Modified: 
jackrabbit/oak/branches/1.8/oak-core/src/main/java/org/apache/jackrabbit/oak/security/authorization/accesscontrol/AccessControlManagerImpl.java
URL: 
http://svn.apache.org/viewvc/jackrabbit/oak/branches/1.8/oak-core/src/main/java/org/apache/jackrabbit/oak/security/authorization/accesscontrol/AccessControlManagerImpl.java?rev=1846014&r1=1846013&r2=1846014&view=diff
==============================================================================
--- 
jackrabbit/oak/branches/1.8/oak-core/src/main/java/org/apache/jackrabbit/oak/security/authorization/accesscontrol/AccessControlManagerImpl.java
 (original)
+++ 
jackrabbit/oak/branches/1.8/oak-core/src/main/java/org/apache/jackrabbit/oak/security/authorization/accesscontrol/AccessControlManagerImpl.java
 Wed Nov  7 13:57:55 2018
@@ -30,9 +30,6 @@ import java.util.List;
 import java.util.Map;
 import java.util.Set;
 
-import javax.annotation.CheckForNull;
-import javax.annotation.Nonnull;
-import javax.annotation.Nullable;
 import javax.jcr.AccessDeniedException;
 import javax.jcr.RepositoryException;
 import javax.jcr.UnsupportedRepositoryOperationException;
@@ -94,6 +91,8 @@ import org.apache.jackrabbit.oak.spi.xml
 import org.apache.jackrabbit.oak.plugins.tree.TreeUtil;
 import org.apache.jackrabbit.util.ISO9075;
 import org.apache.jackrabbit.util.Text;
+import org.jetbrains.annotations.NotNull;
+import org.jetbrains.annotations.Nullable;
 import org.slf4j.Logger;
 import org.slf4j.LoggerFactory;
 
@@ -115,8 +114,8 @@ public class AccessControlManagerImpl ex
     private final ConfigurationParameters configParams;
     private final Set<String> readPaths;
 
-    public AccessControlManagerImpl(@Nonnull Root root, @Nonnull 
NamePathMapper namePathMapper,
-                                    @Nonnull SecurityProvider 
securityProvider) {
+    public AccessControlManagerImpl(@NotNull Root root, @NotNull 
NamePathMapper namePathMapper,
+                                    @NotNull SecurityProvider 
securityProvider) {
         super(root, namePathMapper, securityProvider);
 
         bitsProvider = new PrivilegeBitsProvider(root);
@@ -130,7 +129,7 @@ public class AccessControlManagerImpl ex
     }
 
     //-----------------------------------------------< AccessControlManager 
>---
-    @Nonnull
+    @NotNull
     @Override
     public AccessControlPolicy[] getPolicies(@Nullable String absPath) throws 
RepositoryException {
         String oakPath = getOakPath(absPath);
@@ -147,7 +146,7 @@ public class AccessControlManagerImpl ex
         return policies.toArray(new AccessControlPolicy[policies.size()]);
     }
 
-    @Nonnull
+    @NotNull
     @Override
     public AccessControlPolicy[] getEffectivePolicies(@Nullable String 
absPath) throws RepositoryException {
         String oakPath = getOakPath(absPath);
@@ -178,7 +177,7 @@ public class AccessControlManagerImpl ex
         return effective.toArray(new AccessControlPolicy[effective.size()]);
     }
 
-    @Nonnull
+    @NotNull
     @Override
     public AccessControlPolicyIterator getApplicablePolicies(@Nullable String 
absPath) throws RepositoryException {
         String oakPath = getOakPath(absPath);
@@ -210,7 +209,7 @@ public class AccessControlManagerImpl ex
     }
 
     @Override
-    public void setPolicy(@Nullable String absPath, @Nonnull 
AccessControlPolicy policy) throws RepositoryException {
+    public void setPolicy(@Nullable String absPath, @NotNull 
AccessControlPolicy policy) throws RepositoryException {
         String oakPath = getOakPath(absPath);
         Util.checkValidPolicy(oakPath, policy);
 
@@ -289,8 +288,8 @@ public class AccessControlManagerImpl ex
         }
     }
 
-    private void setNodeBasedAcl(@Nullable String oakPath, @Nonnull Tree tree,
-                                 @Nonnull ACL acl) throws RepositoryException {
+    private void setNodeBasedAcl(@Nullable String oakPath, @NotNull Tree tree,
+                                 @NotNull ACL acl) throws RepositoryException {
         Tree aclTree = getAclTree(oakPath, tree);
         if (aclTree != null) {
             // remove all existing aces
@@ -316,7 +315,7 @@ public class AccessControlManagerImpl ex
     }
 
     @Override
-    public void removePolicy(@Nullable String absPath, @Nonnull 
AccessControlPolicy policy) throws RepositoryException {
+    public void removePolicy(@Nullable String absPath, @NotNull 
AccessControlPolicy policy) throws RepositoryException {
         String oakPath = getOakPath(absPath);
         Util.checkValidPolicy(oakPath, policy);
 
@@ -352,9 +351,9 @@ public class AccessControlManagerImpl ex
     }
 
     //-------------------------------------< JackrabbitAccessControlManager 
>---
-    @Nonnull
+    @NotNull
     @Override
-    public JackrabbitAccessControlPolicy[] getApplicablePolicies(@Nonnull 
Principal principal) throws RepositoryException {
+    public JackrabbitAccessControlPolicy[] getApplicablePolicies(@NotNull 
Principal principal) throws RepositoryException {
         Util.checkValidPrincipal(principal, principalManager);
 
         String oakPath = (principal instanceof ItemBasedPrincipal) ? 
((ItemBasedPrincipal) principal).getPath() : null;
@@ -367,9 +366,9 @@ public class AccessControlManagerImpl ex
         }
     }
 
-    @Nonnull
+    @NotNull
     @Override
-    public JackrabbitAccessControlPolicy[] getPolicies(@Nonnull Principal 
principal) throws RepositoryException {
+    public JackrabbitAccessControlPolicy[] getPolicies(@NotNull Principal 
principal) throws RepositoryException {
         Util.checkValidPrincipal(principal, principalManager);
 
         String oakPath = (principal instanceof ItemBasedPrincipal) ? 
((ItemBasedPrincipal) principal).getPath() : null;
@@ -382,9 +381,9 @@ public class AccessControlManagerImpl ex
         }
     }
 
-    @Nonnull
+    @NotNull
     @Override
-    public AccessControlPolicy[] getEffectivePolicies(@Nonnull Set<Principal> 
principals) throws RepositoryException {
+    public AccessControlPolicy[] getEffectivePolicies(@NotNull Set<Principal> 
principals) throws RepositoryException {
         Util.checkValidPrincipals(principals, principalManager);
         Root r = getLatestRoot();
 
@@ -438,7 +437,7 @@ public class AccessControlManagerImpl ex
 
     //--------------------------------------------------------< PolicyOwner 
>---
     @Override
-    public boolean defines(String absPath, @Nonnull AccessControlPolicy 
accessControlPolicy) {
+    public boolean defines(String absPath, @NotNull AccessControlPolicy 
accessControlPolicy) {
         try {
             return Util.isValidPolicy(getOakPath(absPath), 
accessControlPolicy);
         } catch (RepositoryException e) {
@@ -448,8 +447,8 @@ public class AccessControlManagerImpl ex
     }
 
