, @NotNull Set<Principal> principals, @NotNull MoveTracker 
moveTracker) {
         return ImmutableList.of(new UserValidatorProvider(getParameters(), 
getRootProvider(), getTreeProvider()), new CacheValidatorProvider(principals, 
getTreeProvider()));
     }
 
-    @Nonnull
+    @NotNull
     @Override
     public List<ThreeWayConflictHandler> getConflictHandlers() {
         return ImmutableList.of(new RepMembersConflictHandler());
     }
 
-    @Nonnull
+    @NotNull
     @Override
     public List<ProtectedItemImporter> getProtectedItemImporters() {
         return Collections.<ProtectedItemImporter>singletonList(new 
UserImporter(getParameters()));
     }
 
-    @Nonnull
+    @NotNull
     @Override
     public Context getContext() {
         return UserContext.getInstance();
     }
 
     //--------------------------------------------------< UserConfiguration 
>---
-    @Nonnull
+    @NotNull
     @Override
     public UserManager getUserManager(Root root, NamePathMapper 
namePathMapper) {
         UserManager umgr = new UserManagerImpl(root, namePathMapper, 
getSecurityProvider());
@@ -241,7 +240,7 @@ public class UserConfigurationImpl exten
 
     @Nullable
     @Override
-    public PrincipalProvider getUserPrincipalProvider(@Nonnull Root root, 
@Nonnull NamePathMapper namePathMapper) {
+    public PrincipalProvider getUserPrincipalProvider(@NotNull Root root, 
@NotNull NamePathMapper namePathMapper) {
         return new UserPrincipalProvider(root, this, namePathMapper);
     }
 }

Modified: 
jackrabbit/oak/trunk/oak-core/src/main/java/org/apache/jackrabbit/oak/security/user/UserContext.java
URL: 
http://svn.apache.org/viewvc/jackrabbit/oak/trunk/oak-core/src/main/java/org/apache/jackrabbit/oak/security/user/UserContext.java?rev=1836177&r1=1836176&r2=1836177&view=diff
==============================================================================
--- 
jackrabbit/oak/trunk/oak-core/src/main/java/org/apache/jackrabbit/oak/security/user/UserContext.java
 (original)
+++ 
jackrabbit/oak/trunk/oak-core/src/main/java/org/apache/jackrabbit/oak/security/user/UserContext.java
 Wed Jul 18 14:37:06 2018
@@ -16,8 +16,6 @@
  */
 package org.apache.jackrabbit.oak.security.user;
 
-import javax.annotation.Nonnull;
-
 import org.apache.jackrabbit.oak.api.PropertyState;
 import org.apache.jackrabbit.oak.api.Tree;
 import org.apache.jackrabbit.oak.plugins.tree.TreeLocation;
@@ -25,6 +23,7 @@ import org.apache.jackrabbit.oak.spi.sec
 import org.apache.jackrabbit.oak.spi.security.user.UserConstants;
 import org.apache.jackrabbit.oak.plugins.tree.TreeUtil;
 import org.apache.jackrabbit.util.Text;
+import org.jetbrains.annotations.NotNull;
 
 final class UserContext implements Context, UserConstants {
 
@@ -39,7 +38,7 @@ final class UserContext implements Conte
 
     //------------------------------------------------------------< Context 
>---
     @Override
-    public boolean definesProperty(@Nonnull Tree parent, @Nonnull 
PropertyState property) {
+    public boolean definesProperty(@NotNull Tree parent, @NotNull 
PropertyState property) {
         String propName = property.getName();
         String ntName = TreeUtil.getPrimaryTypeName(parent);
         if (NT_REP_USER.equals(ntName) || NT_REP_SYSTEM_USER.equals(ntName)) {
@@ -57,18 +56,18 @@ final class UserContext implements Conte
     }
 
     @Override
-    public boolean definesContextRoot(@Nonnull Tree tree) {
+    public boolean definesContextRoot(@NotNull Tree tree) {
         return definesTree(tree);
     }
 
     @Override
-    public boolean definesTree(@Nonnull Tree tree) {
+    public boolean definesTree(@NotNull Tree tree) {
         String ntName = TreeUtil.getPrimaryTypeName(tree);
         return NT_NAMES.contains(ntName);
     }
 
     @Override
-    public boolean definesLocation(@Nonnull TreeLocation location) {
+    public boolean definesLocation(@NotNull TreeLocation location) {
         Tree tree = location.getTree();
         if (tree != null && location.exists()) {
             PropertyState p = location.getProperty();
@@ -88,8 +87,8 @@ final class UserContext implements Conte
     }
 
     @Override
-    public boolean definesInternal(@Nonnull Tree tree) {
+    public boolean definesInternal(@NotNull Tree tree) {
         return false;
     }
 
-}
\ No newline at end of file
+}

Modified: 
jackrabbit/oak/trunk/oak-core/src/main/java/org/apache/jackrabbit/oak/security/user/UserImpl.java
URL: 
http://svn.apache.org/viewvc/jackrabbit/oak/trunk/oak-core/src/main/java/org/apache/jackrabbit/oak/security/user/UserImpl.java?rev=1836177&r1=1836176&r2=1836177&view=diff
==============================================================================
--- 
jackrabbit/oak/trunk/oak-core/src/main/java/org/apache/jackrabbit/oak/security/user/UserImpl.java
 (original)
+++ 
jackrabbit/oak/trunk/oak-core/src/main/java/org/apache/jackrabbit/oak/security/user/UserImpl.java
 Wed Jul 18 14:37:06 2018
@@ -17,8 +17,6 @@
 package org.apache.jackrabbit.oak.security.user;
 
 import java.security.Principal;
-import javax.annotation.CheckForNull;
-import javax.annotation.Nonnull;
 import javax.jcr.Credentials;
 import javax.jcr.RepositoryException;
 
@@ -33,6 +31,8 @@ import org.apache.jackrabbit.oak.spi.sec
 import org.apache.jackrabbit.oak.spi.security.user.util.PasswordUtil;
 import org.apache.jackrabbit.oak.spi.security.user.util.UserUtil;
 import org.apache.jackrabbit.oak.plugins.tree.TreeUtil;
+import org.jetbrains.annotations.NotNull;
+import org.jetbrains.annotations.Nullable;
 
 import static org.apache.jackrabbit.oak.api.Type.STRING;
 
@@ -53,7 +53,7 @@ class UserImpl extends AuthorizableImpl
 
     //---------------------------------------------------< AuthorizableImpl 
>---
     @Override
-    void checkValidTree(@Nonnull Tree tree) throws RepositoryException {
+    void checkValidTree(@NotNull Tree tree) throws RepositoryException {
         if (!UserUtil.isType(tree, AuthorizableType.USER)) {
             throw new IllegalArgumentException("Invalid user node: node type 
rep:User expected.");
         }
@@ -158,8 +158,8 @@ class UserImpl extends AuthorizableImpl
     }
 
     //------------------------------------------------------------< private 
>---
-    @CheckForNull
+    @Nullable
     private String getPasswordHash() {
         return TreeUtil.getString(getTree(), UserConstants.REP_PASSWORD);
     }
-}
\ No newline at end of file
+}

Modified: 
jackrabbit/oak/trunk/oak-core/src/main/java/org/apache/jackrabbit/oak/security/user/UserImporter.java
URL: 
http://svn.apache.org/viewvc/jackrabbit/oak/trunk/oak-core/src/main/java/org/apache/jackrabbit/oak/security/user/UserImporter.java?rev=1836177&r1=1836176&r2=1836177&view=diff
==============================================================================
--- 
jackrabbit/oak/trunk/oak-core/src/main/java/org/apache/jackrabbit/oak/security/user/UserImporter.java
 (original)
+++ 
jackrabbit/oak/trunk/oak-core/src/main/java/org/apache/jackrabbit/oak/security/user/UserImporter.java
 Wed Jul 18 14:37:06 2018
@@ -25,7 +25,6 @@ import java.util.List;
 import java.util.Map;
 import java.util.Set;
 import java.util.TreeSet;
-import javax.annotation.Nonnull;
 import javax.jcr.ImportUUIDBehavior;
 import javax.jcr.PropertyType;
 import javax.jcr.RepositoryException;
@@ -65,6 +64,7 @@ import org.apache.jackrabbit.oak.spi.xml
 import org.apache.jackrabbit.oak.spi.xml.ReferenceChangeTracker;
 import org.apache.jackrabbit.oak.spi.xml.TextValue;
 import org.apache.jackrabbit.oak.plugins.tree.TreeUtil;
+import org.jetbrains.annotations.NotNull;
 import org.slf4j.Logger;
 import org.slf4j.LoggerFactory;
 
