Author: reschke
Date: Wed Jul 18 14:41:56 2018
New Revision: 1836179

URL: http://svn.apache.org/viewvc?rev=1836179&view=rev
Log:
OAK-7511: get rid of JSR 305 dependency - use jetbrains nullability annotations 
instead - oak-exercise

Modified:
    jackrabbit/oak/trunk/oak-exercise/pom.xml
    
jackrabbit/oak/trunk/oak-exercise/src/main/java/org/apache/jackrabbit/oak/exercise/security/authentication/external/CustomExternalIdentityProvider.java
    
jackrabbit/oak/trunk/oak-exercise/src/main/java/org/apache/jackrabbit/oak/exercise/security/authorization/models/predefined/Editor.java
    
jackrabbit/oak/trunk/oak-exercise/src/main/java/org/apache/jackrabbit/oak/exercise/security/authorization/models/predefined/PredefinedAuthorizationConfiguration.java
    
jackrabbit/oak/trunk/oak-exercise/src/main/java/org/apache/jackrabbit/oak/exercise/security/authorization/models/predefined/PredefinedPermissionProvider.java
    
jackrabbit/oak/trunk/oak-exercise/src/main/java/org/apache/jackrabbit/oak/exercise/security/authorization/models/predefined/Reader.java
    
jackrabbit/oak/trunk/oak-exercise/src/main/java/org/apache/jackrabbit/oak/exercise/security/authorization/models/readonly/ReadOnlyAuthorizationConfiguration.java
    
jackrabbit/oak/trunk/oak-exercise/src/main/java/org/apache/jackrabbit/oak/exercise/security/authorization/models/simplifiedroles/Role.java
    
jackrabbit/oak/trunk/oak-exercise/src/main/java/org/apache/jackrabbit/oak/exercise/security/authorization/models/simplifiedroles/ThreeRolesAccessControlManager.java
    
jackrabbit/oak/trunk/oak-exercise/src/main/java/org/apache/jackrabbit/oak/exercise/security/authorization/models/simplifiedroles/ThreeRolesAuthorizationConfiguration.java
    
jackrabbit/oak/trunk/oak-exercise/src/main/java/org/apache/jackrabbit/oak/exercise/security/authorization/models/simplifiedroles/ThreeRolesPermissionProvider.java
    
jackrabbit/oak/trunk/oak-exercise/src/main/java/org/apache/jackrabbit/oak/exercise/security/authorization/models/simplifiedroles/ThreeRolesTreePermission.java
    
jackrabbit/oak/trunk/oak-exercise/src/main/java/org/apache/jackrabbit/oak/exercise/security/authorization/models/simplifiedroles/Utils.java
    
jackrabbit/oak/trunk/oak-exercise/src/main/java/org/apache/jackrabbit/oak/exercise/security/authorization/restriction/CustomRestrictionProvider.java
    
jackrabbit/oak/trunk/oak-exercise/src/main/java/org/apache/jackrabbit/oak/exercise/security/principal/CustomPrincipalConfiguration.java
    
jackrabbit/oak/trunk/oak-exercise/src/main/java/org/apache/jackrabbit/oak/exercise/security/principal/CustomPrincipalProvider.java
    
jackrabbit/oak/trunk/oak-exercise/src/test/java/org/apache/jackrabbit/oak/exercise/ExerciseUtility.java
    
jackrabbit/oak/trunk/oak-exercise/src/test/java/org/apache/jackrabbit/oak/exercise/security/authorization/advanced/L4_CustomAccessControlManagementTest.java
    
jackrabbit/oak/trunk/oak-exercise/src/test/java/org/apache/jackrabbit/oak/exercise/security/authorization/advanced/L5_CustomPermissionEvaluationTest.java
    
jackrabbit/oak/trunk/oak-exercise/src/test/java/org/apache/jackrabbit/oak/exercise/security/authorization/permission/L1_IntroductionTest.java
    
jackrabbit/oak/trunk/oak-exercise/src/test/java/org/apache/jackrabbit/oak/exercise/security/privilege/L3_BuiltInPrivilegesTest.java
    
jackrabbit/oak/trunk/oak-exercise/src/test/java/org/apache/jackrabbit/oak/exercise/security/privilege/L4_CustomPrivilegeTest.java

Modified: jackrabbit/oak/trunk/oak-exercise/pom.xml
URL: 
http://svn.apache.org/viewvc/jackrabbit/oak/trunk/oak-exercise/pom.xml?rev=1836179&r1=1836178&r2=1836179&view=diff
==============================================================================
--- jackrabbit/oak/trunk/oak-exercise/pom.xml (original)
+++ jackrabbit/oak/trunk/oak-exercise/pom.xml Wed Jul 18 14:41:56 2018
@@ -125,10 +125,10 @@
       <version>${jackrabbit.version}</version>
     </dependency>
 
-    <!-- Findbugs annotations -->
+    <!-- Nullability annotations -->
     <dependency>
-      <groupId>com.google.code.findbugs</groupId>
-      <artifactId>jsr305</artifactId>
+      <groupId>org.jetbrains</groupId>
+      <artifactId>annotations</artifactId>
     </dependency>
 
     <!-- OSGi -->

Modified: 
jackrabbit/oak/trunk/oak-exercise/src/main/java/org/apache/jackrabbit/oak/exercise/security/authentication/external/CustomExternalIdentityProvider.java
URL: 
http://svn.apache.org/viewvc/jackrabbit/oak/trunk/oak-exercise/src/main/java/org/apache/jackrabbit/oak/exercise/security/authentication/external/CustomExternalIdentityProvider.java?rev=1836179&r1=1836178&r2=1836179&view=diff
==============================================================================
--- 
jackrabbit/oak/trunk/oak-exercise/src/main/java/org/apache/jackrabbit/oak/exercise/security/authentication/external/CustomExternalIdentityProvider.java
 (original)
+++ 
jackrabbit/oak/trunk/oak-exercise/src/main/java/org/apache/jackrabbit/oak/exercise/security/authentication/external/CustomExternalIdentityProvider.java
 Wed Jul 18 14:41:56 2018
@@ -22,8 +22,6 @@ import java.util.HashSet;
 import java.util.Iterator;
 import java.util.Map;
 import java.util.Set;
-import javax.annotation.Nonnull;
-import javax.annotation.Nullable;
 import javax.jcr.Credentials;
 import javax.jcr.SimpleCredentials;
 import javax.security.auth.login.LoginException;
@@ -46,6 +44,8 @@ import org.apache.jackrabbit.oak.spi.sec
 import 
org.apache.jackrabbit.oak.spi.security.authentication.external.ExternalIdentityRef;
 import 
org.apache.jackrabbit.oak.spi.security.authentication.external.ExternalUser;
 import org.apache.jackrabbit.util.Text;
+import org.jetbrains.annotations.NotNull;
+import org.jetbrains.annotations.Nullable;
 import org.slf4j.Logger;
 import org.slf4j.LoggerFactory;
 
@@ -98,14 +98,14 @@ public class CustomExternalIdentityProvi
         log.info("modified IDP: " + getName());
     }
 
-    @Nonnull
+    @NotNull
     @Override
     public String getName() {
         return "CustomExternalIdentityProvider";
     }
 
     @Override
-    public ExternalIdentity getIdentity(@Nonnull ExternalIdentityRef ref) 
throws ExternalIdentityException {
+    public ExternalIdentity getIdentity(@NotNull ExternalIdentityRef ref) 
throws ExternalIdentityException {
         if (getName().equals(ref.getProviderName())) {
             String id = ref.getId();
             ExternalIdentity ei = getUser(id);
@@ -119,23 +119,23 @@ public class CustomExternalIdentityProvi
     }
 
     @Override
-    public ExternalUser getUser(@Nonnull final String userId) throws 
ExternalIdentityException {
+    public ExternalUser getUser(@NotNull final String userId) throws 
ExternalIdentityException {
         if (userGroupMap.containsKey(userId)) {
             return new ExternalUser() {
 
-                @Nonnull
+                @NotNull
                 @Override
                 public ExternalIdentityRef getExternalId() {
                     return new ExternalIdentityRef(userId, getName());
                 }
 
-                @Nonnull
+                @NotNull
                 @Override
                 public String getId() {
                     return userId;
                 }
 
-                @Nonnull
+                @NotNull
                 @Override
                 public String getPrincipalName() {
                     return "p_" + getExternalId().getString();
@@ -146,7 +146,7 @@ public class CustomExternalIdentityProvi
                     return null;
                 }
 
-                @Nonnull
+                @NotNull
                 @Override
                 public Iterable<ExternalIdentityRef> getDeclaredGroups() 
throws ExternalIdentityException {
                     Set<String> groupIds = userGroupMap.get(userId);
@@ -163,7 +163,7 @@ public class CustomExternalIdentityProvi
                     }
                 }
 
-                @Nonnull
+                @NotNull
                 @Override
                 public Map<String, ?> getProperties() {
                     return ImmutableMap.of();
@@ -175,7 +175,7 @@ public class CustomExternalIdentityProvi
     }
 
     @Override
-    public ExternalUser authenticate(@Nonnull Credentials credentials) throws 
ExternalIdentityException, LoginException {
+    public ExternalUser authenticate(@NotNull Credentials credentials) throws 
ExternalIdentityException, LoginException {
         if (credentials instanceof SimpleCredentials) {
             String userId = ((SimpleCredentials) credentials).getUserID();
             return getUser(userId);
@@ -185,10 +185,10 @@ public class CustomExternalIdentityProvi
     }
 
     @Override
-    public ExternalGroup getGroup(@Nonnull final String name) throws 
ExternalIdentityException {
+    public ExternalGroup getGroup(@NotNull final String name) throws 
ExternalIdentityException {
         if (groupIds.contains(name)) {
             return new ExternalGroup() {
-                @Nonnull
+                @NotNull
                 @Override
                 public Iterable<ExternalIdentityRef> getDeclaredMembers() 
throws ExternalIdentityException {
                     Set<ExternalIdentityRef> members = new 
HashSet<ExternalIdentityRef>();
@@ -200,19 +200,19 @@ public class CustomExternalIdentityProvi
                     return members;
                 }
 
-                @Nonnull
+                @NotNull
                 @Override
                 public ExternalIdentityRef getExternalId() {
                     return new ExternalIdentityRef(name, getName());
                 }
 