     //------------------------------------------------------------< private 
>---
-    @CheckForNull
-    private Tree getAclTree(@Nullable String oakPath, @Nonnull Tree 
accessControlledTree) {
+    @Nullable
+    private Tree getAclTree(@Nullable String oakPath, @NotNull Tree 
accessControlledTree) {
         if (Util.isAccessControlled(oakPath, accessControlledTree, ntMgr)) {
             String aclName = Util.getAclName(oakPath);
             Tree policyTree = accessControlledTree.getChild(aclName);
@@ -466,8 +465,8 @@ public class AccessControlManagerImpl ex
      * @return the new acl tree.
      * @throws AccessDeniedException In case the new acl tree is not 
accessible.
      */
-    @Nonnull
-    private Tree createAclTree(@Nullable String oakPath, @Nonnull Tree tree) 
throws AccessDeniedException {
+    @NotNull
+    private Tree createAclTree(@Nullable String oakPath, @NotNull Tree tree) 
throws AccessDeniedException {
         if (!Util.isAccessControlled(oakPath, tree, ntMgr)) {
             PropertyState mixins = 
tree.getProperty(JcrConstants.JCR_MIXINTYPES);
             String mixinName = Util.getMixinName(oakPath);
@@ -483,18 +482,18 @@ public class AccessControlManagerImpl ex
         return TreeUtil.addChild(tree, aclName, NT_REP_ACL);
     }
 
-    @CheckForNull
+    @Nullable
     private JackrabbitAccessControlList createACL(@Nullable String oakPath,
-                                                  @Nonnull Tree 
accessControlledTree,
+                                                  @NotNull Tree 
accessControlledTree,
                                                   boolean isEffectivePolicy) 
throws RepositoryException {
         return createACL(oakPath, accessControlledTree, isEffectivePolicy, 
null);
     }
 
-    @CheckForNull
+    @Nullable
     private JackrabbitAccessControlList createACL(@Nullable String oakPath,
-                                                  @Nonnull Tree 
accessControlledTree,
+                                                  @NotNull Tree 
accessControlledTree,
                                                   boolean isEffectivePolicy,
-                                                  @CheckForNull Predicate<ACE> 
predicate) throws RepositoryException {
+                                                  @Nullable Predicate<ACE> 
predicate) throws RepositoryException {
         JackrabbitAccessControlList acl = null;
         String aclName = Util.getAclName(oakPath);
         if (accessControlledTree.exists() && Util.isAccessControlled(oakPath, 
accessControlledTree, ntMgr)) {
@@ -521,7 +520,7 @@ public class AccessControlManagerImpl ex
 
     @Nullable
     private JackrabbitAccessControlList createPrincipalACL(@Nullable String 
oakPath,
-                                                           @Nonnull Principal 
principal) throws RepositoryException {
+                                                           @NotNull Principal 
principal) throws RepositoryException {
         Root root = getRoot();
         Result aceResult = 
searchAces(Collections.<Principal>singleton(principal), root);
         RestrictionProvider restrProvider = new 
PrincipalRestrictionProvider(restrictionProvider);
@@ -547,18 +546,18 @@ public class AccessControlManagerImpl ex
         }
     }
 
-    @Nonnull
+    @NotNull
     private ACE createACE(@Nullable String oakPath,
-                          @Nonnull Tree aceTree,
-                          @Nonnull RestrictionProvider restrictionProvider) 
throws RepositoryException {
+                          @NotNull Tree aceTree,
+                          @NotNull RestrictionProvider restrictionProvider) 
throws RepositoryException {
         boolean isAllow = 
NT_REP_GRANT_ACE.equals(TreeUtil.getPrimaryTypeName(aceTree));
         Set<Restriction> restrictions = 
restrictionProvider.readRestrictions(oakPath, aceTree);
         Iterable<String> privNames = checkNotNull(TreeUtil.getStrings(aceTree, 
REP_PRIVILEGES));
         return new Entry(getPrincipal(aceTree), 
bitsProvider.getBits(privNames), isAllow, restrictions, getNamePathMapper());
     }
 
-    @Nonnull
-    private static Result searchAces(@Nonnull Set<Principal> principals, 
@Nonnull Root root) throws RepositoryException {
+    @NotNull
+    private static Result searchAces(@NotNull Set<Principal> principals, 
@NotNull Root root) throws RepositoryException {
         StringBuilder stmt = new 
StringBuilder(QueryConstants.SEARCH_ROOT_PATH);
         stmt.append("//element(*,");
         stmt.append(NT_REP_ACE);
@@ -590,8 +589,8 @@ public class AccessControlManagerImpl ex
         }
     }
 
-    @Nonnull
-    private Principal getPrincipal(@Nonnull Tree aceTree) {
+    @NotNull
+    private Principal getPrincipal(@NotNull Tree aceTree) {
         String principalName = checkNotNull(TreeUtil.getString(aceTree, 
REP_PRINCIPAL_NAME));
         Principal principal = principalManager.getPrincipal(principalName);
         if (principal == null) {
@@ -621,7 +620,7 @@ public class AccessControlManagerImpl ex
             super(oakPath, entries, 
AccessControlManagerImpl.this.getNamePathMapper());
         }
 
-        @Nonnull
+        @NotNull
         @Override
         public RestrictionProvider getRestrictionProvider() {
             return restrictionProvider;
@@ -690,19 +689,19 @@ public class AccessControlManagerImpl ex
         private final Principal principal;
         private final RestrictionProvider rProvider;
 
-        private PrincipalACL(@Nullable String oakPath, @Nonnull Principal 
principal) {
+        private PrincipalACL(@Nullable String oakPath, @NotNull Principal 
principal) {
             this(oakPath, principal, null, new 
PrincipalRestrictionProvider(restrictionProvider));
         }
 
-        private PrincipalACL(@Nullable String oakPath, @Nonnull Principal 
principal,
+        private PrincipalACL(@Nullable String oakPath, @NotNull Principal 
principal,
                              @Nullable List<ACE> entries,
-                             @Nonnull RestrictionProvider restrictionProvider) 
{
+                             @NotNull RestrictionProvider restrictionProvider) 
{
             super(oakPath, entries, 
AccessControlManagerImpl.this.getNamePathMapper());
             this.principal = principal;
             rProvider = restrictionProvider;
         }
 
-        @Nonnull
+        @NotNull
         @Override
         public RestrictionProvider getRestrictionProvider() {
             return rProvider;
@@ -791,7 +790,7 @@ public class AccessControlManagerImpl ex
 
         private final Iterable<String> principalNames;
 
-        private AcePredicate(@Nonnull Set<Principal> principals) {
+        private AcePredicate(@NotNull Set<Principal> principals) {
             principalNames = Iterables.transform(principals, new 
Function<Principal, String>() {
                 @Override
                 public String apply(Principal input) {