@@ -168,9 +168,9 @@ class UserImporter implements ProtectedP
 
     //----------------------------------------------< ProtectedItemImporter 
>---
     @Override
-    public boolean init(@Nonnull Session session, @Nonnull Root root, @Nonnull 
NamePathMapper namePathMapper,
+    public boolean init(@NotNull Session session, @NotNull Root root, @NotNull 
NamePathMapper namePathMapper,
             boolean isWorkspaceImport, int uuidBehavior,
-            @Nonnull ReferenceChangeTracker referenceTracker, @Nonnull 
SecurityProvider securityProvider) {
+            @NotNull ReferenceChangeTracker referenceTracker, @NotNull 
SecurityProvider securityProvider) {
 
         if (!(session instanceof JackrabbitSession)) {
             log.debug("Importing protected user content requires a 
JackrabbitSession");
@@ -199,7 +199,7 @@ class UserImporter implements ProtectedP
         return initialized;
     }
 
-    private static boolean canInitUserManager(@Nonnull JackrabbitSession 
session, boolean isWorkspaceImport, @Nonnull SecurityProvider securityProvider) 
{
+    private static boolean canInitUserManager(@NotNull JackrabbitSession 
session, boolean isWorkspaceImport, @NotNull SecurityProvider securityProvider) 
{
         try {
             if (!isWorkspaceImport && session.getUserManager().isAutoSave()) {
                 log.warn("Session import cannot handle user content: 
UserManager is in autosave mode.");
@@ -216,7 +216,7 @@ class UserImporter implements ProtectedP
 
     // -----------------------------------------< ProtectedPropertyImporter 
>---
     @Override
-    public boolean handlePropInfo(@Nonnull Tree parent, @Nonnull PropInfo 
propInfo, @Nonnull PropertyDefinition def) throws RepositoryException {
+    public boolean handlePropInfo(@NotNull Tree parent, @NotNull PropInfo 
propInfo, @NotNull PropertyDefinition def) throws RepositoryException {
         checkInitialized();
 
         String propName = propInfo.getName();
@@ -326,7 +326,7 @@ class UserImporter implements ProtectedP
     }
 
     @Override
-    public void propertiesCompleted(@Nonnull Tree protectedParent) throws 
RepositoryException {
+    public void propertiesCompleted(@NotNull Tree protectedParent) throws 
RepositoryException {
         if (isCacheNode(protectedParent)) {
             // remove the cache if present
             protectedParent.remove();
@@ -387,7 +387,7 @@ class UserImporter implements ProtectedP
 
     // ---------------------------------------------< ProtectedNodeImporter 
>---
     @Override
-    public boolean start(@Nonnull Tree protectedParent) throws 
RepositoryException {
+    public boolean start(@NotNull Tree protectedParent) throws 
RepositoryException {
         Authorizable auth = null;
         if (isMemberNode(protectedParent)) {
             Tree groupTree = protectedParent;
@@ -410,7 +410,7 @@ class UserImporter implements ProtectedP
     }
 
     @Override
-    public void startChildInfo(@Nonnull NodeInfo childInfo, @Nonnull 
List<PropInfo> propInfos) throws RepositoryException {
+    public void startChildInfo(@NotNull NodeInfo childInfo, @NotNull 
List<PropInfo> propInfos) throws RepositoryException {
         checkState(currentMembership != null);
 
         String ntName = childInfo.getPrimaryTypeName();
@@ -439,12 +439,12 @@ class UserImporter implements ProtectedP
     }
 
     @Override
-    public void end(@Nonnull Tree protectedParent) throws RepositoryException {
+    public void end(@NotNull Tree protectedParent) throws RepositoryException {
         currentMembership = null;
     }
 
     //------------------------------------------------------------< private 
>---
-    @Nonnull
+    @NotNull
     private IdentifierManager getIdentifierManager() {
         if (identifierManager == null) {
             identifierManager = new IdentifierManager(root);
@@ -452,13 +452,13 @@ class UserImporter implements ProtectedP
         return identifierManager;
     }
 
-    @Nonnull
+    @NotNull
     private PrincipalManager getPrincipalManager() throws RepositoryException {
         return userManager.getPrincipalManager();
     }
 
-    @Nonnull
-    private Membership getMembership(@Nonnull String authId) {
+    @NotNull
+    private Membership getMembership(@NotNull String authId) {
         Membership membership = memberships.get(authId);
         if (membership == null) {
             membership = new Membership(authId);
@@ -473,25 +473,25 @@ class UserImporter implements ProtectedP
         }
     }
 
-    private boolean isValid(@Nonnull PropertyDefinition definition, @Nonnull 
String oakNodeTypeName, boolean multipleStatus) {
+    private boolean isValid(@NotNull PropertyDefinition definition, @NotNull 
String oakNodeTypeName, boolean multipleStatus) {
         return multipleStatus == definition.isMultiple() &&
                 
definition.getDeclaringNodeType().isNodeType(namePathMapper.getJcrName(oakNodeTypeName));
     }
 
-    private static boolean isMemberNode(@Nonnull Tree tree) {
+    private static boolean isMemberNode(@NotNull Tree tree) {
         //noinspection deprecation
         return tree.exists() && 
NT_REP_MEMBERS.equals(TreeUtil.getPrimaryTypeName(tree));
     }
 
-    private static boolean isMemberReferencesListNode(@Nonnull Tree tree) {
+    private static boolean isMemberReferencesListNode(@NotNull Tree tree) {
         return tree.exists() && 
NT_REP_MEMBER_REFERENCES_LIST.equals(TreeUtil.getPrimaryTypeName(tree));
     }
 
-    private static boolean isPwdNode(@Nonnull Tree tree) {
+    private static boolean isPwdNode(@NotNull Tree tree) {
         return REP_PWD.equals(tree.getName()) && 
NT_REP_PASSWORD.equals(TreeUtil.getPrimaryTypeName(tree));
     }
 
-    private static boolean importPwdNodeProperty(@Nonnull Tree parent, 
@Nonnull PropInfo propInfo, @Nonnull PropertyDefinition def) throws 
RepositoryException {
+    private static boolean importPwdNodeProperty(@NotNull Tree parent, 
@NotNull PropInfo propInfo, @NotNull PropertyDefinition def) throws 
RepositoryException {
         String propName = propInfo.getName();
         if (propName == null) {
             propName = def.getName();
@@ -517,7 +517,7 @@ class UserImporter implements ProtectedP
         return true;
     }
 
-    private static boolean isCacheNode(@Nonnull Tree tree) {
+    private static boolean isCacheNode(@NotNull Tree tree) {
         return tree.exists() && 
CacheConstants.REP_CACHE.equals(tree.getName()) && 
CacheConstants.NT_REP_CACHE.equals(TreeUtil.getPrimaryTypeName(tree));
     }
 
@@ -728,4 +728,4 @@ class UserImporter implements ProtectedP
             }
         }
     }
-}
\ No newline at end of file
+}

Modified: 
jackrabbit/oak/trunk/oak-core/src/main/java/org/apache/jackrabbit/oak/security/user/UserInitializer.java
URL: 
http://svn.apache.org/viewvc/jackrabbit/oak/trunk/oak-core/src/main/java/org/apache/jackrabbit/oak/security/user/UserInitializer.java?rev=1836177&r1=1836176&r2=1836177&view=diff
==============================================================================
--- 
jackrabbit/oak/trunk/oak-core/src/main/java/org/apache/jackrabbit/oak/security/user/UserInitializer.java
 (original)
+++ 
jackrabbit/oak/trunk/oak-core/src/main/java/org/apache/jackrabbit/oak/security/user/UserInitializer.java
 Wed Jul 18 14:37:06 2018
@@ -16,7 +16,6 @@
  */
 package org.apache.jackrabbit.oak.security.user;
 
-import javax.annotation.Nonnull;
 import javax.jcr.RepositoryException;
 
 import com.google.common.base.Strings;
@@ -46,6 +45,7 @@ import org.apache.jackrabbit.oak.spi.sec
 import org.apache.jackrabbit.oak.spi.state.ApplyDiff;
 import org.apache.jackrabbit.oak.spi.state.NodeBuilder;
 import org.apache.jackrabbit.oak.spi.state.NodeState;
+import org.jetbrains.annotations.NotNull;
 import org.slf4j.Logger;
 import org.slf4j.LoggerFactory;
 
@@ -88,7 +88,7 @@ class UserInitializer implements Workspa
     private QueryIndexProvider queryIndexProvider = new 
CompositeQueryIndexProvider(new PropertyIndexProvider(),
             new NodeTypeIndexProvider());
 