-                @Nonnull
+                @NotNull
                 @Override
                 public String getId() {
                     return name;
                 }
 
-                @Nonnull
+                @NotNull
                 @Override
                 public String getPrincipalName() {
                     return "p_" + getExternalId().getString();
@@ -223,13 +223,13 @@ public class CustomExternalIdentityProvi
                     return null;
                 }
 
-                @Nonnull
+                @NotNull
                 @Override
                 public Iterable<ExternalIdentityRef> getDeclaredGroups() 
throws ExternalIdentityException {
                     return ImmutableSet.of();
                 }
 
-                @Nonnull
+                @NotNull
                 @Override
                 public Map<String, ?> getProperties() {
                     return ImmutableMap.of();
@@ -240,15 +240,15 @@ public class CustomExternalIdentityProvi
         }
     }
 
-    @Nonnull
+    @NotNull
     @Override
     public Iterator<ExternalUser> listUsers() throws ExternalIdentityException 
{
         throw new UnsupportedOperationException("listUsers");
     }
 
-    @Nonnull
+    @NotNull
     @Override
     public Iterator<ExternalGroup> listGroups() throws 
ExternalIdentityException {
         throw new UnsupportedOperationException("listGroups");
     }
-}
\ No newline at end of file
+}

Modified: 
jackrabbit/oak/trunk/oak-exercise/src/main/java/org/apache/jackrabbit/oak/exercise/security/authorization/models/predefined/Editor.java
URL: 
http://svn.apache.org/viewvc/jackrabbit/oak/trunk/oak-exercise/src/main/java/org/apache/jackrabbit/oak/exercise/security/authorization/models/predefined/Editor.java?rev=1836179&r1=1836178&r2=1836179&view=diff
==============================================================================
--- 
jackrabbit/oak/trunk/oak-exercise/src/main/java/org/apache/jackrabbit/oak/exercise/security/authorization/models/predefined/Editor.java
 (original)
+++ 
jackrabbit/oak/trunk/oak-exercise/src/main/java/org/apache/jackrabbit/oak/exercise/security/authorization/models/predefined/Editor.java
 Wed Jul 18 14:41:56 2018
@@ -16,11 +16,11 @@
  */
 package 
org.apache.jackrabbit.oak.exercise.security.authorization.models.predefined;
 
-import javax.annotation.Nonnull;
+import org.jetbrains.annotations.NotNull;
 
 public class Editor extends Reader {
 
-    public Editor(@Nonnull String name) {
+    public Editor(@NotNull String name) {
         super(name);
     }
-}
\ No newline at end of file
+}

Modified: 
jackrabbit/oak/trunk/oak-exercise/src/main/java/org/apache/jackrabbit/oak/exercise/security/authorization/models/predefined/PredefinedAuthorizationConfiguration.java
URL: 
http://svn.apache.org/viewvc/jackrabbit/oak/trunk/oak-exercise/src/main/java/org/apache/jackrabbit/oak/exercise/security/authorization/models/predefined/PredefinedAuthorizationConfiguration.java?rev=1836179&r1=1836178&r2=1836179&view=diff
==============================================================================
--- 
jackrabbit/oak/trunk/oak-exercise/src/main/java/org/apache/jackrabbit/oak/exercise/security/authorization/models/predefined/PredefinedAuthorizationConfiguration.java
 (original)
+++ 
jackrabbit/oak/trunk/oak-exercise/src/main/java/org/apache/jackrabbit/oak/exercise/security/authorization/models/predefined/PredefinedAuthorizationConfiguration.java
 Wed Jul 18 14:41:56 2018
@@ -19,7 +19,6 @@ package org.apache.jackrabbit.oak.exerci
 import java.security.Principal;
 import java.util.Collections;
 import java.util.Set;
-import javax.annotation.Nonnull;
 import javax.jcr.security.AccessControlException;
 import javax.jcr.security.AccessControlManager;
 import javax.jcr.security.AccessControlPolicy;
@@ -42,6 +41,7 @@ import org.apache.jackrabbit.oak.spi.sec
 import 
org.apache.jackrabbit.oak.spi.security.authorization.permission.Permissions;
 import 
org.apache.jackrabbit.oak.spi.security.authorization.restriction.RestrictionProvider;
 import org.apache.jackrabbit.oak.spi.security.privilege.PrivilegeConstants;
+import org.jetbrains.annotations.NotNull;
 
 import static 
org.apache.jackrabbit.oak.spi.security.RegistrationConstants.OAK_SECURITY_NAME;
 
@@ -61,9 +61,9 @@ public final class PredefinedAuthorizati
     private static final long READ_PERMISSIONS = Permissions.READ | 
Permissions.READ_ACCESS_CONTROL;
     private static final Set<String> READ_PRIVILEGE_NAMES = 
ImmutableSet.of(PrivilegeConstants.JCR_READ, 
PrivilegeConstants.JCR_READ_ACCESS_CONTROL, PrivilegeConstants.REP_READ_NODES, 
PrivilegeConstants.REP_READ_PROPERTIES);
 
-    @Nonnull
+    @NotNull
     @Override
-    public AccessControlManager getAccessControlManager(@Nonnull Root root, 
@Nonnull NamePathMapper namePathMapper) {
+    public AccessControlManager getAccessControlManager(@NotNull Root root, 
@NotNull NamePathMapper namePathMapper) {
         return new AbstractAccessControlManager(root, namePathMapper, 
getSecurityProvider()) {
 
             @Override
@@ -108,21 +108,21 @@ public final class PredefinedAuthorizati
         };
     }
 
-    @Nonnull
+    @NotNull
     @Override
     public RestrictionProvider getRestrictionProvider() {
         return RestrictionProvider.EMPTY;
     }
 
-    @Nonnull
+    @NotNull
     @Override
-    public PermissionProvider getPermissionProvider(@Nonnull Root root, 
@Nonnull String workspaceName, @Nonnull Set<Principal> principals) {
+    public PermissionProvider getPermissionProvider(@NotNull Root root, 
@NotNull String workspaceName, @NotNull Set<Principal> principals) {
         return new PredefinedPermissionProvider(principals);
     }
 
-    @Nonnull
+    @NotNull
     @Override
     public String getName() {
         return AuthorizationConfiguration.NAME;
     }
-}
\ No newline at end of file
+}

Modified: 
jackrabbit/oak/trunk/oak-exercise/src/main/java/org/apache/jackrabbit/oak/exercise/security/authorization/models/predefined/PredefinedPermissionProvider.java
URL: 
http://svn.apache.org/viewvc/jackrabbit/oak/trunk/oak-exercise/src/main/java/org/apache/jackrabbit/oak/exercise/security/authorization/models/predefined/PredefinedPermissionProvider.java?rev=1836179&r1=1836178&r2=1836179&view=diff
==============================================================================
--- 
jackrabbit/oak/trunk/oak-exercise/src/main/java/org/apache/jackrabbit/oak/exercise/security/authorization/models/predefined/PredefinedPermissionProvider.java
 (original)
+++ 
jackrabbit/oak/trunk/oak-exercise/src/main/java/org/apache/jackrabbit/oak/exercise/security/authorization/models/predefined/PredefinedPermissionProvider.java
 Wed Jul 18 14:41:56 2018
@@ -18,15 +18,14 @@ package org.apache.jackrabbit.oak.exerci
 
 import java.security.Principal;
 import java.util.Set;
-import javax.annotation.Nonnull;
-import javax.annotation.Nullable;
-
 import com.google.common.collect.ImmutableSet;
 import org.apache.jackrabbit.oak.api.PropertyState;
 import org.apache.jackrabbit.oak.api.Tree;
 import 
org.apache.jackrabbit.oak.spi.security.authorization.permission.PermissionProvider;
 import 
org.apache.jackrabbit.oak.spi.security.authorization.permission.RepositoryPermission;
 import 
org.apache.jackrabbit.oak.spi.security.authorization.permission.TreePermission;
+import org.jetbrains.annotations.NotNull;
+import org.jetbrains.annotations.Nullable;
 
 /**
  * EXERCISE: complete PermissionProvider implementation
@@ -35,7 +34,7 @@ class PredefinedPermissionProvider imple
 
     private final Set<Principal> principals;
 
-    PredefinedPermissionProvider(@Nonnull Set<Principal> principals) {
+    PredefinedPermissionProvider(@NotNull Set<Principal> principals) {
         this.principals = principals;
     }
 
@@ -45,7 +44,7 @@ class PredefinedPermissionProvider imple
 
     }
 
-    @Nonnull
+    @NotNull
     @Override
     public Set<String> getPrivileges(@Nullable Tree tree) {
         // EXERCISE: complete PermissionProvider implementation
@@ -53,34 +52,34 @@ class PredefinedPermissionProvider imple
     }
 
     @Override
-    public boolean hasPrivileges(@Nullable Tree tree, @Nonnull String... 
privilegeNames) {
+    public boolean hasPrivileges(@Nullable Tree tree, @NotNull String... 
privilegeNames) {
         // EXERCISE: complete PermissionProvider implementation
         return false;
     }
 
-    @Nonnull
+    @NotNull
     @Override
     public RepositoryPermission getRepositoryPermission() {
         // EXERCISE: complete PermissionProvider implementation
         return RepositoryPermission.EMPTY;
     }
 
-    @Nonnull
+    @NotNull
     @Override
-    public TreePermission getTreePermission(@Nonnull Tree tree, @Nonnull 
TreePermission parentPermission) {
+    public TreePermission getTreePermission(@NotNull Tree tree, @NotNull 
TreePermission parentPermission) {
         // EXERCISE: complete PermissionProvider implementation
         return TreePermission.EMPTY;
     }
 
     @Override
-    public boolean isGranted(@Nonnull Tree tree, @Nullable PropertyState 
property, long permissions) {
+    public boolean isGranted(@NotNull Tree tree, @Nullable PropertyState 
property, long permissions) {
         // EXERCISE: complete PermissionProvider implementation
         return false;
     }
 
     @Override
-    public boolean isGranted(@Nonnull String oakPath, @Nonnull String 
jcrActions) {
+    public boolean isGranted(@NotNull String oakPath, @NotNull String 
jcrActions) {
         // EXERCISE: complete PermissionProvider implementation
         return false;
     }
-}
\ No newline at end of file
+}