Modified: 
jackrabbit/oak/branches/1.8/oak-core/src/main/java/org/apache/jackrabbit/oak/security/authorization/accesscontrol/AccessControlValidator.java
URL: 
http://svn.apache.org/viewvc/jackrabbit/oak/branches/1.8/oak-core/src/main/java/org/apache/jackrabbit/oak/security/authorization/accesscontrol/AccessControlValidator.java?rev=1846014&r1=1846013&r2=1846014&view=diff
==============================================================================
--- 
jackrabbit/oak/branches/1.8/oak-core/src/main/java/org/apache/jackrabbit/oak/security/authorization/accesscontrol/AccessControlValidator.java
 (original)
+++ 
jackrabbit/oak/branches/1.8/oak-core/src/main/java/org/apache/jackrabbit/oak/security/authorization/accesscontrol/AccessControlValidator.java
 Wed Nov  7 13:57:55 2018
@@ -19,7 +19,6 @@ package org.apache.jackrabbit.oak.securi
 import java.util.Collection;
 import java.util.Collections;
 import java.util.Set;
-import javax.annotation.Nonnull;
 import javax.jcr.RepositoryException;
 import javax.jcr.security.AccessControlException;
 import javax.jcr.security.Privilege;
@@ -48,6 +47,7 @@ import org.apache.jackrabbit.oak.spi.sec
 import org.apache.jackrabbit.oak.spi.security.privilege.PrivilegeBitsProvider;
 import org.apache.jackrabbit.oak.spi.state.NodeState;
 import org.apache.jackrabbit.util.Text;
+import org.jetbrains.annotations.NotNull;
 
 import static com.google.common.base.Preconditions.checkNotNull;
 import static 
org.apache.jackrabbit.oak.api.CommitFailedException.ACCESS_CONTROL;
@@ -68,11 +68,11 @@ class AccessControlValidator extends Def
     private final TypePredicate isRepoAccessControllable;
     private final TypePredicate isAccessControllable;
 
-    AccessControlValidator(@Nonnull NodeState parentAfter,
-                           @Nonnull PrivilegeManager privilegeManager,
-                           @Nonnull PrivilegeBitsProvider 
privilegeBitsProvider,
-                           @Nonnull RestrictionProvider restrictionProvider,
-                           @Nonnull TreeProvider treeProvider) {
+    AccessControlValidator(@NotNull NodeState parentAfter,
+                           @NotNull PrivilegeManager privilegeManager,
+                           @NotNull PrivilegeBitsProvider 
privilegeBitsProvider,
+                           @NotNull RestrictionProvider restrictionProvider,
+                           @NotNull TreeProvider treeProvider) {
         this.parentAfter = treeProvider.createReadOnlyTree(parentAfter);
         this.privilegeBitsProvider = privilegeBitsProvider;
         this.privilegeManager = privilegeManager;
@@ -203,8 +203,8 @@ class AccessControlValidator extends Def
         }
     }
 
-    private static void checkValidAccessControlledNode(@Nonnull Tree 
accessControlledTree,
-                                                       @Nonnull TypePredicate 
requiredMixin) throws CommitFailedException {
+    private static void checkValidAccessControlledNode(@NotNull Tree 
accessControlledTree,
+                                                       @NotNull TypePredicate 
requiredMixin) throws CommitFailedException {
         if 
(AC_NODETYPE_NAMES.contains(TreeUtil.getPrimaryTypeName(accessControlledTree))) 
{
             throw accessViolation(5, "Access control policy within access 
control content (" + accessControlledTree.getPath() + ')');
         }
@@ -216,7 +216,7 @@ class AccessControlValidator extends Def
         }
     }
 
-    private void checkValidAccessControlEntry(@Nonnull Tree aceNode) throws 
CommitFailedException {
+    private void checkValidAccessControlEntry(@NotNull Tree aceNode) throws 
CommitFailedException {
         Tree parent = aceNode.getParent();
         if (!parent.exists() || 
!NT_REP_ACL.equals(TreeUtil.getPrimaryTypeName(parent))) {
             throw accessViolation(7, "Isolated access control entry at " + 
aceNode.getPath());
@@ -226,7 +226,7 @@ class AccessControlValidator extends Def
         checkValidRestrictions(aceNode);
     }
 
-    private void checkValidPrincipal(@Nonnull Tree aceNode) throws 
CommitFailedException {
+    private void checkValidPrincipal(@NotNull Tree aceNode) throws 
CommitFailedException {
         String principalName = TreeUtil.getString(aceNode, REP_PRINCIPAL_NAME);
         if (principalName == null || principalName.isEmpty()) {
             throw accessViolation(8, "Missing principal name at " + 
aceNode.getPath());
@@ -235,7 +235,7 @@ class AccessControlValidator extends Def
         // enforced on the oak level.
     }
 
-    private void checkValidPrivileges(@Nonnull Tree aceNode) throws 
CommitFailedException {
+    private void checkValidPrivileges(@NotNull Tree aceNode) throws 
CommitFailedException {
         Iterable<String> privilegeNames = TreeUtil.getStrings(aceNode, 
REP_PRIVILEGES);
         if (privilegeNames == null || Iterables.isEmpty(privilegeNames)) {
             throw accessViolation(9, "Missing privileges at " + 
aceNode.getPath());
@@ -254,7 +254,7 @@ class AccessControlValidator extends Def
         }
     }
 
-    private void checkValidRestrictions(@Nonnull Tree aceTree) throws 
CommitFailedException {
+    private void checkValidRestrictions(@NotNull Tree aceTree) throws 
CommitFailedException {
         String path;
         Tree aclTree = checkNotNull(aceTree.getParent());
         String aclPath = aclTree.getPath();

Modified: 
jackrabbit/oak/branches/1.8/oak-core/src/main/java/org/apache/jackrabbit/oak/security/authorization/accesscontrol/AccessControlValidatorProvider.java
URL: 
http://svn.apache.org/viewvc/jackrabbit/oak/branches/1.8/oak-core/src/main/java/org/apache/jackrabbit/oak/security/authorization/accesscontrol/AccessControlValidatorProvider.java?rev=1846014&r1=1846013&r2=1846014&view=diff
==============================================================================
--- 
jackrabbit/oak/branches/1.8/oak-core/src/main/java/org/apache/jackrabbit/oak/security/authorization/accesscontrol/AccessControlValidatorProvider.java
 (original)
+++ 
jackrabbit/oak/branches/1.8/oak-core/src/main/java/org/apache/jackrabbit/oak/security/authorization/accesscontrol/AccessControlValidatorProvider.java
 Wed Nov  7 13:57:55 2018
@@ -16,8 +16,6 @@
  */
 package org.apache.jackrabbit.oak.security.authorization.accesscontrol;
 
-import javax.annotation.Nonnull;
-
 import org.apache.jackrabbit.api.security.authorization.PrivilegeManager;
 import org.apache.jackrabbit.oak.api.Root;
 import org.apache.jackrabbit.oak.plugins.tree.RootProvider;
@@ -32,6 +30,7 @@ import org.apache.jackrabbit.oak.spi.sec
 import org.apache.jackrabbit.oak.spi.security.privilege.PrivilegeBitsProvider;
 import org.apache.jackrabbit.oak.spi.security.privilege.PrivilegeConfiguration;
 import org.apache.jackrabbit.oak.spi.state.NodeState;
+import org.jetbrains.annotations.NotNull;
 
 /**
  * {@code AccessControlValidatorProvider} aimed to provide a root validator
@@ -45,14 +44,14 @@ public class AccessControlValidatorProvi
     private final RootProvider rootProvider;
     private final TreeProvider treeProvider;
 