-    UserInitializer(@Nonnull SecurityProvider securityProvider) {
+    UserInitializer(@NotNull SecurityProvider securityProvider) {
         this.securityProvider = securityProvider;
     }
 

Modified: 
jackrabbit/oak/trunk/oak-core/src/main/java/org/apache/jackrabbit/oak/security/user/UserManagerImpl.java
URL: 
http://svn.apache.org/viewvc/jackrabbit/oak/trunk/oak-core/src/main/java/org/apache/jackrabbit/oak/security/user/UserManagerImpl.java?rev=1836177&r1=1836176&r2=1836177&view=diff
==============================================================================
--- 
jackrabbit/oak/trunk/oak-core/src/main/java/org/apache/jackrabbit/oak/security/user/UserManagerImpl.java
 (original)
+++ 
jackrabbit/oak/trunk/oak-core/src/main/java/org/apache/jackrabbit/oak/security/user/UserManagerImpl.java
 Wed Jul 18 14:37:06 2018
@@ -22,9 +22,6 @@ import java.security.Principal;
 import java.util.Iterator;
 import java.util.List;
 import java.util.Set;
-import javax.annotation.CheckForNull;
-import javax.annotation.Nonnull;
-import javax.annotation.Nullable;
 import javax.jcr.RepositoryException;
 import javax.jcr.UnsupportedRepositoryOperationException;
 
@@ -58,6 +55,8 @@ import org.apache.jackrabbit.oak.spi.sec
 import org.apache.jackrabbit.oak.spi.security.user.util.PasswordUtil;
 import org.apache.jackrabbit.oak.spi.security.user.util.UserUtil;
 import org.apache.jackrabbit.oak.plugins.tree.TreeUtil;
+import org.jetbrains.annotations.NotNull;
+import org.jetbrains.annotations.Nullable;
 import org.slf4j.Logger;
 import org.slf4j.LoggerFactory;
 
@@ -80,8 +79,8 @@ public class UserManagerImpl implements
     private UserQueryManager queryManager;
     private ReadOnlyNodeTypeManager ntMgr;
 
-    public UserManagerImpl(@Nonnull Root root, @Nonnull NamePathMapper 
namePathMapper,
-                           @Nonnull SecurityProvider securityProvider) {
+    public UserManagerImpl(@NotNull Root root, @NotNull NamePathMapper 
namePathMapper,
+                           @NotNull SecurityProvider securityProvider) {
         this.root = root;
         this.namePathMapper = namePathMapper;
         this.securityProvider = securityProvider;
@@ -93,8 +92,8 @@ public class UserManagerImpl implements
         this.actionProvider = getActionProvider(config);
     }
 
-    @Nonnull
-    private static AuthorizableActionProvider getActionProvider(@Nonnull 
ConfigurationParameters config) {
+    @NotNull
+    private static AuthorizableActionProvider getActionProvider(@NotNull 
ConfigurationParameters config) {
         AuthorizableActionProvider actionProvider = 
config.getConfigValue(UserConstants.PARAM_AUTHORIZABLE_ACTION_PROVIDER, null, 
AuthorizableActionProvider.class);
         if (actionProvider == null) {
             actionProvider = new DefaultAuthorizableActionProvider(config);
@@ -259,7 +258,7 @@ public class UserManagerImpl implements
      * @param password The password.
      * @throws RepositoryException If an exception occurs.
      */
-    void onCreate(@Nonnull User user, @CheckForNull String password) throws 
RepositoryException {
+    void onCreate(@NotNull User user, @Nullable String password) throws 
RepositoryException {
         if (!user.isSystemUser()) {
             for (AuthorizableAction action : 
actionProvider.getAuthorizableActions(securityProvider)) {
                 action.onCreate(user, password, root, namePathMapper);
@@ -277,7 +276,7 @@ public class UserManagerImpl implements
      * @param group The new group.
      * @throws RepositoryException If an exception occurs.
      */
-    void onCreate(@Nonnull Group group) throws RepositoryException {
+    void onCreate(@NotNull Group group) throws RepositoryException {
         for (AuthorizableAction action : 
actionProvider.getAuthorizableActions(securityProvider)) {
             action.onCreate(group, root, namePathMapper);
         }
@@ -291,7 +290,7 @@ public class UserManagerImpl implements
      * @param authorizable The authorizable to be removed.
      * @throws RepositoryException If an exception occurs.
      */
-    void onRemove(@Nonnull Authorizable authorizable) throws 
RepositoryException {
+    void onRemove(@NotNull Authorizable authorizable) throws 
RepositoryException {
         for (AuthorizableAction action : 
actionProvider.getAuthorizableActions(securityProvider)) {
             action.onRemove(authorizable, root, namePathMapper);
         }
@@ -306,7 +305,7 @@ public class UserManagerImpl implements
      * @param password The new password.
      * @throws RepositoryException If an exception occurs.
      */
-    void onPasswordChange(@Nonnull User user, @Nonnull String password) throws 
RepositoryException {
+    void onPasswordChange(@NotNull User user, @NotNull String password) throws 
RepositoryException {
         for (AuthorizableAction action : 
actionProvider.getAuthorizableActions(securityProvider)) {
             action.onPasswordChange(user, password, root, namePathMapper);
         }
@@ -322,7 +321,7 @@ public class UserManagerImpl implements
      * @param member   The member successfully removed or added.
      * @throws RepositoryException If an error occurs.
      */
-    void onGroupUpdate(@Nonnull Group group, boolean isRemove, @Nonnull 
Authorizable member) throws RepositoryException {
+    void onGroupUpdate(@NotNull Group group, boolean isRemove, @NotNull 
Authorizable member) throws RepositoryException {
         for (GroupAction action : selectGroupActions()) {
             if (isRemove) {
                 action.onMemberRemoved(group, member, root, namePathMapper);
@@ -344,7 +343,7 @@ public class UserManagerImpl implements
      * @param failedIds   The IDs of all members whose addition or removal 
failed.
      * @throws RepositoryException If an error occurs.
      */
-    void onGroupUpdate(@Nonnull Group group, boolean isRemove, boolean 
isContentId, @Nonnull Set<String> memberIds, @Nonnull Set<String> failedIds) 
throws RepositoryException {
+    void onGroupUpdate(@NotNull Group group, boolean isRemove, boolean 
isContentId, @NotNull Set<String> memberIds, @NotNull Set<String> failedIds) 
throws RepositoryException {
         for (GroupAction action : selectGroupActions()) {
             if (isRemove) {
                 action.onMembersRemoved(group, memberIds, failedIds, root, 
namePathMapper);
@@ -359,25 +358,25 @@ public class UserManagerImpl implements
     }
 
     
//--------------------------------------------------------------------------
-    @CheckForNull
-    public Authorizable getAuthorizable(@CheckForNull Tree tree) throws 
RepositoryException {
+    @Nullable
+    public Authorizable getAuthorizable(@Nullable Tree tree) throws 
RepositoryException {
         if (tree == null || !tree.exists()) {
             return null;
         }
         return getAuthorizable(UserUtil.getAuthorizableId(tree), tree);
     }
 
-    @CheckForNull
-    Authorizable getAuthorizableByOakPath(@Nonnull String oakPath) throws 
RepositoryException {
+    @Nullable
+    Authorizable getAuthorizableByOakPath(@NotNull String oakPath) throws 
RepositoryException {
         return getAuthorizable(userProvider.getAuthorizableByPath(oakPath));
     }
 
-    @Nonnull
+    @NotNull
     NamePathMapper getNamePathMapper() {
         return namePathMapper;
     }
 
-    @Nonnull
+    @NotNull
     ReadOnlyNodeTypeManager getNodeTypeManager() {
         if (ntMgr == null) {
             ntMgr = ReadOnlyNodeTypeManager.getInstance(root, 
NamePathMapper.DEFAULT);
@@ -385,23 +384,23 @@ public class UserManagerImpl implements
         return ntMgr;
     }
 
-    @Nonnull
+    @NotNull
     MembershipProvider getMembershipProvider() {
         return membershipProvider;
     }
 
-    @Nonnull
+    @NotNull
     PrincipalManager getPrincipalManager() throws RepositoryException {
         return 
securityProvider.getConfiguration(PrincipalConfiguration.class).getPrincipalManager(root,
 namePathMapper);
     }
 
-    @Nonnull
+    @NotNull
     ConfigurationParameters getConfig() {
         return config;
     }
 