Modified: 
jackrabbit/oak/trunk/oak-exercise/src/main/java/org/apache/jackrabbit/oak/exercise/security/authorization/models/predefined/Reader.java
URL: 
http://svn.apache.org/viewvc/jackrabbit/oak/trunk/oak-exercise/src/main/java/org/apache/jackrabbit/oak/exercise/security/authorization/models/predefined/Reader.java?rev=1836179&r1=1836178&r2=1836179&view=diff
==============================================================================
--- 
jackrabbit/oak/trunk/oak-exercise/src/main/java/org/apache/jackrabbit/oak/exercise/security/authorization/models/predefined/Reader.java
 (original)
+++ 
jackrabbit/oak/trunk/oak-exercise/src/main/java/org/apache/jackrabbit/oak/exercise/security/authorization/models/predefined/Reader.java
 Wed Jul 18 14:41:56 2018
@@ -18,8 +18,7 @@ package org.apache.jackrabbit.oak.exerci
 
 import java.security.Principal;
 
-import javax.annotation.Nonnull;
-
+import org.jetbrains.annotations.NotNull;
 import org.slf4j.Logger;
 import org.slf4j.LoggerFactory;
 
@@ -27,7 +26,7 @@ public class Reader implements Principal
 
     private final String name;
 
-    public Reader(@Nonnull String name) {
+    public Reader(@NotNull String name) {
         this.name = name;
     }
 
@@ -35,4 +34,4 @@ public class Reader implements Principal
     public String getName() {
         return name;
     }
-}
\ No newline at end of file
+}

Modified: 
jackrabbit/oak/trunk/oak-exercise/src/main/java/org/apache/jackrabbit/oak/exercise/security/authorization/models/readonly/ReadOnlyAuthorizationConfiguration.java
URL: 
http://svn.apache.org/viewvc/jackrabbit/oak/trunk/oak-exercise/src/main/java/org/apache/jackrabbit/oak/exercise/security/authorization/models/readonly/ReadOnlyAuthorizationConfiguration.java?rev=1836179&r1=1836178&r2=1836179&view=diff
==============================================================================
--- 
jackrabbit/oak/trunk/oak-exercise/src/main/java/org/apache/jackrabbit/oak/exercise/security/authorization/models/readonly/ReadOnlyAuthorizationConfiguration.java
 (original)
+++ 
jackrabbit/oak/trunk/oak-exercise/src/main/java/org/apache/jackrabbit/oak/exercise/security/authorization/models/readonly/ReadOnlyAuthorizationConfiguration.java
 Wed Jul 18 14:41:56 2018
@@ -20,8 +20,6 @@ import java.security.Principal;
 import java.util.Collections;
 import java.util.List;
 import java.util.Set;
-import javax.annotation.Nonnull;
-import javax.annotation.Nullable;
 import javax.jcr.security.AccessControlException;
 import javax.jcr.security.AccessControlManager;
 import javax.jcr.security.AccessControlPolicy;
@@ -68,6 +66,8 @@ import org.apache.jackrabbit.oak.spi.sec
 import org.apache.jackrabbit.oak.spi.security.privilege.PrivilegeConstants;
 import org.apache.jackrabbit.oak.spi.state.NodeState;
 import org.apache.jackrabbit.oak.spi.xml.ProtectedItemImporter;
+import org.jetbrains.annotations.NotNull;
+import org.jetbrains.annotations.Nullable;
 
 import static 
org.apache.jackrabbit.oak.spi.security.RegistrationConstants.OAK_SECURITY_NAME;
 
@@ -169,9 +169,9 @@ public final class ReadOnlyAuthorization
     private static final long READ_PERMISSIONS = Permissions.READ | 
Permissions.READ_ACCESS_CONTROL;
     private static final Set<String> READ_PRIVILEGE_NAMES = 
ImmutableSet.of(PrivilegeConstants.JCR_READ, 
PrivilegeConstants.JCR_READ_ACCESS_CONTROL, PrivilegeConstants.REP_READ_NODES, 
PrivilegeConstants.REP_READ_PROPERTIES);
 
-    @Nonnull
+    @NotNull
     @Override
-    public AccessControlManager getAccessControlManager(@Nonnull Root root, 
@Nonnull NamePathMapper namePathMapper) {
+    public AccessControlManager getAccessControlManager(@NotNull Root root, 
@NotNull NamePathMapper namePathMapper) {
         return new AbstractAccessControlManager(root, namePathMapper, 
getSecurityProvider()) {
 
             @Override
@@ -216,21 +216,21 @@ public final class ReadOnlyAuthorization
         };
     }
 
-    @Nonnull
+    @NotNull
     @Override
     public RestrictionProvider getRestrictionProvider() {
         return RestrictionProvider.EMPTY;
     }
 
-    @Nonnull
+    @NotNull
     @Override
-    public PermissionProvider getPermissionProvider(@Nonnull Root root, 
@Nonnull String workspaceName, @Nonnull Set<Principal> principals) {
+    public PermissionProvider getPermissionProvider(@NotNull Root root, 
@NotNull String workspaceName, @NotNull Set<Principal> principals) {
         if (principals.contains(SystemPrincipal.INSTANCE)) {
             return EmptyPermissionProvider.getInstance();
         } else {
             return new AggregatedPermissionProvider() {
 
-                @Nonnull
+                @NotNull
                 @Override
                 public PrivilegeBits supportedPrivileges(@Nullable Tree tree, 
@Nullable PrivilegeBits privilegeBits) {
                     return (privilegeBits != null) ? privilegeBits : new 
PrivilegeBitsProvider(root).getBits(PrivilegeConstants.JCR_ALL);
@@ -242,23 +242,23 @@ public final class ReadOnlyAuthorization
                 }
 
                 @Override
-                public long supportedPermissions(@Nonnull TreeLocation 
location, long permissions) {
+                public long supportedPermissions(@NotNull TreeLocation 
location, long permissions) {
                     return permissions;
                 }
 
                 @Override
-                public long supportedPermissions(@Nonnull TreePermission 
treePermission, @Nullable PropertyState property, long permissions) {
+                public long supportedPermissions(@NotNull TreePermission 
treePermission, @Nullable PropertyState property, long permissions) {
                     return permissions;
                 }
 
                 @Override
-                public boolean isGranted(@Nonnull TreeLocation location, long 
permissions) {
+                public boolean isGranted(@NotNull TreeLocation location, long 
permissions) {
                     return onlyReadPermissions(permissions);
                 }
 
-                @Nonnull
+                @NotNull
                 @Override
-                public TreePermission getTreePermission(@Nonnull Tree tree, 
@Nonnull TreeType type, @Nonnull TreePermission parentPermission) {
+                public TreePermission getTreePermission(@NotNull Tree tree, 
@NotNull TreeType type, @NotNull TreePermission parentPermission) {
                     return new ReadOnlyPermissions();
                 }
 
@@ -266,39 +266,39 @@ public final class ReadOnlyAuthorization
                 public void refresh() {
                 }
 
-                @Nonnull
+                @NotNull
                 @Override
                 public Set<String> getPrivileges(@Nullable Tree tree) {
                     return READ_PRIVILEGE_NAMES;
                 }
 
                 @Override
-                public boolean hasPrivileges(@Nullable Tree tree, @Nonnull 
String... privilegeNames) {
+                public boolean hasPrivileges(@Nullable Tree tree, @NotNull 
String... privilegeNames) {
                     Set<String> privs = Sets.newHashSet(privilegeNames);
                     privs.removeAll(READ_PRIVILEGE_NAMES);
 
                     return privs.isEmpty();
                 }
 
-                @Nonnull
+                @NotNull
                 @Override
                 public RepositoryPermission getRepositoryPermission() {
                     return RepositoryPermission.EMPTY;
                 }
 
-                @Nonnull
+                @NotNull
                 @Override
-                public TreePermission getTreePermission(@Nonnull Tree tree, 
@Nonnull TreePermission parentPermission) {
+                public TreePermission getTreePermission(@NotNull Tree tree, 
@NotNull TreePermission parentPermission) {
                     return ReadOnlyPermissions.INSTANCE;
                 }
 
                 @Override
-                public boolean isGranted(@Nonnull Tree tree, @Nullable 
PropertyState property, long permissions) {
+                public boolean isGranted(@NotNull Tree tree, @Nullable 
PropertyState property, long permissions) {
                     return onlyReadPermissions(permissions);
                 }
 
                 @Override
-                public boolean isGranted(@Nonnull String oakPath, @Nonnull 
String jcrActions) {
+                public boolean isGranted(@NotNull String oakPath, @NotNull 
String jcrActions) {
                     return 
onlyReadPermissions(Permissions.getPermissions(jcrActions, 
TreeLocation.create(root, oakPath), false));
                 }
             };
@@ -309,55 +309,55 @@ public final class ReadOnlyAuthorization
         return Permissions.diff(permissions, READ_PERMISSIONS) == 
Permissions.NO_PERMISSION;
     }
 
-    @Nonnull
+    @NotNull
     @Override
     public String getName() {
         return AuthorizationConfiguration.NAME;
     }
 
-    @Nonnull
+    @NotNull
     @Override
     public ConfigurationParameters getParameters() {
         return ConfigurationParameters.EMPTY;
     }
 
-    @Nonnull
+    @NotNull
     @Override
     public WorkspaceInitializer getWorkspaceInitializer() {
         return WorkspaceInitializer.DEFAULT;
     }
 
-    @Nonnull
+    @NotNull
     @Override
     public RepositoryInitializer getRepositoryInitializer() {
         return RepositoryInitializer.DEFAULT;
     }
 
-    @Nonnull
+    @NotNull
     @Override
-    public List<? extends CommitHook> getCommitHooks(@Nonnull String 
workspaceName) {
+    public List<? extends CommitHook> getCommitHooks(@NotNull String 
workspaceName) {
         return ImmutableList.of();
     }
 
-    @Nonnull
+    @NotNull
     @Override
-    public List<? extends ValidatorProvider> getValidators(@Nonnull String 
workspaceName, @Nonnull Set<Principal> principals, @Nonnull MoveTracker 
moveTracker) {
+    public List<? extends ValidatorProvider> getValidators(@NotNull String 
workspaceName, @NotNull Set<Principal> principals, @NotNull MoveTracker 
moveTracker) {
         return ImmutableList.of();
     }
 