-    public AccessControlValidatorProvider(@Nonnull SecurityProvider 
securityProvider, @Nonnull RootProvider rootProvider, @Nonnull TreeProvider 
treeProvider) {
+    public AccessControlValidatorProvider(@NotNull SecurityProvider 
securityProvider, @NotNull RootProvider rootProvider, @NotNull TreeProvider 
treeProvider) {
         this.securityProvider = securityProvider;
         this.rootProvider = rootProvider;
         this.treeProvider = treeProvider;
     }
 
     //--------------------------------------------------< ValidatorProvider 
>---
-    @Nonnull
+    @NotNull
     @Override
     public Validator getRootValidator(NodeState before, NodeState after, 
CommitInfo info) {
 

Modified: 
jackrabbit/oak/branches/1.8/oak-core/src/main/java/org/apache/jackrabbit/oak/security/authorization/accesscontrol/Util.java
URL: 
http://svn.apache.org/viewvc/jackrabbit/oak/branches/1.8/oak-core/src/main/java/org/apache/jackrabbit/oak/security/authorization/accesscontrol/Util.java?rev=1846014&r1=1846013&r2=1846014&view=diff
==============================================================================
--- 
jackrabbit/oak/branches/1.8/oak-core/src/main/java/org/apache/jackrabbit/oak/security/authorization/accesscontrol/Util.java
 (original)
+++ 
jackrabbit/oak/branches/1.8/oak-core/src/main/java/org/apache/jackrabbit/oak/security/authorization/accesscontrol/Util.java
 Wed Nov  7 13:57:55 2018
@@ -18,8 +18,6 @@ package org.apache.jackrabbit.oak.securi
 
 import java.security.Principal;
 import java.util.Set;
-import javax.annotation.Nonnull;
-import javax.annotation.Nullable;
 import javax.jcr.security.AccessControlException;
 import javax.jcr.security.AccessControlPolicy;
 
@@ -32,6 +30,8 @@ import org.apache.jackrabbit.oak.spi.sec
 import org.apache.jackrabbit.oak.spi.security.principal.PrincipalImpl;
 import org.apache.jackrabbit.oak.spi.xml.ImportBehavior;
 import org.apache.jackrabbit.oak.spi.xml.ProtectedItemImporter;
+import org.jetbrains.annotations.NotNull;
+import org.jetbrains.annotations.Nullable;
 
 /**
  * Implementation specific access control utility methods
@@ -44,12 +44,12 @@ final class Util implements AccessContro
     private Util() {}
 
     public static void checkValidPrincipal(@Nullable Principal principal,
-                                           @Nonnull PrincipalManager 
principalManager) throws AccessControlException {
+                                           @NotNull PrincipalManager 
principalManager) throws AccessControlException {
         checkValidPrincipal(principal, principalManager, ImportBehavior.ABORT);
     }
 
     public static boolean checkValidPrincipal(@Nullable Principal principal,
-                                              @Nonnull PrincipalManager 
principalManager,
+                                              @NotNull PrincipalManager 
principalManager,
                                               int importBehavior) throws 
AccessControlException {
         String name = (principal == null) ? null : principal.getName();
         if (name == null || name.isEmpty()) {
@@ -70,7 +70,7 @@ final class Util implements AccessContro
     }
 
     public static void checkValidPrincipals(@Nullable Set<Principal> 
principals,
-                                            @Nonnull PrincipalManager 
principalManager) throws AccessControlException {
+                                            @NotNull PrincipalManager 
principalManager) throws AccessControlException {
         if (principals == null) {
             throw new AccessControlException("Valid principals expected. Found 
null.");
         }
@@ -79,7 +79,7 @@ final class Util implements AccessContro
         }
     }
 
-    public static boolean isValidPolicy(@Nullable String oakPath, @Nonnull 
AccessControlPolicy policy) {
+    public static boolean isValidPolicy(@Nullable String oakPath, @NotNull 
AccessControlPolicy policy) {
         if (policy instanceof ACL) {
             String path = ((ACL) policy).getOakPath();
             return !((path == null && oakPath != null) || (path != null && 
!path.equals(oakPath)));
@@ -87,28 +87,28 @@ final class Util implements AccessContro
         return false;
     }
 
-    public static void checkValidPolicy(@Nullable String oakPath, @Nonnull 
AccessControlPolicy policy) throws AccessControlException {
+    public static void checkValidPolicy(@Nullable String oakPath, @NotNull 
AccessControlPolicy policy) throws AccessControlException {
         if (!isValidPolicy(oakPath, policy)) {
             throw new AccessControlException("Invalid access control policy " 
+ policy);
         }
     }
 
-    public static boolean isAccessControlled(@Nullable String oakPath, 
@Nonnull Tree tree,
-                                             @Nonnull ReadOnlyNodeTypeManager 
ntMgr) {
+    public static boolean isAccessControlled(@Nullable String oakPath, 
@NotNull Tree tree,
+                                             @NotNull ReadOnlyNodeTypeManager 
ntMgr) {
         String mixinName = getMixinName(oakPath);
         return ntMgr.isNodeType(tree, mixinName);
     }
 
-    public static boolean isACE(@Nonnull Tree tree, @Nonnull 
ReadOnlyNodeTypeManager ntMgr) {
+    public static boolean isACE(@NotNull Tree tree, @NotNull 
ReadOnlyNodeTypeManager ntMgr) {
         return tree.exists() && ntMgr.isNodeType(tree, NT_REP_ACE);
     }
 
-    @Nonnull
+    @NotNull
     public static String getMixinName(@Nullable String oakPath) {
         return (oakPath == null) ? MIX_REP_REPO_ACCESS_CONTROLLABLE : 
MIX_REP_ACCESS_CONTROLLABLE;
     }
 
-    @Nonnull
+    @NotNull
     public static String getAclName(@Nullable String oakPath) {
         return (oakPath == null) ? REP_REPO_POLICY : REP_POLICY;
     }
@@ -120,8 +120,8 @@ final class Util implements AccessContro
      * @param index The index of the entry in the list
      * @return the name of the ACE node.
      */
-    @Nonnull
-    public static String generateAceName(@Nonnull ACE ace, int index) {
+    @NotNull
+    public static String generateAceName(@NotNull ACE ace, int index) {
         String hint = (ace.isAllow()) ? "allow" : "deny";
         if (index == 0) {
             return hint;
@@ -134,4 +134,4 @@ final class Util implements AccessContro
         String importBehaviorStr = 
config.getParameters().getConfigValue(ProtectedItemImporter.PARAM_IMPORT_BEHAVIOR,
 ImportBehavior.NAME_ABORT);
         return ImportBehavior.valueFromString(importBehaviorStr);
     }
-}
\ No newline at end of file
+}