-    @CheckForNull
-    private Authorizable getAuthorizable(@CheckForNull String id, 
@CheckForNull Tree tree) throws RepositoryException {
+    @Nullable
+    private Authorizable getAuthorizable(@Nullable String id, @Nullable Tree 
tree) throws RepositoryException {
         if (id == null || tree == null) {
             return null;
         }
@@ -418,7 +417,7 @@ public class UserManagerImpl implements
         }
     }
 
-    private void checkValidId(@CheckForNull String id) throws 
RepositoryException {
+    private void checkValidId(@Nullable String id) throws RepositoryException {
         if (id == null || id.isEmpty()) {
             throw new IllegalArgumentException("Invalid ID " + id);
         }
@@ -427,7 +426,7 @@ public class UserManagerImpl implements
         }
     }
 
-    void checkValidPrincipal(@CheckForNull Principal principal, boolean 
isGroup) throws RepositoryException {
+    void checkValidPrincipal(@Nullable Principal principal, boolean isGroup) 
throws RepositoryException {
         if (principal == null || Strings.isNullOrEmpty(principal.getName())) {
             throw new IllegalArgumentException("Principal may not be null and 
must have a valid name.");
         }
@@ -439,11 +438,11 @@ public class UserManagerImpl implements
         }
     }
 
-    void setPrincipal(@Nonnull Tree authorizableTree, @Nonnull Principal 
principal) {
+    void setPrincipal(@NotNull Tree authorizableTree, @NotNull Principal 
principal) {
         authorizableTree.setProperty(UserConstants.REP_PRINCIPAL_NAME, 
principal.getName());
     }
 
-    void setPassword(@Nonnull Tree userTree, @Nonnull String userId, @Nonnull 
String password, boolean forceHash) throws RepositoryException {
+    void setPassword(@NotNull Tree userTree, @NotNull String userId, @NotNull 
String password, boolean forceHash) throws RepositoryException {
         String pwHash;
         if (forceHash || PasswordUtil.isPlainTextPassword(password)) {
             try {
@@ -484,7 +483,7 @@ public class UserManagerImpl implements
         return 
config.getConfigValue(UserConstants.PARAM_PASSWORD_INITIAL_CHANGE, 
UserConstants.DEFAULT_PASSWORD_INITIAL_CHANGE);
     }
 
-    @Nonnull
+    @NotNull
     private UserQueryManager getQueryManager() {
         if (queryManager == null) {
             queryManager = new UserQueryManager(this, namePathMapper, config, 
root);
@@ -497,7 +496,7 @@ public class UserManagerImpl implements
      *
      * @return A {@code List} of {@code GroupAction}s. List may be empty.
      */
-    @Nonnull
+    @NotNull
     private List<GroupAction> selectGroupActions() {
         List<GroupAction> actions = Lists.newArrayList();
         for (AuthorizableAction action : 
actionProvider.getAuthorizableActions(securityProvider)) {
@@ -507,4 +506,4 @@ public class UserManagerImpl implements
         }
         return actions;
     }
-}
\ No newline at end of file
+}

Modified: 
jackrabbit/oak/trunk/oak-core/src/main/java/org/apache/jackrabbit/oak/security/user/UserPrincipalProvider.java
URL: 
http://svn.apache.org/viewvc/jackrabbit/oak/trunk/oak-core/src/main/java/org/apache/jackrabbit/oak/security/user/UserPrincipalProvider.java?rev=1836177&r1=1836176&r2=1836177&view=diff
==============================================================================
--- 
jackrabbit/oak/trunk/oak-core/src/main/java/org/apache/jackrabbit/oak/security/user/UserPrincipalProvider.java
 (original)
+++ 
jackrabbit/oak/trunk/oak-core/src/main/java/org/apache/jackrabbit/oak/security/user/UserPrincipalProvider.java
 Wed Jul 18 14:37:06 2018
@@ -23,9 +23,6 @@ import java.util.Date;
 import java.util.HashSet;
 import java.util.Iterator;
 import java.util.Set;
-import javax.annotation.CheckForNull;
-import javax.annotation.Nonnull;
-import javax.annotation.Nullable;
 import javax.jcr.AccessDeniedException;
 import javax.jcr.RepositoryException;
 
@@ -57,6 +54,8 @@ import org.apache.jackrabbit.oak.spi.sec
 import org.apache.jackrabbit.oak.spi.security.user.util.UserUtil;
 import org.apache.jackrabbit.oak.plugins.tree.TreeUtil;
 import org.apache.jackrabbit.util.Text;
+import org.jetbrains.annotations.NotNull;
+import org.jetbrains.annotations.Nullable;
 import org.slf4j.Logger;
 import org.slf4j.LoggerFactory;
 
@@ -87,9 +86,9 @@ class UserPrincipalProvider implements P
     private final long expiration;
     private final boolean cacheEnabled;
 
-    UserPrincipalProvider(@Nonnull Root root,
-                          @Nonnull UserConfiguration userConfiguration,
-                          @Nonnull NamePathMapper namePathMapper) {
+    UserPrincipalProvider(@NotNull Root root,
+                          @NotNull UserConfiguration userConfiguration,
+                          @NotNull NamePathMapper namePathMapper) {
         this.root = root;
         this.config = userConfiguration;
         this.namePathMapper = namePathMapper;
@@ -103,7 +102,7 @@ class UserPrincipalProvider implements P
 
     //--------------------------------------------------< PrincipalProvider 
>---
     @Override
-    public Principal getPrincipal(@Nonnull String principalName) {
+    public Principal getPrincipal(@NotNull String principalName) {
         Tree authorizableTree = userProvider.getAuthorizableByPrincipal(new 
PrincipalImpl(principalName));
         Principal principal = createPrincipal(authorizableTree);
 
@@ -115,9 +114,9 @@ class UserPrincipalProvider implements P
         }
     }
 
-    @Nonnull
+    @NotNull
     @Override
-    public Set<Principal> getMembershipPrincipals(@Nonnull Principal 
principal) {
+    public Set<Principal> getMembershipPrincipals(@NotNull Principal 
principal) {
         Tree tree = getAuthorizableTree(principal);
         if (tree == null) {
             return Collections.emptySet();
@@ -126,9 +125,9 @@ class UserPrincipalProvider implements P
         }
     }
 
-    @Nonnull
+    @NotNull
     @Override
-    public Set<? extends Principal> getPrincipals(@Nonnull String userID) {
+    public Set<? extends Principal> getPrincipals(@NotNull String userID) {
         Set<Principal> principals = new HashSet<Principal>();
         Tree tree = userProvider.getAuthorizable(userID);
         if (tree != null && UserUtil.isType(tree, AuthorizableType.USER)) {
@@ -141,7 +140,7 @@ class UserPrincipalProvider implements P
         return principals;
     }
 
-    @Nonnull
+    @NotNull
     @Override
     public Iterator<? extends Principal> findPrincipals(final String nameHint,
                                                         final int searchType) {
@@ -174,20 +173,20 @@ class UserPrincipalProvider implements P
         }
     }
 
-    @Nonnull
+    @NotNull
     @Override
     public Iterator<? extends Principal> findPrincipals(int searchType) {
         return findPrincipals(null, searchType);
     }
 
     //------------------------------------------------------------< private 
>---
-    @CheckForNull
-    private Tree getAuthorizableTree(@Nonnull Principal principal) {
+    @Nullable
+    private Tree getAuthorizableTree(@NotNull Principal principal) {
         return userProvider.getAuthorizableByPrincipal(principal);
     }
 
-    @CheckForNull
-    private Principal createPrincipal(@CheckForNull Tree authorizableTree) {
+    @Nullable
+    private Principal createPrincipal(@Nullable Tree authorizableTree) {
         Principal principal = null;
         if (authorizableTree != null) {
             AuthorizableType type = UserUtil.getType(authorizableTree);
@@ -200,8 +199,8 @@ class UserPrincipalProvider implements P
         return principal;
     }
 
-    @CheckForNull
-    private Principal createUserPrincipal(@Nonnull String id, @Nonnull Tree 
userTree) {
+    @Nullable
+    private Principal createUserPrincipal(@NotNull String id, @NotNull Tree 
userTree) {
         String principalName = getPrincipalName(userTree);
         if (principalName == null) {
             return null;
@@ -215,8 +214,8 @@ class UserPrincipalProvider implements P
         }
     }
 
-    @CheckForNull
-    private Principal createGroupPrincipal(@Nonnull Tree groupTree) {
+    @Nullable
+    private Principal createGroupPrincipal(@NotNull Tree groupTree) {
         String principalName = getPrincipalName(groupTree);
         if (principalName == null) {
             return null;
@@ -224,8 +223,8 @@ class UserPrincipalProvider implements P
         return new GroupPrincipalImpl(principalName, groupTree);
     }
 