-    @Nonnull
+    @NotNull
     @Override
     public List<ThreeWayConflictHandler> getConflictHandlers() {
         return ImmutableList.of();
     }
 
-    @Nonnull
+    @NotNull
     @Override
     public List<ProtectedItemImporter> getProtectedItemImporters() {
         return ImmutableList.of();
     }
 
-    @Nonnull
+    @NotNull
     @Override
     public Context getContext() {
         return Context.DEFAULT;
@@ -367,9 +367,9 @@ public final class ReadOnlyAuthorization
 
         private static final TreePermission INSTANCE = new 
ReadOnlyPermissions();
 
-        @Nonnull
+        @NotNull
         @Override
-        public TreePermission getChildPermission(@Nonnull String childName, 
@Nonnull NodeState childState) {
+        public TreePermission getChildPermission(@NotNull String childName, 
@NotNull NodeState childState) {
             return this;
         }
 
@@ -379,7 +379,7 @@ public final class ReadOnlyAuthorization
         }
 
         @Override
-        public boolean canRead(@Nonnull PropertyState property) {
+        public boolean canRead(@NotNull PropertyState property) {
             return true;
         }
 
@@ -399,7 +399,7 @@ public final class ReadOnlyAuthorization
         }
 
         @Override
-        public boolean isGranted(long permissions, @Nonnull PropertyState 
property) {
+        public boolean isGranted(long permissions, @NotNull PropertyState 
property) {
             return onlyReadPermissions(permissions);
         }
     }
@@ -413,4 +413,4 @@ public final class ReadOnlyAuthorization
             return "Read-only Policy defined by 
'ReadOnlyAuthorizationConfiguration'";
         }
     }
-}
\ No newline at end of file
+}

Modified: 
jackrabbit/oak/trunk/oak-exercise/src/main/java/org/apache/jackrabbit/oak/exercise/security/authorization/models/simplifiedroles/Role.java
URL: 
http://svn.apache.org/viewvc/jackrabbit/oak/trunk/oak-exercise/src/main/java/org/apache/jackrabbit/oak/exercise/security/authorization/models/simplifiedroles/Role.java?rev=1836179&r1=1836178&r2=1836179&view=diff
==============================================================================
--- 
jackrabbit/oak/trunk/oak-exercise/src/main/java/org/apache/jackrabbit/oak/exercise/security/authorization/models/simplifiedroles/Role.java
 (original)
+++ 
jackrabbit/oak/trunk/oak-exercise/src/main/java/org/apache/jackrabbit/oak/exercise/security/authorization/models/simplifiedroles/Role.java
 Wed Jul 18 14:41:56 2018
@@ -17,11 +17,10 @@
 package 
org.apache.jackrabbit.oak.exercise.security.authorization.models.simplifiedroles;
 
 import java.util.Set;
-import javax.annotation.Nonnull;
-
 import com.google.common.collect.ImmutableSet;
 import 
org.apache.jackrabbit.oak.spi.security.authorization.permission.Permissions;
 import org.apache.jackrabbit.oak.spi.security.privilege.PrivilegeConstants;
+import org.jetbrains.annotations.NotNull;
 
 final class Role {
     static final Role NONE = new Role(Permissions.NO_PERMISSION);
@@ -41,7 +40,7 @@ final class Role {
         this.privilegeNames = ImmutableSet.copyOf(privilegeNames);
     }
 
-    private Role(@Nonnull Role base, long permissions, String... 
privilegeNames) {
+    private Role(@NotNull Role base, long permissions, String... 
privilegeNames) {
         this.permissions = base.permissions|permissions;
         this.privilegeNames = 
ImmutableSet.<String>builder().addAll(base.privilegeNames).add(privilegeNames).build();
     }

Modified: 
jackrabbit/oak/trunk/oak-exercise/src/main/java/org/apache/jackrabbit/oak/exercise/security/authorization/models/simplifiedroles/ThreeRolesAccessControlManager.java
URL: 
http://svn.apache.org/viewvc/jackrabbit/oak/trunk/oak-exercise/src/main/java/org/apache/jackrabbit/oak/exercise/security/authorization/models/simplifiedroles/ThreeRolesAccessControlManager.java?rev=1836179&r1=1836178&r2=1836179&view=diff
==============================================================================
--- 
jackrabbit/oak/trunk/oak-exercise/src/main/java/org/apache/jackrabbit/oak/exercise/security/authorization/models/simplifiedroles/ThreeRolesAccessControlManager.java
 (original)
+++ 
jackrabbit/oak/trunk/oak-exercise/src/main/java/org/apache/jackrabbit/oak/exercise/security/authorization/models/simplifiedroles/ThreeRolesAccessControlManager.java
 Wed Jul 18 14:41:56 2018
@@ -16,8 +16,6 @@
  */
 package 
org.apache.jackrabbit.oak.exercise.security.authorization.models.simplifiedroles;
 
-import javax.annotation.Nonnull;
-import javax.annotation.Nullable;
 import javax.jcr.AccessDeniedException;
 import javax.jcr.PathNotFoundException;
 import javax.jcr.RepositoryException;
@@ -34,12 +32,14 @@ import org.apache.jackrabbit.commons.ite
 import org.apache.jackrabbit.oak.api.Root;
 import org.apache.jackrabbit.oak.spi.security.SecurityProvider;
 import 
org.apache.jackrabbit.oak.spi.security.authorization.accesscontrol.PolicyOwner;
+import org.jetbrains.annotations.NotNull;
+import org.jetbrains.annotations.Nullable;
 
 class ThreeRolesAccessControlManager implements PolicyOwner, 
AccessControlManager {
 
     private final String supportedPath;
 
-    ThreeRolesAccessControlManager(@Nonnull Root root, @Nonnull String 
supportedPath, @Nonnull SecurityProvider securityProvider) {
+    ThreeRolesAccessControlManager(@NotNull Root root, @NotNull String 
supportedPath, @NotNull SecurityProvider securityProvider) {
         this.supportedPath = supportedPath;
         // EXERCISE
     }
@@ -102,10 +102,10 @@ class ThreeRolesAccessControlManager imp
     }
 
     @Override
-    public boolean defines(@Nullable String absPath, @Nonnull 
AccessControlPolicy accessControlPolicy) {
+    public boolean defines(@Nullable String absPath, @NotNull 
AccessControlPolicy accessControlPolicy) {
         if (Utils.isSupportedPath(supportedPath, absPath)) {
             // EXERCISE
         }
         return false;
     }
-}
\ No newline at end of file
+}

Modified: 
jackrabbit/oak/trunk/oak-exercise/src/main/java/org/apache/jackrabbit/oak/exercise/security/authorization/models/simplifiedroles/ThreeRolesAuthorizationConfiguration.java
URL: 
http://svn.apache.org/viewvc/jackrabbit/oak/trunk/oak-exercise/src/main/java/org/apache/jackrabbit/oak/exercise/security/authorization/models/simplifiedroles/ThreeRolesAuthorizationConfiguration.java?rev=1836179&r1=1836178&r2=1836179&view=diff
==============================================================================
--- 
jackrabbit/oak/trunk/oak-exercise/src/main/java/org/apache/jackrabbit/oak/exercise/security/authorization/models/simplifiedroles/ThreeRolesAuthorizationConfiguration.java
 (original)
+++ 
jackrabbit/oak/trunk/oak-exercise/src/main/java/org/apache/jackrabbit/oak/exercise/security/authorization/models/simplifiedroles/ThreeRolesAuthorizationConfiguration.java
 Wed Jul 18 14:41:56 2018
@@ -21,7 +21,6 @@ import java.security.Principal;
 import java.util.List;
 import java.util.Map;
 import java.util.Set;
-import javax.annotation.Nonnull;
 import javax.jcr.RepositoryException;
 import javax.jcr.security.AccessControlManager;
 
@@ -63,6 +62,7 @@ import org.apache.jackrabbit.oak.spi.sta
 import org.apache.jackrabbit.oak.spi.state.NodeState;
 import org.apache.jackrabbit.oak.spi.state.NodeStore;
 import org.apache.jackrabbit.oak.spi.xml.ProtectedItemImporter;
+import org.jetbrains.annotations.NotNull;
 import org.slf4j.Logger;
 import org.slf4j.LoggerFactory;
 
@@ -103,21 +103,21 @@ public class ThreeRolesAuthorizationConf
         supportedPath = null;
     }
 
-    @Nonnull
+    @NotNull
     @Override
-    public AccessControlManager getAccessControlManager(@Nonnull Root root, 
@Nonnull NamePathMapper namePathMapper) {
+    public AccessControlManager getAccessControlManager(@NotNull Root root, 
@NotNull NamePathMapper namePathMapper) {
         return new ThreeRolesAccessControlManager(root, supportedPath, 
getSecurityProvider());
     }
 
-    @Nonnull
+    @NotNull
     @Override
     public RestrictionProvider getRestrictionProvider() {
         return RestrictionProvider.EMPTY;
     }
 
-    @Nonnull
+    @NotNull
     @Override
-    public PermissionProvider getPermissionProvider(@Nonnull Root root, 
@Nonnull String workspaceName, @Nonnull Set<Principal> principals) {
+    public PermissionProvider getPermissionProvider(@NotNull Root root, 
@NotNull String workspaceName, @NotNull Set<Principal> principals) {
         if (supportedPath == null) {
             return EmptyPermissionProvider.getInstance();
         } else {
@@ -125,13 +125,13 @@ public class ThreeRolesAuthorizationConf
         }
     }
 
-    @Nonnull
+    @NotNull
     @Override
     public String getName() {
         return AuthorizationConfiguration.NAME;
     }
 
-    @Nonnull
+    @NotNull
     @Override
     public RepositoryInitializer getRepositoryInitializer() {
         String cnd = "<rep='internal'>\n" +
@@ -162,9 +162,9 @@ public class ThreeRolesAuthorizationConf
         };
     }
 
-    @Nonnull
+    @NotNull
     @Override
-    public List<? extends ValidatorProvider> getValidators(@Nonnull String 
workspaceName, @Nonnull Set<Principal> principals, @Nonnull MoveTracker 
moveTracker) {
+    public List<? extends ValidatorProvider> getValidators(@NotNull String 
workspaceName, @NotNull Set<Principal> principals, @NotNull MoveTracker 
moveTracker) {
         return ImmutableList.of(new ValidatorProvider() {
             @Override
             protected Validator getRootValidator(NodeState before, NodeState 
after, CommitInfo info) {
@@ -181,14 +181,14 @@ public class ThreeRolesAuthorizationConf
         });
     }
 