Modified: 
jackrabbit/oak/branches/1.8/oak-core/src/main/java/org/apache/jackrabbit/oak/security/authorization/composite/CompositeAccessControlManager.java
URL: 
http://svn.apache.org/viewvc/jackrabbit/oak/branches/1.8/oak-core/src/main/java/org/apache/jackrabbit/oak/security/authorization/composite/CompositeAccessControlManager.java?rev=1846014&r1=1846013&r2=1846014&view=diff
==============================================================================
--- 
jackrabbit/oak/branches/1.8/oak-core/src/main/java/org/apache/jackrabbit/oak/security/authorization/composite/CompositeAccessControlManager.java
 (original)
+++ 
jackrabbit/oak/branches/1.8/oak-core/src/main/java/org/apache/jackrabbit/oak/security/authorization/composite/CompositeAccessControlManager.java
 Wed Nov  7 13:57:55 2018
@@ -19,7 +19,6 @@ package org.apache.jackrabbit.oak.securi
 import java.security.Principal;
 import java.util.List;
 import java.util.Set;
-import javax.annotation.Nonnull;
 import javax.jcr.RepositoryException;
 import javax.jcr.security.AccessControlException;
 import javax.jcr.security.AccessControlManager;
@@ -39,6 +38,7 @@ import org.apache.jackrabbit.oak.namepat
 import org.apache.jackrabbit.oak.spi.security.SecurityProvider;
 import 
org.apache.jackrabbit.oak.spi.security.authorization.accesscontrol.AbstractAccessControlManager;
 import 
org.apache.jackrabbit.oak.spi.security.authorization.accesscontrol.PolicyOwner;
+import org.jetbrains.annotations.NotNull;
 
 /**
  * Access control manager that aggregates a list of different access control
@@ -51,16 +51,16 @@ class CompositeAccessControlManager exte
 
     private final List<AccessControlManager> acMgrs;
 
-    public CompositeAccessControlManager(@Nonnull Root root,
-                                         @Nonnull NamePathMapper 
namePathMapper,
-                                         @Nonnull SecurityProvider 
securityProvider,
-                                         @Nonnull List<AccessControlManager> 
acMgrs) {
+    public CompositeAccessControlManager(@NotNull Root root,
+                                         @NotNull NamePathMapper 
namePathMapper,
+                                         @NotNull SecurityProvider 
securityProvider,
+                                         @NotNull List<AccessControlManager> 
acMgrs) {
         super(root, namePathMapper, securityProvider);
         this.acMgrs = acMgrs;
     }
 
     //-----------------------------------------------< AccessControlManager 
>---
-    @Nonnull
+    @NotNull
     @Override
     public Privilege[] getSupportedPrivileges(String absPath) throws 
RepositoryException {
         ImmutableSet.Builder<Privilege> privs = ImmutableSet.builder();
@@ -160,4 +160,4 @@ class CompositeAccessControlManager exte
         List<AccessControlPolicy> l = privs.build();
         return l.toArray(new AccessControlPolicy[l.size()]);
     }
-}
\ No newline at end of file
+}

Modified: 
jackrabbit/oak/branches/1.8/oak-core/src/main/java/org/apache/jackrabbit/oak/security/authorization/composite/CompositeAuthorizationConfiguration.java
URL: 
http://svn.apache.org/viewvc/jackrabbit/oak/branches/1.8/oak-core/src/main/java/org/apache/jackrabbit/oak/security/authorization/composite/CompositeAuthorizationConfiguration.java?rev=1846014&r1=1846013&r2=1846014&view=diff
==============================================================================
--- 
jackrabbit/oak/branches/1.8/oak-core/src/main/java/org/apache/jackrabbit/oak/security/authorization/composite/CompositeAuthorizationConfiguration.java
 (original)
+++ 
jackrabbit/oak/branches/1.8/oak-core/src/main/java/org/apache/jackrabbit/oak/security/authorization/composite/CompositeAuthorizationConfiguration.java
 Wed Nov  7 13:57:55 2018
@@ -20,8 +20,6 @@ import java.security.Principal;
 import java.util.ArrayList;
 import java.util.List;
 import java.util.Set;
-import javax.annotation.Nonnull;
-import javax.annotation.Nullable;
 import javax.jcr.security.AccessControlManager;
 
 import com.google.common.collect.Lists;
@@ -35,6 +33,8 @@ import org.apache.jackrabbit.oak.spi.sec
 import 
org.apache.jackrabbit.oak.spi.security.authorization.permission.PermissionProvider;
 import 
org.apache.jackrabbit.oak.spi.security.authorization.restriction.CompositeRestrictionProvider;
 import 
org.apache.jackrabbit.oak.spi.security.authorization.restriction.RestrictionProvider;
+import org.jetbrains.annotations.NotNull;
+import org.jetbrains.annotations.Nullable;
 import org.slf4j.Logger;
 import org.slf4j.LoggerFactory;
 
@@ -115,7 +115,7 @@ public class CompositeAuthorizationConfi
         super(AuthorizationConfiguration.NAME);
     }
 
-    public CompositeAuthorizationConfiguration(@Nonnull SecurityProvider 
securityProvider) {
+    public CompositeAuthorizationConfiguration(@NotNull SecurityProvider 
securityProvider) {
         super(AuthorizationConfiguration.NAME, securityProvider);
     }
 
@@ -123,10 +123,10 @@ public class CompositeAuthorizationConfi
         this.compositionType = CompositionType.fromString(ct);
     }
 
-    @Nonnull
+    @NotNull
     @Override
-    public AccessControlManager getAccessControlManager(@Nonnull final Root 
root,
-                                                        @Nonnull final 
NamePathMapper namePathMapper) {
+    public AccessControlManager getAccessControlManager(@NotNull final Root 
root,
+                                                        @NotNull final 
NamePathMapper namePathMapper) {
         List<AuthorizationConfiguration> configurations = getConfigurations();
         switch (configurations.size()) {
             case 0: throw new IllegalStateException();
@@ -138,7 +138,7 @@ public class CompositeAuthorizationConfi
         }
     }
 
-    @Nonnull
+    @NotNull
     @Override
     public RestrictionProvider getRestrictionProvider() {
         List<AuthorizationConfiguration> configurations = getConfigurations();
@@ -157,11 +157,11 @@ public class CompositeAuthorizationConfi
         }
     }
 
-    @Nonnull
+    @NotNull
     @Override
-    public PermissionProvider getPermissionProvider(@Nonnull final Root root,
-                                                    @Nonnull final String 
workspaceName,
-                                                    @Nonnull final 
Set<Principal> principals) {
+    public PermissionProvider getPermissionProvider(@NotNull final Root root,
+                                                    @NotNull final String 
workspaceName,
+                                                    @NotNull final 
Set<Principal> principals) {
         List<AuthorizationConfiguration> configurations = getConfigurations();
         switch (configurations.size()) {
             case 0: throw new IllegalStateException();
@@ -190,4 +190,4 @@ public class CompositeAuthorizationConfi
                 return pp;
         }
     }
-}
\ No newline at end of file
+}

Modified: 
jackrabbit/oak/branches/1.8/oak-core/src/main/java/org/apache/jackrabbit/oak/security/authorization/composite/CompositePermissionProvider.java
URL: 
http://svn.apache.org/viewvc/jackrabbit/oak/branches/1.8/oak-core/src/main/java/org/apache/jackrabbit/oak/security/authorization/composite/CompositePermissionProvider.java?rev=1846014&r1=1846013&r2=1846014&view=diff
==============================================================================
--- 
jackrabbit/oak/branches/1.8/oak-core/src/main/java/org/apache/jackrabbit/oak/security/authorization/composite/CompositePermissionProvider.java
 (original)
+++ 
jackrabbit/oak/branches/1.8/oak-core/src/main/java/org/apache/jackrabbit/oak/security/authorization/composite/CompositePermissionProvider.java
 Wed Nov  7 13:57:55 2018
@@ -19,9 +19,6 @@ package org.apache.jackrabbit.oak.securi
 import java.util.List;
 import java.util.Set;
 import java.util.function.Function;
-import javax.annotation.Nonnull;
-import javax.annotation.Nullable;
-
 import org.apache.jackrabbit.oak.api.PropertyState;
 import org.apache.jackrabbit.oak.api.Root;
 import org.apache.jackrabbit.oak.api.Tree;
@@ -40,6 +37,8 @@ import org.apache.jackrabbit.oak.spi.sec
 import 
org.apache.jackrabbit.oak.spi.security.authorization.permission.TreePermission;
 import org.apache.jackrabbit.oak.spi.security.privilege.PrivilegeBits;
 import org.apache.jackrabbit.oak.spi.security.privilege.PrivilegeBitsProvider;
+import org.jetbrains.annotations.NotNull;
+import org.jetbrains.annotations.Nullable;
 
 import static 
org.apache.jackrabbit.oak.security.authorization.composite.CompositeAuthorizationConfiguration.CompositionType.AND;
 