-    @CheckForNull
-    private static String getPrincipalName(@Nonnull Tree tree) {
+    @Nullable
+    private static String getPrincipalName(@NotNull Tree tree) {
         PropertyState principalName = 
tree.getProperty(UserConstants.REP_PRINCIPAL_NAME);
         if (principalName != null) {
             return principalName.getValue(STRING);
@@ -236,8 +235,8 @@ class UserPrincipalProvider implements P
         }
     }
 
-    @Nonnull
-    private Set<Principal> getGroupMembership(@Nonnull Tree authorizableTree) {
+    @NotNull
+    private Set<Principal> getGroupMembership(@NotNull Tree authorizableTree) {
         Set<Principal> groupPrincipals = null;
         boolean doCache = cacheEnabled && UserUtil.isType(authorizableTree, 
AuthorizableType.USER);
         if (doCache) {
@@ -270,7 +269,7 @@ class UserPrincipalProvider implements P
         return groupPrincipals;
     }
 
-    private void cacheGroups(@Nonnull Tree authorizableNode, @Nonnull 
Set<Principal> groupPrincipals) {
+    private void cacheGroups(@NotNull Tree authorizableNode, @NotNull 
Set<Principal> groupPrincipals) {
         try {
             root.refresh();
             Tree cache = authorizableNode.getChild(CacheConstants.REP_CACHE);
@@ -305,8 +304,8 @@ class UserPrincipalProvider implements P
         }
     }
 
-    @CheckForNull
-    private Set<Principal> readGroupsFromCache(@Nonnull Tree authorizableNode) 
{
+    @Nullable
+    private Set<Principal> readGroupsFromCache(@NotNull Tree authorizableNode) 
{
         Tree principalCache = 
authorizableNode.getChild(CacheConstants.REP_CACHE);
         if (!principalCache.exists()) {
             log.debug("No group cache at " + authorizableNode.getPath());
@@ -398,11 +397,11 @@ class UserPrincipalProvider implements P
 
         private UserManager userManager;
 
-        BaseGroupPrincipal(@Nonnull String principalName, @Nonnull Tree 
groupTree) {
+        BaseGroupPrincipal(@NotNull String principalName, @NotNull Tree 
groupTree) {
             super(principalName, groupTree, namePathMapper);
         }
 
-        BaseGroupPrincipal(@Nonnull String principalName, @Nonnull String 
groupPath) {
+        BaseGroupPrincipal(@NotNull String principalName, @NotNull String 
groupPath) {
             super(principalName, groupPath, namePathMapper);
         }
 
@@ -420,19 +419,19 @@ class UserPrincipalProvider implements P
         }
 
         @Override
-        boolean isMember(@Nonnull Authorizable authorizable) throws 
RepositoryException {
+        boolean isMember(@NotNull Authorizable authorizable) throws 
RepositoryException {
             org.apache.jackrabbit.api.security.user.Group g = getGroup();
             return g != null && g.isMember(authorizable);
         }
 
-        @Nonnull
+        @NotNull
         @Override
         Iterator<Authorizable> getMembers() throws RepositoryException {
             org.apache.jackrabbit.api.security.user.Group g = getGroup();
             return (g == null) ? Collections.<Authorizable>emptyIterator() : 
g.getMembers();
         }
 
-        @CheckForNull
+        @Nullable
         abstract org.apache.jackrabbit.api.security.user.Group 
getGroup()throws RepositoryException;
     }
 
@@ -444,12 +443,12 @@ class UserPrincipalProvider implements P
 
         private org.apache.jackrabbit.api.security.user.Group group;
 
-        GroupPrincipalImpl(@Nonnull String principalName, @Nonnull Tree 
groupTree) {
+        GroupPrincipalImpl(@NotNull String principalName, @NotNull Tree 
groupTree) {
             super(principalName, groupTree);
         }
 
         @Override
-        @CheckForNull
+        @Nullable
         org.apache.jackrabbit.api.security.user.Group getGroup() throws 
RepositoryException {
             if (group == null) {
                 Authorizable authorizable = 
getUserManager().getAuthorizable(this);
@@ -465,7 +464,7 @@ class UserPrincipalProvider implements P
 
         private org.apache.jackrabbit.api.security.user.Group group;
 
-        CachedGroupPrincipal(@Nonnull String principalName) {
+        CachedGroupPrincipal(@NotNull String principalName) {
             super(principalName, "");
         }
 
@@ -487,7 +486,7 @@ class UserPrincipalProvider implements P
         }
 
         @Override
-        @CheckForNull
+        @Nullable
         org.apache.jackrabbit.api.security.user.Group getGroup() throws 
RepositoryException {
             if (group == null) {
                 Authorizable authorizable = 
getUserManager().getAuthorizable(new PrincipalImpl(getName()));

Modified: 
jackrabbit/oak/trunk/oak-core/src/main/java/org/apache/jackrabbit/oak/security/user/UserProvider.java
URL: 
http://svn.apache.org/viewvc/jackrabbit/oak/trunk/oak-core/src/main/java/org/apache/jackrabbit/oak/security/user/UserProvider.java?rev=1836177&r1=1836176&r2=1836177&view=diff
==============================================================================
--- 
jackrabbit/oak/trunk/oak-core/src/main/java/org/apache/jackrabbit/oak/security/user/UserProvider.java
 (original)
+++ 
jackrabbit/oak/trunk/oak-core/src/main/java/org/apache/jackrabbit/oak/security/user/UserProvider.java
 Wed Jul 18 14:37:06 2018
@@ -20,9 +20,6 @@ import java.security.Principal;
 import java.text.ParseException;
 import java.util.Collections;
 import java.util.Iterator;
-import javax.annotation.CheckForNull;
-import javax.annotation.Nonnull;
-import javax.annotation.Nullable;
 import javax.jcr.AccessDeniedException;
 import javax.jcr.RepositoryException;
 import javax.jcr.nodetype.ConstraintViolationException;
@@ -43,6 +40,8 @@ import org.apache.jackrabbit.oak.spi.sec
 import org.apache.jackrabbit.oak.spi.security.user.UserConstants;
 import org.apache.jackrabbit.oak.plugins.tree.TreeUtil;
 import org.apache.jackrabbit.util.Text;
+import org.jetbrains.annotations.NotNull;
+import org.jetbrains.annotations.Nullable;
 import org.slf4j.Logger;
 import org.slf4j.LoggerFactory;
 
@@ -170,7 +169,7 @@ class UserProvider extends AuthorizableB
     private final String groupPath;
     private final String userPath;
 
-    UserProvider(@Nonnull Root root, @Nonnull ConfigurationParameters config) {
+    UserProvider(@NotNull Root root, @NotNull ConfigurationParameters config) {
         super(root, config);
 
         defaultDepth = config.getConfigValue(PARAM_DEFAULT_DEPTH, 
DEFAULT_DEPTH);
@@ -178,18 +177,18 @@ class UserProvider extends AuthorizableB
         userPath = config.getConfigValue(PARAM_USER_PATH, DEFAULT_USER_PATH);
     }
 
-    @Nonnull
-    Tree createUser(@Nonnull String userID, @Nullable String 
intermediateJcrPath) throws RepositoryException {
+    @NotNull
+    Tree createUser(@NotNull String userID, @Nullable String 
intermediateJcrPath) throws RepositoryException {
         return createAuthorizableNode(userID, NT_REP_USER, 
intermediateJcrPath);
     }
 
-    @Nonnull
-    Tree createGroup(@Nonnull String groupID, @Nullable String 
intermediateJcrPath) throws RepositoryException {
+    @NotNull
+    Tree createGroup(@NotNull String groupID, @Nullable String 
intermediateJcrPath) throws RepositoryException {
         return createAuthorizableNode(groupID, NT_REP_GROUP, 
intermediateJcrPath);
     }
 
-    @Nonnull
-    Tree createSystemUser(@Nonnull String userID, @Nullable String 
intermediateJcrPath) throws RepositoryException {
+    @NotNull
+    Tree createSystemUser(@NotNull String userID, @Nullable String 
intermediateJcrPath) throws RepositoryException {
         String relSysPath = config.getConfigValue(PARAM_SYSTEM_RELATIVE_PATH, 
DEFAULT_SYSTEM_RELATIVE_PATH);
         String relPath;
         if (intermediateJcrPath == null) {
@@ -204,18 +203,18 @@ class UserProvider extends AuthorizableB
         return createAuthorizableNode(userID, NT_REP_SYSTEM_USER, relPath);
     }
 