-    @Nonnull
+    @NotNull
     @Override
     public List<ProtectedItemImporter> getProtectedItemImporters() {
         // EXERCISE
         return ImmutableList.of();
     }
 
-    @Nonnull
+    @NotNull
     @Override
     public Context getContext() {
         /**
@@ -198,36 +198,36 @@ public class ThreeRolesAuthorizationConf
          */
         return new Context() {
             @Override
-            public boolean definesProperty(@Nonnull Tree parent, @Nonnull 
PropertyState property) {
+            public boolean definesProperty(@NotNull Tree parent, @NotNull 
PropertyState property) {
                 return definesTree(parent) && 
NAMES.contains(property.getName());
             }
 
             @Override
-            public boolean definesContextRoot(@Nonnull Tree tree) {
+            public boolean definesContextRoot(@NotNull Tree tree) {
                 return definesTree(tree);
             }
 
             @Override
-            public boolean definesTree(@Nonnull Tree tree) {
+            public boolean definesTree(@NotNull Tree tree) {
                 return REP_3_ROLES_POLICY.equals(tree.getName());
             }
 
             @Override
-            public boolean definesLocation(@Nonnull TreeLocation location) {
+            public boolean definesLocation(@NotNull TreeLocation location) {
                 String name = location.getName();
                 return NAMES.contains(name);
             }
 
             @Override
-            public boolean definesInternal(@Nonnull Tree tree) {
+            public boolean definesInternal(@NotNull Tree tree) {
                 return false;
             }
         };
     }
 
     @Override
-    public void setParameters(@Nonnull ConfigurationParameters config) {
+    public void setParameters(@NotNull ConfigurationParameters config) {
         super.setParameters(config);
         supportedPath = config.getConfigValue("supportedPath", null);
     }
-}
\ No newline at end of file
+}

Modified: 
jackrabbit/oak/trunk/oak-exercise/src/main/java/org/apache/jackrabbit/oak/exercise/security/authorization/models/simplifiedroles/ThreeRolesPermissionProvider.java
URL: 
http://svn.apache.org/viewvc/jackrabbit/oak/trunk/oak-exercise/src/main/java/org/apache/jackrabbit/oak/exercise/security/authorization/models/simplifiedroles/ThreeRolesPermissionProvider.java?rev=1836179&r1=1836178&r2=1836179&view=diff
==============================================================================
--- 
jackrabbit/oak/trunk/oak-exercise/src/main/java/org/apache/jackrabbit/oak/exercise/security/authorization/models/simplifiedroles/ThreeRolesPermissionProvider.java
 (original)
+++ 
jackrabbit/oak/trunk/oak-exercise/src/main/java/org/apache/jackrabbit/oak/exercise/security/authorization/models/simplifiedroles/ThreeRolesPermissionProvider.java
 Wed Jul 18 14:41:56 2018
@@ -18,9 +18,6 @@ package org.apache.jackrabbit.oak.exerci
 
 import java.security.Principal;
 import java.util.Set;
-import javax.annotation.Nonnull;
-import javax.annotation.Nullable;
-
 import com.google.common.base.Function;
 import com.google.common.collect.ImmutableSet;
 import com.google.common.collect.Iterables;
@@ -40,6 +37,8 @@ import org.apache.jackrabbit.oak.spi.sec
 import org.apache.jackrabbit.oak.spi.security.privilege.PrivilegeBits;
 import org.apache.jackrabbit.oak.spi.security.privilege.PrivilegeConstants;
 import org.apache.jackrabbit.util.Text;
+import org.jetbrains.annotations.NotNull;
+import org.jetbrains.annotations.Nullable;
 
 class ThreeRolesPermissionProvider implements AggregatedPermissionProvider, 
ThreeRolesConstants {
 
@@ -58,9 +57,9 @@ class ThreeRolesPermissionProvider imple
 
     private Root readOnlyRoot;
 
-    ThreeRolesPermissionProvider(@Nonnull Root root, Set<Principal> principals,
-                                 @Nonnull String supportedPath, @Nonnull 
Context ctx,
-                                 @Nonnull RootProvider rootProvider) {
+    ThreeRolesPermissionProvider(@NotNull Root root, Set<Principal> principals,
+                                 @NotNull String supportedPath, @NotNull 
Context ctx,
+                                 @NotNull RootProvider rootProvider) {
         this.root = root;
         this.principalNames = 
ImmutableSet.copyOf(Iterables.transform(principals, (Function<Principal, 
String>) Principal::getName));
         this.supportedPath = supportedPath;
@@ -70,7 +69,7 @@ class ThreeRolesPermissionProvider imple
         this.readOnlyRoot = rootProvider.createReadOnlyRoot(root);
     }
 
-    @Nonnull
+    @NotNull
     @Override
     public PrivilegeBits supportedPrivileges(@Nullable Tree tree, @Nullable 
PrivilegeBits privilegeBits) {
         if (tree == null) {
@@ -108,7 +107,7 @@ class ThreeRolesPermissionProvider imple
     }
 
     @Override
-    public long supportedPermissions(@Nonnull TreeLocation location, long 
permissions) {
+    public long supportedPermissions(@NotNull TreeLocation location, long 
permissions) {
         long supported = permissions & SUPPORTED_PERMISSIONS;
         if (supported != Permissions.NO_PERMISSION && 
Utils.isSupportedPath(supportedPath, location.getPath())) {
             return supported;
@@ -118,7 +117,7 @@ class ThreeRolesPermissionProvider imple
     }
 
     @Override
-    public long supportedPermissions(@Nonnull TreePermission treePermission, 
@Nullable PropertyState property, long permissions) {
+    public long supportedPermissions(@NotNull TreePermission treePermission, 
@Nullable PropertyState property, long permissions) {
         long supported = permissions & SUPPORTED_PERMISSIONS;
         if (supported != Permissions.NO_PERMISSION && (treePermission 
instanceof ThreeRolesTreePermission)) {
             return supported;
@@ -128,7 +127,7 @@ class ThreeRolesPermissionProvider imple
     }
 
     @Override
-    public boolean isGranted(@Nonnull TreeLocation location, long permissions) 
{
+    public boolean isGranted(@NotNull TreeLocation location, long permissions) 
{
         if (Utils.isSupportedPath(supportedPath, location.getPath())) {
             TreePermission tp = getTreePermission(location);
 
@@ -139,9 +138,9 @@ class ThreeRolesPermissionProvider imple
         }
     }
 
-    @Nonnull
+    @NotNull
     @Override
-    public TreePermission getTreePermission(@Nonnull Tree tree, @Nonnull 
TreeType type, @Nonnull TreePermission parentPermission) {
+    public TreePermission getTreePermission(@NotNull Tree tree, @NotNull 
TreeType type, @NotNull TreePermission parentPermission) {
         // EXERCISE : currently this implementation ignores TreeType -> 
complete implementation
         return getTreePermission(tree, parentPermission);
     }
@@ -152,7 +151,7 @@ class ThreeRolesPermissionProvider imple
 
     }
 
-    @Nonnull
+    @NotNull
     @Override
     public Set<String> getPrivileges(@Nullable Tree tree) {
         if (tree != null) {
@@ -166,19 +165,19 @@ class ThreeRolesPermissionProvider imple
     }
 
     @Override
-    public boolean hasPrivileges(@Nullable Tree tree, @Nonnull String... 
privilegeNames) {
+    public boolean hasPrivileges(@Nullable Tree tree, @NotNull String... 
privilegeNames) {
         return 
getPrivileges(tree).containsAll(ImmutableSet.copyOf(privilegeNames));
     }
 
-    @Nonnull
+    @NotNull
     @Override
     public RepositoryPermission getRepositoryPermission() {
         return RepositoryPermission.EMPTY;
     }
 
-    @Nonnull
+    @NotNull
     @Override
-    public TreePermission getTreePermission(@Nonnull Tree tree, @Nonnull 
TreePermission parentPermission) {
+    public TreePermission getTreePermission(@NotNull Tree tree, @NotNull 
TreePermission parentPermission) {
         if (parentPermission instanceof ThreeRolesTreePermission) {
             // nested policies are not supported => within a given tree defined
             // by a ThreeRolePolicy all items share the same permission setup.
@@ -201,7 +200,7 @@ class ThreeRolesPermissionProvider imple
     }
 
     @Override
-    public boolean isGranted(@Nonnull Tree tree, @Nullable PropertyState 
property, long permissions) {
+    public boolean isGranted(@NotNull Tree tree, @Nullable PropertyState 
property, long permissions) {
         if (Utils.isSupportedPath(supportedPath, tree.getPath())) {
             TreePermission tp = getTreePermission(tree);
             return (property == null) ? tp.isGranted(permissions) : 
tp.isGranted(permissions, property);
@@ -211,7 +210,7 @@ class ThreeRolesPermissionProvider imple
     }
 
     @Override
-    public boolean isGranted(@Nonnull String oakPath, @Nonnull String 
jcrActions) {
+    public boolean isGranted(@NotNull String oakPath, @NotNull String 
jcrActions) {
         TreeLocation tl = TreeLocation.create(readOnlyRoot, oakPath);
         long permissions = Permissions.getPermissions(jcrActions, tl, 
ctx.definesLocation(tl));
 
@@ -220,11 +219,11 @@ class ThreeRolesPermissionProvider imple
 
     
//--------------------------------------------------------------------------
 
-    private boolean isAncestor(@Nonnull String path) {
+    private boolean isAncestor(@NotNull String path) {
         return Text.isDescendant(path, supportedPath);
     }
 
-    private Role getRole(@Nonnull Tree tree) {
+    private Role getRole(@NotNull Tree tree) {
         Tree policy = tree.getChild(REP_3_ROLES_POLICY);
         if (policy.exists()) {
             if (containsAny(policy, REP_OWNERS)) {
@@ -238,7 +237,7 @@ class ThreeRolesPermissionProvider imple
         return Role.NONE;
     }
 