@@ -64,9 +63,9 @@ class CompositePermissionProvider implem
     private PrivilegeBitsProvider privilegeBitsProvider;
     private TreeTypeProvider typeProvider;
 
-    CompositePermissionProvider(@Nonnull Root root, @Nonnull 
List<AggregatedPermissionProvider> pps,
-                                @Nonnull Context acContext, @Nonnull 
CompositionType compositionType,
-                                @Nonnull RootProvider rootProvider) {
+    CompositePermissionProvider(@NotNull Root root, @NotNull 
List<AggregatedPermissionProvider> pps,
+                                @NotNull Context acContext, @NotNull 
CompositionType compositionType,
+                                @NotNull RootProvider rootProvider) {
         this.root = root;
         this.pps = pps.toArray(new AggregatedPermissionProvider[pps.size()]);
         this.ctx = acContext;
@@ -90,7 +89,7 @@ class CompositePermissionProvider implem
         }
     }
 
-    @Nonnull
+    @NotNull
     @Override
     public Set<String> getPrivileges(@Nullable Tree tree) {
         Tree immutableTree = PermissionUtil.getImmutableTree(tree, 
immutableRoot);
@@ -121,7 +120,7 @@ class CompositePermissionProvider implem
     }
 
     @Override
-    public boolean hasPrivileges(@Nullable Tree tree, @Nonnull String... 
privilegeNames) {
+    public boolean hasPrivileges(@Nullable Tree tree, @NotNull String... 
privilegeNames) {
         Tree immutableTree = PermissionUtil.getImmutableTree(tree, 
immutableRoot);
         PrivilegeBits privilegeBits = 
privilegeBitsProvider.getBits(privilegeNames);
         if (privilegeBits.isEmpty()) {
@@ -159,15 +158,15 @@ class CompositePermissionProvider implem
         return hasPrivileges && coveredPrivs.includes(privilegeBits);
     }
 
-    @Nonnull
+    @NotNull
     @Override
     public RepositoryPermission getRepositoryPermission() {
         return repositoryPermission;
     }
 
-    @Nonnull
+    @NotNull
     @Override
-    public TreePermission getTreePermission(@Nonnull Tree tree, @Nonnull 
TreePermission parentPermission) {
+    public TreePermission getTreePermission(@NotNull Tree tree, @NotNull 
TreePermission parentPermission) {
         ImmutableTree immutableTree = (ImmutableTree) 
PermissionUtil.getImmutableTree(tree, immutableRoot);
         if (tree.isRoot()) {
             return CompositeTreePermission.create(immutableTree, typeProvider, 
pps, compositionType);
@@ -179,7 +178,7 @@ class CompositePermissionProvider implem
     }
 
     @Override
-    public boolean isGranted(@Nonnull Tree parent, @Nullable PropertyState 
property, long permissions) {
+    public boolean isGranted(@NotNull Tree parent, @Nullable PropertyState 
property, long permissions) {
         Tree immParent = PermissionUtil.getImmutableTree(parent, 
immutableRoot);
 
         boolean isGranted = false;
@@ -207,7 +206,7 @@ class CompositePermissionProvider implem
     }
 
     @Override
-    public boolean isGranted(@Nonnull String oakPath, @Nonnull String 
jcrActions) {
+    public boolean isGranted(@NotNull String oakPath, @NotNull String 
jcrActions) {
         TreeLocation location = TreeLocation.create(immutableRoot, oakPath);
         boolean isAcContent = ctx.definesLocation(location);
 
@@ -235,8 +234,8 @@ class CompositePermissionProvider implem
 
         private final CompositionType compositionType;
 
-        public CompositeRepositoryPermission(@Nonnull 
AggregatedPermissionProvider[] pps,
-                @Nonnull CompositionType compositionType) {
+        public CompositeRepositoryPermission(@NotNull 
AggregatedPermissionProvider[] pps,
+                @NotNull CompositionType compositionType) {
             this.pps = pps;
             this.compositionType = compositionType;
         }
@@ -272,7 +271,7 @@ class CompositePermissionProvider implem
 
     //---------------------------------------< AggregatedPermissionProvider 
>---
 
-    @Nonnull
+    @NotNull
     @Override
     public PrivilegeBits supportedPrivileges(@Nullable Tree tree, @Nullable 
PrivilegeBits privilegeBits) {
         PrivilegeBits result = PrivilegeBits.getInstance();
@@ -311,7 +310,7 @@ class CompositePermissionProvider implem
     }
 
     @Override
-    public boolean isGranted(@Nonnull TreeLocation location, long permissions) 
{
+    public boolean isGranted(@NotNull TreeLocation location, long permissions) 
{
         PropertyState property = location.getProperty();
         Tree tree = (property == null) ? location.getTree() : 
location.getParent().getTree();
 
@@ -344,10 +343,10 @@ class CompositePermissionProvider implem
         }
     }
 
-    @Nonnull
+    @NotNull
     @Override
-    public TreePermission getTreePermission(@Nonnull Tree tree, @Nonnull 
TreeType type,
-            @Nonnull TreePermission parentPermission) {
+    public TreePermission getTreePermission(@NotNull Tree tree, @NotNull 
TreeType type,
+            @NotNull TreePermission parentPermission) {
         ImmutableTree immutableTree = (ImmutableTree) 
PermissionUtil.getImmutableTree(tree, immutableRoot);
         if (tree.isRoot()) {
             return CompositeTreePermission.create(immutableTree, typeProvider, 
pps, compositionType);

Modified: 
jackrabbit/oak/branches/1.8/oak-core/src/main/java/org/apache/jackrabbit/oak/security/authorization/composite/CompositeTreePermission.java
URL: 
http://svn.apache.org/viewvc/jackrabbit/oak/branches/1.8/oak-core/src/main/java/org/apache/jackrabbit/oak/security/authorization/composite/CompositeTreePermission.java?rev=1846014&r1=1846013&r2=1846014&view=diff
==============================================================================
--- 
jackrabbit/oak/branches/1.8/oak-core/src/main/java/org/apache/jackrabbit/oak/security/authorization/composite/CompositeTreePermission.java
 (original)
+++ 
jackrabbit/oak/branches/1.8/oak-core/src/main/java/org/apache/jackrabbit/oak/security/authorization/composite/CompositeTreePermission.java
 Wed Nov  7 13:57:55 2018
@@ -21,9 +21,6 @@ import static org.apache.jackrabbit.oak.
 