-    @CheckForNull
-    Tree getAuthorizable(@Nonnull String authorizableId) {
+    @Nullable
+    Tree getAuthorizable(@NotNull String authorizableId) {
         return getByID(authorizableId, AuthorizableType.AUTHORIZABLE);
     }
 
-    @CheckForNull
-    Tree getAuthorizableByPath(@Nonnull String authorizableOakPath) {
+    @Nullable
+    Tree getAuthorizableByPath(@NotNull String authorizableOakPath) {
         return getByPath(authorizableOakPath, AuthorizableType.AUTHORIZABLE);
     }
 
-    @CheckForNull
-    Tree getAuthorizableByPrincipal(@Nonnull Principal principal) {
+    @Nullable
+    Tree getAuthorizableByPrincipal(@NotNull Principal principal) {
         if (principal instanceof TreeBasedPrincipal) {
             return root.getTree(((TreeBasedPrincipal) principal).getOakPath());
         }
@@ -248,8 +247,8 @@ class UserProvider extends AuthorizableB
 
     //------------------------------------------------------------< private 
>---
 
-    private Tree createAuthorizableNode(@Nonnull String authorizableId,
-                                        @Nonnull String ntName,
+    private Tree createAuthorizableNode(@NotNull String authorizableId,
+                                        @NotNull String ntName,
                                         @Nullable String intermediatePath) 
throws RepositoryException {
         String nodeName = getNodeName(authorizableId);
         Tree folder = createFolderNodes(nodeName, NT_REP_GROUP.equals(ntName), 
intermediatePath);
@@ -285,7 +284,7 @@ class UserProvider extends AuthorizableB
      * @return The folder node.
      * @throws RepositoryException If an error occurs
      */
-    private Tree createFolderNodes(@Nonnull String nodeName,
+    private Tree createFolderNodes(@NotNull String nodeName,
                                        boolean isGroup,
                                        @Nullable String intermediatePath) 
throws RepositoryException {
         String authRoot = (isGroup) ? groupPath : userPath;
@@ -321,10 +320,10 @@ class UserProvider extends AuthorizableB
         return folder;
     }
 
-    @Nonnull
-    private String getFolderPath(@Nonnull String nodeName,
+    @NotNull
+    private String getFolderPath(@NotNull String nodeName,
                                  @Nullable String intermediatePath,
-                                 @Nonnull String authRoot) throws 
ConstraintViolationException {
+                                 @NotNull String authRoot) throws 
ConstraintViolationException {
         boolean emptyOrNull = (intermediatePath == null || 
intermediatePath.isEmpty() || authRoot.equals(intermediatePath));
         StringBuilder sb = new StringBuilder();
         if (!emptyOrNull) {
@@ -354,8 +353,8 @@ class UserProvider extends AuthorizableB
         return sb.toString();
     }
 
-    private String getNodeName(@Nonnull String authorizableId) {
+    private String getNodeName(@NotNull String authorizableId) {
         AuthorizableNodeName generator = 
checkNotNull(config.getConfigValue(PARAM_AUTHORIZABLE_NODE_NAME, 
AuthorizableNodeName.DEFAULT, AuthorizableNodeName.class));
         return generator.generateNodeName(authorizableId);
     }
-}
\ No newline at end of file
+}

Modified: 
jackrabbit/oak/trunk/oak-core/src/main/java/org/apache/jackrabbit/oak/security/user/UserValidator.java
URL: 
http://svn.apache.org/viewvc/jackrabbit/oak/trunk/oak-core/src/main/java/org/apache/jackrabbit/oak/security/user/UserValidator.java?rev=1836177&r1=1836176&r2=1836177&view=diff
==============================================================================
--- 
jackrabbit/oak/trunk/oak-core/src/main/java/org/apache/jackrabbit/oak/security/user/UserValidator.java
 (original)
+++ 
jackrabbit/oak/trunk/oak-core/src/main/java/org/apache/jackrabbit/oak/security/user/UserValidator.java
 Wed Jul 18 14:37:06 2018
@@ -16,9 +16,6 @@
  */
 package org.apache.jackrabbit.oak.security.user;
 
-import javax.annotation.Nonnull;
-import javax.annotation.Nullable;
-
 import org.apache.jackrabbit.JcrConstants;
 import org.apache.jackrabbit.oak.api.CommitFailedException;
 import org.apache.jackrabbit.oak.api.PropertyState;
@@ -34,6 +31,8 @@ import org.apache.jackrabbit.oak.spi.sec
 import org.apache.jackrabbit.oak.spi.state.NodeState;
 import org.apache.jackrabbit.oak.plugins.tree.TreeUtil;
 import org.apache.jackrabbit.util.Text;
+import org.jetbrains.annotations.NotNull;
+import org.jetbrains.annotations.Nullable;
 
 import static com.google.common.base.Preconditions.checkNotNull;
 
@@ -161,7 +160,7 @@ class UserValidator extends DefaultValid
                 true);
     }
 
-    private boolean isAdminUser(@Nonnull Tree userTree) {
+    private boolean isAdminUser(@NotNull Tree userTree) {
         if (userTree.exists() && isUser(userTree)) {
             String id = UserUtil.getAuthorizableId(userTree);
             return UserUtil.getAdminId(provider.getConfig()).equals(id);
@@ -170,7 +169,7 @@ class UserValidator extends DefaultValid
         }
     }
 
-    private void validateAuthorizable(@Nonnull Tree tree, @Nullable 
AuthorizableType type) throws CommitFailedException {
+    private void validateAuthorizable(@NotNull Tree tree, @Nullable 
AuthorizableType type) throws CommitFailedException {
         boolean isSystemUser = (type == AuthorizableType.USER) && 
UserUtil.isSystemUser(tree);
         String authRoot = 
UserUtil.getAuthorizableRootPath(provider.getConfig(), type);
         if (isSystemUser) {
@@ -196,7 +195,7 @@ class UserValidator extends DefaultValid
         }
     }
 
-    private boolean isValidUUID(@Nonnull Tree parent, @Nonnull String uuid) {
+    private boolean isValidUUID(@NotNull Tree parent, @NotNull String uuid) {
         String id = UserUtil.getAuthorizableId(parent);
         return id != null && 
uuid.equals(provider.getMembershipProvider().getContentID(id));
     }
@@ -213,7 +212,7 @@ class UserValidator extends DefaultValid
      * @param pathConstraint The path constraint.
      * @throws CommitFailedException If the hierarchy isn't valid.
      */
-    private static void assertHierarchy(@Nonnull Tree tree, @Nonnull String 
pathConstraint) throws CommitFailedException {
+    private static void assertHierarchy(@NotNull Tree tree, @NotNull String 
pathConstraint) throws CommitFailedException {
         if (!Text.isDescendant(pathConstraint, tree.getPath())) {
             String msg = "Attempt to create user/group outside of configured 
scope " + pathConstraint;
             throw constraintViolation(28, msg);
@@ -230,7 +229,7 @@ class UserValidator extends DefaultValid
         }
     }
 
-    private static CommitFailedException constraintViolation(int code, 
@Nonnull String message) {
+    private static CommitFailedException constraintViolation(int code, 
@NotNull String message) {
         return new CommitFailedException(CommitFailedException.CONSTRAINT, 
code, message);
     }
-}
\ No newline at end of file
+}

Modified: 
jackrabbit/oak/trunk/oak-core/src/main/java/org/apache/jackrabbit/oak/security/user/UserValidatorProvider.java
URL: 
http://svn.apache.org/viewvc/jackrabbit/oak/trunk/oak-core/src/main/java/org/apache/jackrabbit/oak/security/user/UserValidatorProvider.java?rev=1836177&r1=1836176&r2=1836177&view=diff
==============================================================================
--- 
jackrabbit/oak/trunk/oak-core/src/main/java/org/apache/jackrabbit/oak/security/user/UserValidatorProvider.java
 (original)
+++ 
jackrabbit/oak/trunk/oak-core/src/main/java/org/apache/jackrabbit/oak/security/user/UserValidatorProvider.java
 Wed Jul 18 14:37:06 2018
@@ -16,8 +16,6 @@
  */
 package org.apache.jackrabbit.oak.security.user;
 