-    private boolean containsAny(@Nonnull Tree policyTree, @Nonnull String 
propName) {
+    private boolean containsAny(@NotNull Tree policyTree, @NotNull String 
propName) {
         Iterable<String> names = TreeUtil.getStrings(policyTree, propName);
         if (names != null) {
             for (String principalName : names) {
@@ -250,7 +249,7 @@ class ThreeRolesPermissionProvider imple
         return false;
     }
 
-    private Tree getReadOnlyTree(@Nonnull Tree tree) {
+    private Tree getReadOnlyTree(@NotNull Tree tree) {
         if (tree instanceof ReadOnly) {
             return tree;
         } else {
@@ -258,7 +257,7 @@ class ThreeRolesPermissionProvider imple
         }
     }
 
-    private TreePermission getTreePermission(@Nonnull Tree readOnlyTree) {
+    private TreePermission getTreePermission(@NotNull Tree readOnlyTree) {
         Tree t = readOnlyTree;
         while (Utils.isSupportedPath(supportedPath, t.getPath())) {
             if (t.hasChild(REP_3_ROLES_POLICY)) {
@@ -269,7 +268,7 @@ class ThreeRolesPermissionProvider imple
         return TreePermission.EMPTY;
     }
 
-    private TreePermission getTreePermission(@Nonnull TreeLocation location) {
+    private TreePermission getTreePermission(@NotNull TreeLocation location) {
         TreeLocation l = location;
         while (Utils.isSupportedPath(supportedPath, l.getPath())) {
             Tree tree = location.getTree();
@@ -280,4 +279,4 @@ class ThreeRolesPermissionProvider imple
         }
         return TreePermission.EMPTY;
     }
-}
\ No newline at end of file
+}

Modified: 
jackrabbit/oak/trunk/oak-exercise/src/main/java/org/apache/jackrabbit/oak/exercise/security/authorization/models/simplifiedroles/ThreeRolesTreePermission.java
URL: 
http://svn.apache.org/viewvc/jackrabbit/oak/trunk/oak-exercise/src/main/java/org/apache/jackrabbit/oak/exercise/security/authorization/models/simplifiedroles/ThreeRolesTreePermission.java?rev=1836179&r1=1836178&r2=1836179&view=diff
==============================================================================
--- 
jackrabbit/oak/trunk/oak-exercise/src/main/java/org/apache/jackrabbit/oak/exercise/security/authorization/models/simplifiedroles/ThreeRolesTreePermission.java
 (original)
+++ 
jackrabbit/oak/trunk/oak-exercise/src/main/java/org/apache/jackrabbit/oak/exercise/security/authorization/models/simplifiedroles/ThreeRolesTreePermission.java
 Wed Jul 18 14:41:56 2018
@@ -16,31 +16,30 @@
  */
 package 
org.apache.jackrabbit.oak.exercise.security.authorization.models.simplifiedroles;
 
-import javax.annotation.Nonnull;
-
 import org.apache.jackrabbit.oak.api.PropertyState;
 import 
org.apache.jackrabbit.oak.spi.security.authorization.permission.Permissions;
 import 
org.apache.jackrabbit.oak.spi.security.authorization.permission.TreePermission;
 import org.apache.jackrabbit.oak.spi.state.NodeState;
+import org.jetbrains.annotations.NotNull;
 
 class ThreeRolesTreePermission implements TreePermission, ThreeRolesConstants {
 
     private final Role role;
     private final boolean isAcContent;
 
-    ThreeRolesTreePermission(@Nonnull Role role, boolean isAcContent) {
+    ThreeRolesTreePermission(@NotNull Role role, boolean isAcContent) {
         this.role = role;
         this.isAcContent = isAcContent;
     }
 
-    @Nonnull
+    @NotNull
     Role getRole() {
         return role;
     }
 
-    @Nonnull
+    @NotNull
     @Override
-    public TreePermission getChildPermission(@Nonnull String childName, 
@Nonnull NodeState childState) {
+    public TreePermission getChildPermission(@NotNull String childName, 
@NotNull NodeState childState) {
         if (isAcContent) {
             return this;
         } else {
@@ -59,7 +58,7 @@ class ThreeRolesTreePermission implement
     }
 
     @Override
-    public boolean canRead(@Nonnull PropertyState property) {
+    public boolean canRead(@NotNull PropertyState property) {
         return canRead();
     }
 
@@ -79,7 +78,7 @@ class ThreeRolesTreePermission implement
     }
 
     @Override
-    public boolean isGranted(long permissions, @Nonnull PropertyState 
property) {
+    public boolean isGranted(long permissions, @NotNull PropertyState 
property) {
         return isGranted(permissions);
     }
 }

Modified: 
jackrabbit/oak/trunk/oak-exercise/src/main/java/org/apache/jackrabbit/oak/exercise/security/authorization/models/simplifiedroles/Utils.java
URL: 
http://svn.apache.org/viewvc/jackrabbit/oak/trunk/oak-exercise/src/main/java/org/apache/jackrabbit/oak/exercise/security/authorization/models/simplifiedroles/Utils.java?rev=1836179&r1=1836178&r2=1836179&view=diff
==============================================================================
--- 
jackrabbit/oak/trunk/oak-exercise/src/main/java/org/apache/jackrabbit/oak/exercise/security/authorization/models/simplifiedroles/Utils.java
 (original)
+++ 
jackrabbit/oak/trunk/oak-exercise/src/main/java/org/apache/jackrabbit/oak/exercise/security/authorization/models/simplifiedroles/Utils.java
 Wed Jul 18 14:41:56 2018
@@ -16,16 +16,15 @@
  */
 package 
org.apache.jackrabbit.oak.exercise.security.authorization.models.simplifiedroles;
 
-import javax.annotation.Nonnull;
-
 import org.apache.jackrabbit.util.Text;
+import org.jetbrains.annotations.NotNull;
 
 final class Utils {
 
     private Utils() {}
 
-    static boolean isSupportedPath(@Nonnull String configuredPath, @Nonnull 
String path) {
+    static boolean isSupportedPath(@NotNull String configuredPath, @NotNull 
String path) {
         return Text.isDescendantOrEqual(configuredPath, path);
     }
 
-}
\ No newline at end of file
+}

Modified: 
jackrabbit/oak/trunk/oak-exercise/src/main/java/org/apache/jackrabbit/oak/exercise/security/authorization/restriction/CustomRestrictionProvider.java
URL: 
http://svn.apache.org/viewvc/jackrabbit/oak/trunk/oak-exercise/src/main/java/org/apache/jackrabbit/oak/exercise/security/authorization/restriction/CustomRestrictionProvider.java?rev=1836179&r1=1836178&r2=1836179&view=diff
==============================================================================
--- 
jackrabbit/oak/trunk/oak-exercise/src/main/java/org/apache/jackrabbit/oak/exercise/security/authorization/restriction/CustomRestrictionProvider.java
 (original)
+++ 
jackrabbit/oak/trunk/oak-exercise/src/main/java/org/apache/jackrabbit/oak/exercise/security/authorization/restriction/CustomRestrictionProvider.java
 Wed Jul 18 14:41:56 2018
@@ -18,8 +18,6 @@ package org.apache.jackrabbit.oak.exerci
 
 import java.util.Map;
 import java.util.Set;
-import javax.annotation.Nonnull;
-import javax.annotation.Nullable;
 import javax.jcr.RepositoryException;
 import javax.jcr.Value;
 
@@ -34,6 +32,8 @@ import org.apache.jackrabbit.oak.spi.sec
 import 
org.apache.jackrabbit.oak.spi.security.authorization.restriction.RestrictionDefinition;
 import 
org.apache.jackrabbit.oak.spi.security.authorization.restriction.RestrictionPattern;
 import 
org.apache.jackrabbit.oak.spi.security.authorization.restriction.RestrictionProvider;
+import org.jetbrains.annotations.NotNull;
+import org.jetbrains.annotations.Nullable;
 
 /**
  * EXERCISE: complete the implementation
@@ -42,30 +42,30 @@ import org.apache.jackrabbit.oak.spi.sec
 @Service({RestrictionProvider.class})
 public class CustomRestrictionProvider implements RestrictionProvider {
 
-    @Nonnull
+    @NotNull
     @Override
     public Set<RestrictionDefinition> getSupportedRestrictions(@Nullable 
String oakPath) {
         // EXERCISE
         return null;
     }
 
-    @Nonnull
+    @NotNull
     @Override
-    public Restriction createRestriction(@Nullable String oakPath, @Nonnull 
String oakName, @Nonnull Value value) throws RepositoryException {
+    public Restriction createRestriction(@Nullable String oakPath, @NotNull 
String oakName, @NotNull Value value) throws RepositoryException {
         // EXERCISE
         return null;
     }
 
-    @Nonnull
+    @NotNull
     @Override
-    public Restriction createRestriction(@Nullable String oakPath, @Nonnull 
String oakName, @Nonnull Value... values) throws RepositoryException {
+    public Restriction createRestriction(@Nullable String oakPath, @NotNull 
String oakName, @NotNull Value... values) throws RepositoryException {
         // EXERCISE
         return null;
     }
 
-    @Nonnull
+    @NotNull
     @Override
-    public Set<Restriction> readRestrictions(@Nullable String oakPath, 
@Nonnull Tree aceTree) {
+    public Set<Restriction> readRestrictions(@Nullable String oakPath, 
@NotNull Tree aceTree) {
         // EXERCISE
         return null;
     }
@@ -77,21 +77,21 @@ public class CustomRestrictionProvider i
     }
 
     @Override
-    public void validateRestrictions(@Nullable String oakPath, @Nonnull Tree 
aceTree) throws RepositoryException {
+    public void validateRestrictions(@Nullable String oakPath, @NotNull Tree 
aceTree) throws RepositoryException {
         // EXERCISE
 
     }
 
-    @Nonnull
+    @NotNull
     @Override
-    public RestrictionPattern getPattern(@Nullable String oakPath, @Nonnull 
Tree tree) {
+    public RestrictionPattern getPattern(@Nullable String oakPath, @NotNull 
Tree tree) {
         // EXERCISE
         return null;
     }
 
-    @Nonnull
+    @NotNull
     @Override
-    public RestrictionPattern getPattern(@Nullable String oakPath, @Nonnull 
Set<Restriction> restrictions) {
+    public RestrictionPattern getPattern(@Nullable String oakPath, @NotNull 
Set<Restriction> restrictions) {
         // EXERCISE
         return null;
     }
@@ -110,4 +110,4 @@ public class CustomRestrictionProvider i
     @Deactivate
     private void deactivate(Map<String, Object> properties) {
     }
-}
\ No newline at end of file
+}