 import java.util.function.Supplier;
 
-import javax.annotation.Nonnull;
-import javax.annotation.Nullable;
-
 import org.apache.jackrabbit.oak.api.PropertyState;
 import org.apache.jackrabbit.oak.api.Tree;
 import org.apache.jackrabbit.oak.plugins.tree.TreeType;
@@ -34,6 +31,8 @@ import org.apache.jackrabbit.oak.spi.sec
 import 
org.apache.jackrabbit.oak.spi.security.authorization.permission.Permissions;
 import 
org.apache.jackrabbit.oak.spi.security.authorization.permission.TreePermission;
 import org.apache.jackrabbit.oak.spi.state.NodeState;
+import org.jetbrains.annotations.NotNull;
+import org.jetbrains.annotations.Nullable;
 
 /**
  * {@code TreePermission} implementation that combines multiple {@code 
TreePermission}
@@ -53,9 +52,9 @@ final class CompositeTreePermission impl
     private Boolean canRead;
     private Boolean canReadProperties;
 
-    private CompositeTreePermission(@Nonnull ImmutableTree tree, @Nonnull 
TreeType type,
-            @Nonnull TreeTypeProvider typeProvider, @Nonnull 
AggregatedPermissionProvider[] providers,
-            @Nonnull TreePermission[] treePermissions, int cnt, @Nonnull 
CompositionType compositionType) {
+    private CompositeTreePermission(@NotNull ImmutableTree tree, @NotNull 
TreeType type,
+            @NotNull TreeTypeProvider typeProvider, @NotNull 
AggregatedPermissionProvider[] providers,
+            @NotNull TreePermission[] treePermissions, int cnt, @NotNull 
CompositionType compositionType) {
         this.tree = tree;
         this.type = type;
 
@@ -66,8 +65,8 @@ final class CompositeTreePermission impl
         this.compositionType = compositionType;
     }
 
-    static TreePermission create(@Nonnull ImmutableTree rootTree, @Nonnull 
TreeTypeProvider typeProvider,
-            @Nonnull AggregatedPermissionProvider[] providers, @Nonnull 
CompositionType compositionType) {
+    static TreePermission create(@NotNull ImmutableTree rootTree, @NotNull 
TreeTypeProvider typeProvider,
+            @NotNull AggregatedPermissionProvider[] providers, @NotNull 
CompositionType compositionType) {
         switch (providers.length) {
             case 0 : return TreePermission.EMPTY;
             case 1 : return providers[0].getTreePermission(rootTree, 
TreeType.DEFAULT, TreePermission.EMPTY);
@@ -86,16 +85,16 @@ final class CompositeTreePermission impl
         }
     }
 
-    static TreePermission create(@Nonnull final ImmutableTree tree, @Nonnull 
CompositeTreePermission parentPermission) {
+    static TreePermission create(@NotNull final ImmutableTree tree, @NotNull 
CompositeTreePermission parentPermission) {
         return create(() -> tree, tree.getName(), tree.getNodeState(), 
parentPermission, null);
     }
 
-    static TreePermission create(@Nonnull final ImmutableTree tree, @Nonnull 
CompositeTreePermission parentPermission,
+    static TreePermission create(@NotNull final ImmutableTree tree, @NotNull 
CompositeTreePermission parentPermission,
             @Nullable TreeType treeType) {
         return create(() -> tree, tree.getName(), tree.getNodeState(), 
parentPermission, treeType);
     }
 
-    private static TreePermission create(@Nonnull Supplier<ImmutableTree> 
lazyTree, @Nonnull String childName, @Nonnull NodeState childState, @Nonnull 
CompositeTreePermission parentPermission,
+    private static TreePermission create(@NotNull Supplier<ImmutableTree> 
lazyTree, @NotNull String childName, @NotNull NodeState childState, @NotNull 
CompositeTreePermission parentPermission,
             @Nullable TreeType treeType) {
         switch (parentPermission.childSize) {
             case 0: return TreePermission.EMPTY;
@@ -139,9 +138,9 @@ final class CompositeTreePermission impl
     }
 
     //-----------------------------------------------------< TreePermission 
>---
-    @Nonnull
+    @NotNull
     @Override
-    public TreePermission getChildPermission(@Nonnull final String childName, 
@Nonnull final NodeState childState) {
+    public TreePermission getChildPermission(@NotNull final String childName, 
@NotNull final NodeState childState) {
         return create(() -> new ImmutableTree(tree, childName, childState), 
childName, childState, this, null);
     }
 
@@ -154,7 +153,7 @@ final class CompositeTreePermission impl
     }
 
     @Override
-    public boolean canRead(@Nonnull PropertyState property) {
+    public boolean canRead(@NotNull PropertyState property) {
         return grantsRead(property);
     }
 
@@ -191,7 +190,7 @@ final class CompositeTreePermission impl
     }
 
     @Override
-    public boolean isGranted(long permissions, @Nonnull PropertyState 
property) {
+    public boolean isGranted(long permissions, @NotNull PropertyState 
property) {
         return grantsPermission(permissions, property);
     }
 
@@ -250,11 +249,11 @@ final class CompositeTreePermission impl
         return supportedPermissions != Permissions.NO_PERMISSION;
     }
 
-    private static boolean isValid(@Nonnull TreePermission tp) {
+    private static boolean isValid(@NotNull TreePermission tp) {
         return NO_RECOURSE != tp;
     }
 
-    private static TreeType getType(@Nonnull Tree tree, @Nonnull 
CompositeTreePermission parent) {
+    private static TreeType getType(@NotNull Tree tree, @NotNull 
CompositeTreePermission parent) {
         return parent.typeProvider.getType(tree, parent.type);
     }
-}
\ No newline at end of file
+}

Modified: 
jackrabbit/oak/branches/1.8/oak-core/src/main/java/org/apache/jackrabbit/oak/security/authorization/permission/AllPermissions.java
URL: 
http://svn.apache.org/viewvc/jackrabbit/oak/branches/1.8/oak-core/src/main/java/org/apache/jackrabbit/oak/security/authorization/permission/AllPermissions.java?rev=1846014&r1=1846013&r2=1846014&view=diff
==============================================================================
--- 
jackrabbit/oak/branches/1.8/oak-core/src/main/java/org/apache/jackrabbit/oak/security/authorization/permission/AllPermissions.java
 (original)
+++ 
jackrabbit/oak/branches/1.8/oak-core/src/main/java/org/apache/jackrabbit/oak/security/authorization/permission/AllPermissions.java
 Wed Nov  7 13:57:55 2018
@@ -18,9 +18,6 @@ package org.apache.jackrabbit.oak.securi
 
 import java.util.Collections;
 import java.util.Set;
-import javax.annotation.Nonnull;
-import javax.annotation.Nullable;
-
 import org.apache.jackrabbit.oak.api.PropertyState;
 import org.apache.jackrabbit.oak.api.Root;
 import org.apache.jackrabbit.oak.api.Tree;
@@ -28,6 +25,8 @@ import org.apache.jackrabbit.oak.plugins
 import 
org.apache.jackrabbit.oak.spi.security.authorization.permission.RepositoryPermission;
 import 
org.apache.jackrabbit.oak.spi.security.authorization.permission.TreePermission;
 import org.apache.jackrabbit.oak.spi.security.privilege.PrivilegeConstants;
+import org.jetbrains.annotations.NotNull;
+import org.jetbrains.annotations.Nullable;
 