-import javax.annotation.Nonnull;
-
 import org.apache.jackrabbit.oak.plugins.tree.RootProvider;
 import org.apache.jackrabbit.oak.plugins.tree.TreeProvider;
 import org.apache.jackrabbit.oak.spi.commit.CommitInfo;
@@ -25,6 +23,7 @@ import org.apache.jackrabbit.oak.spi.com
 import org.apache.jackrabbit.oak.spi.commit.ValidatorProvider;
 import org.apache.jackrabbit.oak.spi.security.ConfigurationParameters;
 import org.apache.jackrabbit.oak.spi.state.NodeState;
+import org.jetbrains.annotations.NotNull;
 
 /**
  * Provides a validator for user and group management.
@@ -37,7 +36,7 @@ class UserValidatorProvider extends Vali
 
     private MembershipProvider membershipProvider;
 
-    UserValidatorProvider(@Nonnull ConfigurationParameters config, @Nonnull 
RootProvider rootProvider, @Nonnull TreeProvider treeProvider) {
+    UserValidatorProvider(@NotNull ConfigurationParameters config, @NotNull 
RootProvider rootProvider, @NotNull TreeProvider treeProvider) {
         this.config = config;
         this.rootProvider = rootProvider;
         this.treeProvider = treeProvider;
@@ -45,7 +44,7 @@ class UserValidatorProvider extends Vali
 
     //--------------------------------------------------< ValidatorProvider 
>---
 
-    @Override @Nonnull
+    @Override @NotNull
     public Validator getRootValidator(
             NodeState before, NodeState after, CommitInfo info) {
         membershipProvider = new 
MembershipProvider(rootProvider.createReadOnlyRoot(after), config);
@@ -53,13 +52,13 @@ class UserValidatorProvider extends Vali
     }
 
     //-----------------------------------------------------------< internal 
>---
-    @Nonnull
+    @NotNull
     ConfigurationParameters getConfig() {
         return config;
     }
 
-    @Nonnull
+    @NotNull
     MembershipProvider getMembershipProvider() {
         return membershipProvider;
     }
-}
\ No newline at end of file
+}

Modified: 
jackrabbit/oak/trunk/oak-core/src/main/java/org/apache/jackrabbit/oak/security/user/Utils.java
URL: 
http://svn.apache.org/viewvc/jackrabbit/oak/trunk/oak-core/src/main/java/org/apache/jackrabbit/oak/security/user/Utils.java?rev=1836177&r1=1836176&r2=1836177&view=diff
==============================================================================
--- 
jackrabbit/oak/trunk/oak-core/src/main/java/org/apache/jackrabbit/oak/security/user/Utils.java
 (original)
+++ 
jackrabbit/oak/trunk/oak-core/src/main/java/org/apache/jackrabbit/oak/security/user/Utils.java
 Wed Jul 18 14:37:06 2018
@@ -16,13 +16,13 @@
  */
 package org.apache.jackrabbit.oak.security.user;
 
-import javax.annotation.Nonnull;
 import javax.jcr.AccessDeniedException;
 
 import org.apache.jackrabbit.oak.api.Tree;
 import org.apache.jackrabbit.oak.commons.PathUtils;
 import org.apache.jackrabbit.oak.plugins.tree.TreeUtil;
 import org.apache.jackrabbit.util.Text;
+import org.jetbrains.annotations.NotNull;
 
 class Utils {
 
@@ -46,8 +46,8 @@ class Utils {
      * @throws AccessDeniedException If the any intermediate tree does not 
exist
      *                               and cannot be created.
      */
-    @Nonnull
-    static Tree getOrAddTree(@Nonnull Tree tree, @Nonnull String relativePath, 
@Nonnull String primaryTypeName) throws AccessDeniedException {
+    @NotNull
+    static Tree getOrAddTree(@NotNull Tree tree, @NotNull String relativePath, 
@NotNull String primaryTypeName) throws AccessDeniedException {
         if (PathUtils.denotesCurrent(relativePath)) {
             return tree;
         } else if (PathUtils.denotesParent(relativePath)) {
@@ -76,4 +76,4 @@ class Utils {
             }
         }
     }
-}
\ No newline at end of file
+}

Modified: 
jackrabbit/oak/trunk/oak-core/src/main/java/org/apache/jackrabbit/oak/security/user/autosave/AutoSaveEnabledManager.java
URL: 
http://svn.apache.org/viewvc/jackrabbit/oak/trunk/oak-core/src/main/java/org/apache/jackrabbit/oak/security/user/autosave/AutoSaveEnabledManager.java?rev=1836177&r1=1836176&r2=1836177&view=diff
==============================================================================
--- 
jackrabbit/oak/trunk/oak-core/src/main/java/org/apache/jackrabbit/oak/security/user/autosave/AutoSaveEnabledManager.java
 (original)
+++ 
jackrabbit/oak/trunk/oak-core/src/main/java/org/apache/jackrabbit/oak/security/user/autosave/AutoSaveEnabledManager.java
 Wed Jul 18 14:37:06 2018
@@ -18,9 +18,6 @@ package org.apache.jackrabbit.oak.securi
 
 import java.security.Principal;
 import java.util.Iterator;
-import javax.annotation.CheckForNull;
-import javax.annotation.Nonnull;
-import javax.annotation.Nullable;
 import javax.jcr.RepositoryException;
 
 import org.apache.jackrabbit.api.security.user.Authorizable;
@@ -31,6 +28,8 @@ import org.apache.jackrabbit.api.securit
 import org.apache.jackrabbit.oak.api.CommitFailedException;
 import org.apache.jackrabbit.oak.api.Root;
 import org.apache.jackrabbit.oak.spi.security.user.util.UserUtil;
+import org.jetbrains.annotations.NotNull;
+import org.jetbrains.annotations.Nullable;
 
 /**
  * Implementation of the user management that allows to set the autosave flag.
@@ -187,7 +186,7 @@ public class AutoSaveEnabledManager impl
         }
     }
 
-    @CheckForNull
+    @Nullable
     Authorizable wrap(@Nullable Authorizable authorizable) {
         if (authorizable == null) {
             return null;
@@ -199,13 +198,13 @@ public class AutoSaveEnabledManager impl
         }
     }
 
-    @Nonnull
-    User wrap(@Nonnull User user) {
+    @NotNull
+    User wrap(@NotNull User user) {
         return new UserImpl(user, this);
     }
 
-    @Nonnull
-    Group wrap(@Nonnull Group group) {
+    @NotNull
+    Group wrap(@NotNull Group group) {
         return new GroupImpl(group, this);
     }
-}
\ No newline at end of file
+}

Modified: 
jackrabbit/oak/trunk/oak-core/src/main/java/org/apache/jackrabbit/oak/security/user/autosave/GroupImpl.java
URL: 
http://svn.apache.org/viewvc/jackrabbit/oak/trunk/oak-core/src/main/java/org/apache/jackrabbit/oak/security/user/autosave/GroupImpl.java?rev=1836177&r1=1836176&r2=1836177&view=diff
==============================================================================
--- 
jackrabbit/oak/trunk/oak-core/src/main/java/org/apache/jackrabbit/oak/security/user/autosave/GroupImpl.java
 (original)
+++ 
jackrabbit/oak/trunk/oak-core/src/main/java/org/apache/jackrabbit/oak/security/user/autosave/GroupImpl.java
 Wed Jul 18 14:37:06 2018
@@ -18,11 +18,11 @@ package org.apache.jackrabbit.oak.securi
 
 import java.util.Iterator;
 import java.util.Set;
-import javax.annotation.Nonnull;
 import javax.jcr.RepositoryException;
 
 import org.apache.jackrabbit.api.security.user.Authorizable;
 import org.apache.jackrabbit.api.security.user.Group;
+import org.jetbrains.annotations.NotNull;
 
 class GroupImpl extends AuthorizableImpl implements Group {
 
@@ -76,7 +76,7 @@ class GroupImpl extends AuthorizableImpl
     }
 
     @Override
-    public Set<String> addMembers(@Nonnull String... memberIds) throws 
RepositoryException {
+    public Set<String> addMembers(@NotNull String... memberIds) throws 
RepositoryException {
         try {
             return getDelegate().addMembers(memberIds);
         } finally {
@@ -98,7 +98,7 @@ class GroupImpl extends AuthorizableImpl
     }
 
     @Override
-    public Set<String> removeMembers(@Nonnull String... memberIds) throws 
RepositoryException {
+    public Set<String> removeMembers(@NotNull String... memberIds) throws 
RepositoryException {
         try {
             return getDelegate().removeMembers(memberIds);
         } finally {
@@ -109,4 +109,4 @@ class GroupImpl extends AuthorizableImpl
     private boolean isValid(Authorizable a) {
         return a instanceof AuthorizableImpl;
     }
-}
\ No newline at end of file
+}