Modified: 
jackrabbit/oak/trunk/oak-exercise/src/main/java/org/apache/jackrabbit/oak/exercise/security/principal/CustomPrincipalConfiguration.java
URL: 
http://svn.apache.org/viewvc/jackrabbit/oak/trunk/oak-exercise/src/main/java/org/apache/jackrabbit/oak/exercise/security/principal/CustomPrincipalConfiguration.java?rev=1836179&r1=1836178&r2=1836179&view=diff
==============================================================================
--- 
jackrabbit/oak/trunk/oak-exercise/src/main/java/org/apache/jackrabbit/oak/exercise/security/principal/CustomPrincipalConfiguration.java
 (original)
+++ 
jackrabbit/oak/trunk/oak-exercise/src/main/java/org/apache/jackrabbit/oak/exercise/security/principal/CustomPrincipalConfiguration.java
 Wed Jul 18 14:41:56 2018
@@ -17,8 +17,6 @@
 package org.apache.jackrabbit.oak.exercise.security.principal;
 
 import java.util.Map;
-import javax.annotation.Nonnull;
-
 import org.apache.felix.scr.annotations.Activate;
 import org.apache.felix.scr.annotations.Component;
 import org.apache.felix.scr.annotations.ConfigurationPolicy;
@@ -35,6 +33,7 @@ import org.apache.jackrabbit.oak.spi.sec
 import org.apache.jackrabbit.oak.spi.security.principal.PrincipalConfiguration;
 import org.apache.jackrabbit.oak.spi.security.principal.PrincipalManagerImpl;
 import org.apache.jackrabbit.oak.spi.security.principal.PrincipalProvider;
+import org.jetbrains.annotations.NotNull;
 import org.slf4j.Logger;
 import org.slf4j.LoggerFactory;
 
@@ -51,21 +50,21 @@ public class CustomPrincipalConfiguratio
     @Property(name = "knownPrincipals", value = {}, cardinality = 100)
     private String[] knownPrincipals = new String[0];
 
-    @Nonnull
+    @NotNull
     @Override
     public PrincipalManager getPrincipalManager(Root root, NamePathMapper 
namePathMapper) {
         log.info("CustomPrincipalConfiguration.getPrincipalManager");
         return new PrincipalManagerImpl(getPrincipalProvider(root, 
namePathMapper));
     }
 
-    @Nonnull
+    @NotNull
     @Override
     public PrincipalProvider getPrincipalProvider(Root root, NamePathMapper 
namePathMapper) {
         log.info("CustomPrincipalConfiguration.getPrincipalProvider");
         return new CustomPrincipalProvider(knownPrincipals);
     }
 
-    @Nonnull
+    @NotNull
     @Override
     public String getName() {
         return PrincipalConfiguration.NAME;
@@ -93,8 +92,8 @@ public class CustomPrincipalConfiguratio
     }
 
     @Override
-    public void setParameters(@Nonnull ConfigurationParameters config) {
+    public void setParameters(@NotNull ConfigurationParameters config) {
         super.setParameters(config);
         knownPrincipals = config.getConfigValue("knownPrincipals", new 
String[0]);
     }
-}
\ No newline at end of file
+}

Modified: 
jackrabbit/oak/trunk/oak-exercise/src/main/java/org/apache/jackrabbit/oak/exercise/security/principal/CustomPrincipalProvider.java
URL: 
http://svn.apache.org/viewvc/jackrabbit/oak/trunk/oak-exercise/src/main/java/org/apache/jackrabbit/oak/exercise/security/principal/CustomPrincipalProvider.java?rev=1836179&r1=1836178&r2=1836179&view=diff
==============================================================================
--- 
jackrabbit/oak/trunk/oak-exercise/src/main/java/org/apache/jackrabbit/oak/exercise/security/principal/CustomPrincipalProvider.java
 (original)
+++ 
jackrabbit/oak/trunk/oak-exercise/src/main/java/org/apache/jackrabbit/oak/exercise/security/principal/CustomPrincipalProvider.java
 Wed Jul 18 14:41:56 2018
@@ -20,11 +20,10 @@ import java.security.Principal;
 import java.util.Collections;
 import java.util.Iterator;
 import java.util.Set;
-import javax.annotation.Nonnull;
-import javax.annotation.Nullable;
-
 import com.google.common.collect.ImmutableSet;
 import org.apache.jackrabbit.oak.spi.security.principal.PrincipalProvider;
+import org.jetbrains.annotations.NotNull;
+import org.jetbrains.annotations.Nullable;
 
 /**
  * Custom principal provider that only knows of a predefined set of principals
@@ -41,7 +40,7 @@ class CustomPrincipalProvider implements
     }
 
     @Override
-    public Principal getPrincipal(@Nonnull String principalName) {
+    public Principal getPrincipal(@NotNull String principalName) {
         // EXERCISE: complete
         if (knownPrincipalNames.contains(principalName)) {
             return () -> principalName;
@@ -50,33 +49,33 @@ class CustomPrincipalProvider implements
         }
     }
 
-    @Nonnull
+    @NotNull
     @Override
-    public Set<Principal> getMembershipPrincipals(@Nonnull Principal 
principal) {
+    public Set<Principal> getMembershipPrincipals(@NotNull Principal 
principal) {
         // EXERCISE : expose the group membership of your known Principals
         // EXERCISE : add every other principal into one of your 
known-principal-groups to establish dynamic group membership
         return Collections.EMPTY_SET;
     }
 
-    @Nonnull
+    @NotNull
     @Override
-    public Set<? extends Principal> getPrincipals(@Nonnull String userID) {
+    public Set<? extends Principal> getPrincipals(@NotNull String userID) {
         // EXERCISE : expose the principal-sets of your known principals
         // EXERCISE : add every other principal into one of your 
known-principal-groups to establish dynamic group membership
         return Collections.EMPTY_SET;
     }
 
-    @Nonnull
+    @NotNull
     @Override
     public Iterator<? extends Principal> findPrincipals(@Nullable String 
nameHint, int searchType) {
         // EXERCISE
         return Collections.emptyIterator();
     }
 
-    @Nonnull
+    @NotNull
     @Override
     public Iterator<? extends Principal> findPrincipals(int searchType) {
         // EXERCISE
         return Collections.emptyIterator();
     }
-}
\ No newline at end of file
+}

Modified: 
jackrabbit/oak/trunk/oak-exercise/src/test/java/org/apache/jackrabbit/oak/exercise/ExerciseUtility.java
URL: 
http://svn.apache.org/viewvc/jackrabbit/oak/trunk/oak-exercise/src/test/java/org/apache/jackrabbit/oak/exercise/ExerciseUtility.java?rev=1836179&r1=1836178&r2=1836179&view=diff
==============================================================================
--- 
jackrabbit/oak/trunk/oak-exercise/src/test/java/org/apache/jackrabbit/oak/exercise/ExerciseUtility.java
 (original)
+++ 
jackrabbit/oak/trunk/oak-exercise/src/test/java/org/apache/jackrabbit/oak/exercise/ExerciseUtility.java
 Wed Jul 18 14:41:56 2018
@@ -18,7 +18,6 @@ package org.apache.jackrabbit.oak.exerci
 
 import java.security.Principal;
 import java.util.UUID;
-import javax.annotation.Nonnull;
 import javax.jcr.RepositoryException;
 import javax.jcr.SimpleCredentials;
 
@@ -26,6 +25,7 @@ import org.apache.jackrabbit.api.securit
 import org.apache.jackrabbit.api.security.user.User;
 import org.apache.jackrabbit.api.security.user.UserManager;
 import org.apache.jackrabbit.oak.spi.security.principal.PrincipalImpl;
+import org.jetbrains.annotations.NotNull;
 
 public final class ExerciseUtility {
 
@@ -37,24 +37,24 @@ public final class ExerciseUtility {
 
     private ExerciseUtility() {}
 
-    public static String getTestId(@Nonnull String hint) {
+    public static String getTestId(@NotNull String hint) {
         return hint + UUID.randomUUID().toString();
     }
 
-    public static Principal getTestPrincipal(@Nonnull String hint) {
+    public static Principal getTestPrincipal(@NotNull String hint) {
         String name = hint  + UUID.randomUUID().toString();
         return new PrincipalImpl(name);
     }
 
-    public static User createTestUser(@Nonnull UserManager userMgr) throws 
RepositoryException {
+    public static User createTestUser(@NotNull UserManager userMgr) throws 
RepositoryException {
         return userMgr.createUser(getTestId(TEST_USER_HINT), TEST_PW, 
getTestPrincipal(TEST_PRINCIPAL_HINT), null);
     }
 
-    public static Group createTestGroup(@Nonnull UserManager userMgr) throws 
RepositoryException {
+    public static Group createTestGroup(@NotNull UserManager userMgr) throws 
RepositoryException {
         return userMgr.createGroup(getTestId(TEST_GROUP_HINT), 
getTestPrincipal(TEST_GROUP_PRINCIPAL_HINT), null);
     }
 
-    public static SimpleCredentials getTestCredentials(@Nonnull String userID) 
{
+    public static SimpleCredentials getTestCredentials(@NotNull String userID) 
{
         return new SimpleCredentials(userID, TEST_PW.toCharArray());
     }
-}
\ No newline at end of file
+}

Modified: 
jackrabbit/oak/trunk/oak-exercise/src/test/java/org/apache/jackrabbit/oak/exercise/security/authorization/advanced/L4_CustomAccessControlManagementTest.java
URL: 
http://svn.apache.org/viewvc/jackrabbit/oak/trunk/oak-exercise/src/test/java/org/apache/jackrabbit/oak/exercise/security/authorization/advanced/L4_CustomAccessControlManagementTest.java?rev=1836179&r1=1836178&r2=1836179&view=diff
==============================================================================
--- 
jackrabbit/oak/trunk/oak-exercise/src/test/java/org/apache/jackrabbit/oak/exercise/security/authorization/advanced/L4_CustomAccessControlManagementTest.java
 (original)
+++ 
jackrabbit/oak/trunk/oak-exercise/src/test/java/org/apache/jackrabbit/oak/exercise/security/authorization/advanced/L4_CustomAccessControlManagementTest.java
 Wed Jul 18 14:41:56 2018
@@ -20,7 +20,6 @@ import java.io.ByteArrayInputStream;
 import java.io.InputStream;
 import java.security.Principal;
 import java.util.Map;
-import javax.annotation.Nonnull;
 import javax.jcr.ImportUUIDBehavior;
 import javax.jcr.Node;
 import javax.jcr.Repository;
@@ -62,6 +61,7 @@ import org.apache.jackrabbit.oak.spi.sec
 import org.apache.jackrabbit.oak.spi.security.principal.PrincipalConfiguration;
 import org.apache.jackrabbit.oak.spi.whiteboard.DefaultWhiteboard;
 import org.apache.jackrabbit.oak.spi.xml.ProtectedNodeImporter;
+import org.jetbrains.annotations.NotNull;
 import org.junit.Test;
 
 import static junit.framework.TestCase.assertEquals;
@@ -271,7 +271,7 @@ public class L4_CustomAccessControlManag
         */
     }
 
-    private AccessControlManager getAcManager(@Nonnull Root root) {
+    private AccessControlManager getAcManager(@NotNull Root root) {
         return 
getConfig(AuthorizationConfiguration.class).getAccessControlManager(root, 
NamePathMapper.DEFAULT);
     }
 
@@ -522,4 +522,4 @@ public class L4_CustomAccessControlManag
             adminSession.logout();
         }
     }
-}
\ No newline at end of file
+}

Modified: 
jackrabbit/oak/trunk/oak-exercise/src/test/java/org/apache/jackrabbit/oak/exercise/security/authorization/advanced/L5_CustomPermissionEvaluationTest.java
URL: 
http://svn.apache.org/viewvc/jackrabbit/oak/trunk/oak-exercise/src/test/java/org/apache/jackrabbit/oak/exercise/security/authorization/advanced/L5_CustomPermissionEvaluationTest.java?rev=1836179&r1=1836178&r2=1836179&view=diff
==============================================================================
--- 
jackrabbit/oak/trunk/oak-exercise/src/test/java/org/apache/jackrabbit/oak/exercise/security/authorization/advanced/L5_CustomPermissionEvaluationTest.java
 (original)
+++ 
jackrabbit/oak/trunk/oak-exercise/src/test/java/org/apache/jackrabbit/oak/exercise/security/authorization/advanced/L5_CustomPermissionEvaluationTest.java
 Wed Jul 18 14:41:56 2018
@@ -19,7 +19,6 @@ package org.apache.jackrabbit.oak.exerci
 import java.security.Principal;
 import java.util.List;
 import java.util.Set;
-import javax.annotation.Nonnull;
 import javax.jcr.GuestCredentials;
 import javax.jcr.Session;
 import javax.jcr.security.Privilege;
@@ -55,6 +54,7 @@ import org.apache.jackrabbit.oak.spi.sec
 import org.apache.jackrabbit.oak.spi.security.principal.EveryonePrincipal;
 import org.apache.jackrabbit.oak.spi.security.privilege.PrivilegeConstants;
 import org.apache.jackrabbit.util.Text;
+import org.jetbrains.annotations.NotNull;
 import org.junit.Test;
 
 import static org.junit.Assert.assertFalse;
@@ -207,7 +207,7 @@ public class L5_CustomPermissionEvaluati
 
     }
 
-    private PermissionProvider getPermissionProvider(@Nonnull Set<Principal> 
principals) {
+    private PermissionProvider getPermissionProvider(@NotNull Set<Principal> 
principals) {
         return 
getConfig(AuthorizationConfiguration.class).getPermissionProvider(root, 
adminSession.getWorkspaceName(), principals);
     }
 
@@ -358,4 +358,4 @@ public class L5_CustomPermissionEvaluati
         }
     }
 
-}
\ No newline at end of file
+}

Modified: 
jackrabbit/oak/trunk/oak-exercise/src/test/java/org/apache/jackrabbit/oak/exercise/security/authorization/permission/L1_IntroductionTest.java
URL: 
http://svn.apache.org/viewvc/jackrabbit/oak/trunk/oak-exercise/src/test/java/org/apache/jackrabbit/oak/exercise/security/authorization/permission/L1_IntroductionTest.java?rev=1836179&r1=1836178&r2=1836179&view=diff
==============================================================================
--- 
jackrabbit/oak/trunk/oak-exercise/src/test/java/org/apache/jackrabbit/oak/exercise/security/authorization/permission/L1_IntroductionTest.java
 (original)
+++ 
jackrabbit/oak/trunk/oak-exercise/src/test/java/org/apache/jackrabbit/oak/exercise/security/authorization/permission/L1_IntroductionTest.java
 Wed Jul 18 14:41:56 2018
@@ -17,8 +17,6 @@
 package org.apache.jackrabbit.oak.exercise.security.authorization.permission;
 
 import java.security.Principal;
-import javax.annotation.Nonnull;
-import javax.annotation.Nullable;
 import javax.jcr.security.AccessControlManager;
 
 import org.apache.jackrabbit.JcrConstants;
@@ -33,6 +31,8 @@ import org.apache.jackrabbit.oak.api.Tre
 import org.apache.jackrabbit.oak.spi.nodetype.NodeTypeConstants;
 import org.apache.jackrabbit.oak.spi.security.privilege.PrivilegeConstants;
 import org.apache.jackrabbit.oak.util.NodeUtil;
+import org.jetbrains.annotations.NotNull;
+import org.jetbrains.annotations.Nullable;
 import org.junit.Test;
 
 import static com.google.common.base.Preconditions.checkNotNull;
@@ -180,11 +180,11 @@ public class L1_IntroductionTest extends
      * @param privilegeNames The privilege names.
      * @throws Exception If an error occurs.
      */
-    private void setupPermission(@Nonnull Root root,
+    private void setupPermission(@NotNull Root root,
                                  @Nullable String path,
-                                 @Nonnull Principal principal,
+                                 @NotNull Principal principal,
                                  boolean isAllow,
-                                 @Nonnull String... privilegeNames) throws 
Exception {
+                                 @NotNull String... privilegeNames) throws 
Exception {
         AccessControlManager acMgr = getAccessControlManager(root);
         JackrabbitAccessControlList acl = 
checkNotNull(AccessControlUtils.getAccessControlList(acMgr, path));
         acl.addEntry(principal, AccessControlUtils.privilegesFromNames(acMgr, 
privilegeNames), isAllow);
@@ -256,4 +256,4 @@ public class L1_IntroductionTest extends
             root.refresh();
         }
     }
-}
\ No newline at end of file
+}

Modified: 
jackrabbit/oak/trunk/oak-exercise/src/test/java/org/apache/jackrabbit/oak/exercise/security/privilege/L3_BuiltInPrivilegesTest.java
URL: 
http://svn.apache.org/viewvc/jackrabbit/oak/trunk/oak-exercise/src/test/java/org/apache/jackrabbit/oak/exercise/security/privilege/L3_BuiltInPrivilegesTest.java?rev=1836179&r1=1836178&r2=1836179&view=diff
==============================================================================
--- 
jackrabbit/oak/trunk/oak-exercise/src/test/java/org/apache/jackrabbit/oak/exercise/security/privilege/L3_BuiltInPrivilegesTest.java
 (original)
+++ 
jackrabbit/oak/trunk/oak-exercise/src/test/java/org/apache/jackrabbit/oak/exercise/security/privilege/L3_BuiltInPrivilegesTest.java
 Wed Jul 18 14:41:56 2018
@@ -18,7 +18,6 @@ package org.apache.jackrabbit.oak.exerci
 
 import java.util.Map;
 import java.util.Set;
-import javax.annotation.Nullable;
 import javax.jcr.RepositoryException;
 import javax.jcr.security.AccessControlManager;
 import javax.jcr.security.AccessControlPolicy;
@@ -37,6 +36,7 @@ import org.apache.jackrabbit.oak.api.Com
 import org.apache.jackrabbit.oak.api.ContentSession;
 import org.apache.jackrabbit.oak.api.Root;
 import org.apache.jackrabbit.oak.spi.security.privilege.PrivilegeConstants;
+import org.jetbrains.annotations.Nullable;
 import org.junit.Test;
 
 import static org.junit.Assert.assertEquals;
@@ -185,4 +185,4 @@ public class L3_BuiltInPrivilegesTest ex
         }
         root.commit();
     }
-}
\ No newline at end of file
+}

Modified: 
jackrabbit/oak/trunk/oak-exercise/src/test/java/org/apache/jackrabbit/oak/exercise/security/privilege/L4_CustomPrivilegeTest.java
URL: 
http://svn.apache.org/viewvc/jackrabbit/oak/trunk/oak-exercise/src/test/java/org/apache/jackrabbit/oak/exercise/security/privilege/L4_CustomPrivilegeTest.java?rev=1836179&r1=1836178&r2=1836179&view=diff
==============================================================================
--- 
jackrabbit/oak/trunk/oak-exercise/src/test/java/org/apache/jackrabbit/oak/exercise/security/privilege/L4_CustomPrivilegeTest.java
 (original)
+++ 
jackrabbit/oak/trunk/oak-exercise/src/test/java/org/apache/jackrabbit/oak/exercise/security/privilege/L4_CustomPrivilegeTest.java
 Wed Jul 18 14:41:56 2018
@@ -19,7 +19,6 @@ package org.apache.jackrabbit.oak.exerci
 import java.security.Principal;
 import java.util.Set;
 import java.util.UUID;
-import javax.annotation.Nullable;
 import javax.jcr.security.Privilege;
 
 import com.google.common.base.Function;
@@ -30,6 +29,7 @@ import org.apache.jackrabbit.api.securit
 import org.apache.jackrabbit.oak.AbstractSecurityTest;
 import org.apache.jackrabbit.oak.spi.security.principal.EveryonePrincipal;
 import org.apache.jackrabbit.oak.spi.security.privilege.PrivilegeConstants;
+import org.jetbrains.annotations.Nullable;
 import org.junit.Test;
 
 import static org.junit.Assert.assertEquals;
@@ -161,4 +161,4 @@ public class L4_CustomPrivilegeTest exte
             // EXERCISE: cleanup the changes.
         }
     }
-}
\ No newline at end of file
+}


Reply via email to