Modified: 
jackrabbit/oak/trunk/oak-core/src/main/java/org/apache/jackrabbit/oak/security/user/query/GroupPredicate.java
URL: 
http://svn.apache.org/viewvc/jackrabbit/oak/trunk/oak-core/src/main/java/org/apache/jackrabbit/oak/security/user/query/GroupPredicate.java?rev=1836177&r1=1836176&r2=1836177&view=diff
==============================================================================
--- 
jackrabbit/oak/trunk/oak-core/src/main/java/org/apache/jackrabbit/oak/security/user/query/GroupPredicate.java
 (original)
+++ 
jackrabbit/oak/trunk/oak-core/src/main/java/org/apache/jackrabbit/oak/security/user/query/GroupPredicate.java
 Wed Jul 18 14:37:06 2018
@@ -20,14 +20,13 @@ import java.util.Collections;
 import java.util.HashSet;
 import java.util.Iterator;
 import java.util.Set;
-import javax.annotation.CheckForNull;
-import javax.annotation.Nullable;
 import javax.jcr.RepositoryException;
 
 import com.google.common.base.Predicate;
 import org.apache.jackrabbit.api.security.user.Authorizable;
 import org.apache.jackrabbit.api.security.user.Group;
 import org.apache.jackrabbit.api.security.user.UserManager;
+import org.jetbrains.annotations.Nullable;
 import org.slf4j.Logger;
 import org.slf4j.LoggerFactory;
 
@@ -74,8 +73,8 @@ class GroupPredicate implements Predicat
         return false;
     }
 
-    @CheckForNull
-    private String saveGetId(@CheckForNull Authorizable authorizable) {
+    @Nullable
+    private String saveGetId(@Nullable Authorizable authorizable) {
         if (authorizable != null) {
             try {
                 return authorizable.getID();

Modified: 
jackrabbit/oak/trunk/oak-core/src/main/java/org/apache/jackrabbit/oak/security/user/query/QueryUtil.java
URL: 
http://svn.apache.org/viewvc/jackrabbit/oak/trunk/oak-core/src/main/java/org/apache/jackrabbit/oak/security/user/query/QueryUtil.java?rev=1836177&r1=1836176&r2=1836177&view=diff
==============================================================================
--- 
jackrabbit/oak/trunk/oak-core/src/main/java/org/apache/jackrabbit/oak/security/user/query/QueryUtil.java
 (original)
+++ 
jackrabbit/oak/trunk/oak-core/src/main/java/org/apache/jackrabbit/oak/security/user/query/QueryUtil.java
 Wed Jul 18 14:37:06 2018
@@ -16,7 +16,6 @@
  */
 package org.apache.jackrabbit.oak.security.user.query;
 
-import javax.annotation.Nonnull;
 import javax.jcr.PropertyType;
 import javax.jcr.RepositoryException;
 import javax.jcr.Value;
@@ -29,6 +28,7 @@ import org.apache.jackrabbit.oak.spi.sec
 import org.apache.jackrabbit.oak.spi.security.user.AuthorizableType;
 import org.apache.jackrabbit.oak.spi.security.user.UserConstants;
 import org.apache.jackrabbit.oak.spi.security.user.util.UserUtil;
+import org.jetbrains.annotations.NotNull;
 
 /**
  * Common utilities used for user/group queries.
@@ -45,7 +45,7 @@ public final class QueryUtil {
      * @param config The configuration parameters.
      * @return The path of search root for the specified authorizable type.
      */
-    @Nonnull
+    @NotNull
     public static String getSearchRoot(AuthorizableType type, 
ConfigurationParameters config) {
         String path = UserUtil.getAuthorizableRootPath(config, type);
         return QueryConstants.SEARCH_ROOT_PATH + path;
@@ -57,8 +57,8 @@ public final class QueryUtil {
      * @param type The authorizable type.
      * @return The corresponding node type name.
      */
-    @Nonnull
-    public static String getNodeTypeName(@Nonnull AuthorizableType type) {
+    @NotNull
+    public static String getNodeTypeName(@NotNull AuthorizableType type) {
         if (type == AuthorizableType.USER) {
             return UserConstants.NT_REP_USER;
         } else if (type == AuthorizableType.GROUP) {
@@ -74,13 +74,13 @@ public final class QueryUtil {
      * @param string string to escape
      * @return escaped string
      */
-    @Nonnull
-    public static String escapeNodeName(@Nonnull String string) {
+    @NotNull
+    public static String escapeNodeName(@NotNull String string) {
         return QueryUtils.escapeNodeName(string);
     }
 
-    @Nonnull
-    public static String format(@Nonnull Value value) throws 
RepositoryException {
+    @NotNull
+    public static String format(@NotNull Value value) throws 
RepositoryException {
         switch (value.getType()) {
             case PropertyType.STRING:
             case PropertyType.BOOLEAN:
@@ -98,18 +98,18 @@ public final class QueryUtil {
         }
     }
 
-    @Nonnull
-    public static String escapeForQuery(@Nonnull String oakName, @Nonnull 
NamePathMapper namePathMapper) {
+    @NotNull
+    public static String escapeForQuery(@NotNull String oakName, @NotNull 
NamePathMapper namePathMapper) {
         return escapeForQuery(namePathMapper.getJcrName(oakName));
     }
 
-    @Nonnull
-    public static String escapeForQuery(@Nonnull String value) {
+    @NotNull
+    public static String escapeForQuery(@NotNull String value) {
         return QueryUtils.escapeForQuery(value);
     }
 
-    @Nonnull
-    public static RelationOp getCollation(@Nonnull QueryBuilder.Direction 
direction) throws RepositoryException {
+    @NotNull
+    public static RelationOp getCollation(@NotNull QueryBuilder.Direction 
direction) throws RepositoryException {
         switch (direction) {
             case ASCENDING:
                 return RelationOp.GT;

Modified: 
jackrabbit/oak/trunk/oak-core/src/main/java/org/apache/jackrabbit/oak/security/user/query/ResultRowToAuthorizable.java
URL: 
http://svn.apache.org/viewvc/jackrabbit/oak/trunk/oak-core/src/main/java/org/apache/jackrabbit/oak/security/user/query/ResultRowToAuthorizable.java?rev=1836177&r1=1836176&r2=1836177&view=diff
==============================================================================
--- 
jackrabbit/oak/trunk/oak-core/src/main/java/org/apache/jackrabbit/oak/security/user/query/ResultRowToAuthorizable.java
 (original)
+++ 
jackrabbit/oak/trunk/oak-core/src/main/java/org/apache/jackrabbit/oak/security/user/query/ResultRowToAuthorizable.java
 Wed Jul 18 14:37:06 2018
@@ -16,9 +16,6 @@
  */
 package org.apache.jackrabbit.oak.security.user.query;
 
-import javax.annotation.CheckForNull;
-import javax.annotation.Nonnull;
-import javax.annotation.Nullable;
 import javax.jcr.RepositoryException;
 
 import com.google.common.base.Function;
@@ -31,6 +28,8 @@ import org.apache.jackrabbit.oak.securit
 import org.apache.jackrabbit.oak.spi.query.QueryConstants;
 import org.apache.jackrabbit.oak.spi.security.user.AuthorizableType;
 import org.apache.jackrabbit.oak.spi.security.user.util.UserUtil;
+import org.jetbrains.annotations.NotNull;
+import org.jetbrains.annotations.Nullable;
 import org.slf4j.Logger;
 import org.slf4j.LoggerFactory;
 
@@ -46,7 +45,7 @@ class ResultRowToAuthorizable implements
     private final Root root;
     private final AuthorizableType targetType;
 
-    ResultRowToAuthorizable(@Nonnull UserManagerImpl userManager, @Nonnull 
Root root,
+    ResultRowToAuthorizable(@NotNull UserManagerImpl userManager, @NotNull 
Root root,
                             @Nullable AuthorizableType targetType) {
         this.userManager = userManager;
         this.root = root;
@@ -60,8 +59,8 @@ class ResultRowToAuthorizable implements
     }
 
     //------------------------------------------------------------< private 
>---
-    @CheckForNull
-    private Authorizable getAuthorizable(@CheckForNull ResultRow row) {
+    @Nullable
+    private Authorizable getAuthorizable(@Nullable ResultRow row) {
         Authorizable authorizable = null;
         if (row != null) {
             String resultPath = 
row.getValue(QueryConstants.JCR_PATH).getValue(Type.STRING);
@@ -81,4 +80,4 @@ class ResultRowToAuthorizable implements
         }
         return authorizable;
     }
-}
\ No newline at end of file
+}


Reply via email to