 /**
  * Implementation of the {@code CompiledPermissions} interface that grants full
@@ -45,46 +44,46 @@ final class AllPermissions implements Co
     }
 
     @Override
-    public void refresh(@Nonnull Root root, @Nonnull String workspaceName) {
+    public void refresh(@NotNull Root root, @NotNull String workspaceName) {
         // nop
     }
 
-    @Nonnull
+    @NotNull
     @Override
     public RepositoryPermission getRepositoryPermission() {
         return RepositoryPermission.ALL;
     }
 
-    @Nonnull
+    @NotNull
     @Override
-    public TreePermission getTreePermission(@Nonnull Tree tree, @Nonnull 
TreePermission parentPermission) {
+    public TreePermission getTreePermission(@NotNull Tree tree, @NotNull 
TreePermission parentPermission) {
         return TreePermission.ALL;
     }
 
-    @Nonnull
+    @NotNull
     @Override
-    public TreePermission getTreePermission(@Nonnull Tree tree, @Nonnull 
TreeType type, @Nonnull TreePermission parentPermission) {
+    public TreePermission getTreePermission(@NotNull Tree tree, @NotNull 
TreeType type, @NotNull TreePermission parentPermission) {
         return TreePermission.ALL;
     }
 
     @Override
-    public boolean isGranted(@Nonnull Tree tree, @Nullable PropertyState 
property, long permissions) {
+    public boolean isGranted(@NotNull Tree tree, @Nullable PropertyState 
property, long permissions) {
         return true;
     }
 
     @Override
-    public boolean isGranted(@Nonnull String path, long permissions) {
+    public boolean isGranted(@NotNull String path, long permissions) {
         return true;
     }
 
-    @Nonnull
+    @NotNull
     @Override
     public Set<String> getPrivileges(@Nullable Tree tree) {
         return Collections.singleton(PrivilegeConstants.JCR_ALL);
     }
 
     @Override
-    public boolean hasPrivileges(@Nullable Tree tree, @Nonnull String... 
privilegeNames) {
+    public boolean hasPrivileges(@Nullable Tree tree, @NotNull String... 
privilegeNames) {
         return true;
     }
 }

Modified: 
jackrabbit/oak/branches/1.8/oak-core/src/main/java/org/apache/jackrabbit/oak/security/authorization/permission/ChildOrderDiff.java
URL: 
http://svn.apache.org/viewvc/jackrabbit/oak/branches/1.8/oak-core/src/main/java/org/apache/jackrabbit/oak/security/authorization/permission/ChildOrderDiff.java?rev=1846014&r1=1846013&r2=1846014&view=diff
==============================================================================
--- 
jackrabbit/oak/branches/1.8/oak-core/src/main/java/org/apache/jackrabbit/oak/security/authorization/permission/ChildOrderDiff.java
 (original)
+++ 
jackrabbit/oak/branches/1.8/oak-core/src/main/java/org/apache/jackrabbit/oak/security/authorization/permission/ChildOrderDiff.java
 Wed Nov  7 13:57:55 2018
@@ -18,11 +18,10 @@ package org.apache.jackrabbit.oak.securi
 
 import java.util.Iterator;
 import java.util.Set;
-import javax.annotation.CheckForNull;
-
 import org.apache.jackrabbit.oak.api.PropertyState;
 import org.apache.jackrabbit.oak.api.Type;
 import org.apache.jackrabbit.oak.plugins.tree.TreeConstants;
+import org.jetbrains.annotations.Nullable;
 
 import static com.google.common.collect.Sets.newLinkedHashSet;
 
@@ -44,7 +43,7 @@ final class ChildOrderDiff {
      * @return the name of the first reordered child if any user-supplied node
      * reorder happened; {@code null} otherwise.
      */
-    @CheckForNull
+    @Nullable
     static String firstReordered(PropertyState before, PropertyState after) {
         Set<String> afterNames = newLinkedHashSet(after.getValue(Type.NAMES));
         Set<String> beforeNames = 
newLinkedHashSet(before.getValue(Type.NAMES));

Modified: 
jackrabbit/oak/branches/1.8/oak-core/src/main/java/org/apache/jackrabbit/oak/security/authorization/permission/CompiledPermissionImpl.java
URL: 
http://svn.apache.org/viewvc/jackrabbit/oak/branches/1.8/oak-core/src/main/java/org/apache/jackrabbit/oak/security/authorization/permission/CompiledPermissionImpl.java?rev=1846014&r1=1846013&r2=1846014&view=diff
==============================================================================
--- 
jackrabbit/oak/branches/1.8/oak-core/src/main/java/org/apache/jackrabbit/oak/security/authorization/permission/CompiledPermissionImpl.java
 (original)
+++ 
jackrabbit/oak/branches/1.8/oak-core/src/main/java/org/apache/jackrabbit/oak/security/authorization/permission/CompiledPermissionImpl.java
 Wed Nov  7 13:57:55 2018
@@ -26,10 +26,6 @@ import java.util.Iterator;
 import java.util.List;
 import java.util.Map;
 import java.util.Set;
-import javax.annotation.CheckForNull;
-import javax.annotation.Nonnull;
-import javax.annotation.Nullable;
-
 import com.google.common.collect.ImmutableMap;
 import org.apache.jackrabbit.JcrConstants;
 import org.apache.jackrabbit.commons.iterator.AbstractLazyIterator;
@@ -54,6 +50,8 @@ import org.apache.jackrabbit.oak.spi.sec
 import org.apache.jackrabbit.oak.spi.security.privilege.PrivilegeBitsProvider;
 import org.apache.jackrabbit.oak.spi.security.privilege.PrivilegeConstants;
 import org.apache.jackrabbit.oak.spi.state.NodeState;
+import org.jetbrains.annotations.NotNull;
+import org.jetbrains.annotations.Nullable;
 
 import org.slf4j.Logger;
 import org.slf4j.LoggerFactory;
@@ -83,13 +81,13 @@ final class CompiledPermissionImpl imple
     private ReadOnlyVersionManager versionManager;
     private PrivilegeBitsProvider bitsProvider;
 
-    private CompiledPermissionImpl(@Nonnull Set<Principal> principals,
-                                   @Nonnull Root root,
-                                   @Nonnull String workspaceName,
-                                   @Nonnull PermissionStore store,
-                                   @Nonnull RestrictionProvider 
restrictionProvider,
-                                   @Nonnull ConfigurationParameters options,
-                                   @Nonnull Context ctx) {
+    private CompiledPermissionImpl(@NotNull Set<Principal> principals,
+                                   @NotNull Root root,
+                                   @NotNull String workspaceName,
+                                   @NotNull PermissionStore store,
+                                   @NotNull RestrictionProvider 
restrictionProvider,
+                                   @NotNull ConfigurationParameters options,
+                                   @NotNull Context ctx) {
         this.root = root;
         this.workspaceName = workspaceName;
 
@@ -117,13 +115,13 @@ final class CompiledPermissionImpl imple
         typeProvider = new TreeTypeProvider(ctx);
     }
 
-    static CompiledPermissions create(@Nonnull Root root,
-                                      @Nonnull String workspaceName,
-                                      @Nonnull PermissionStore store,
-                                      @Nonnull Set<Principal> principals,
-                                      @Nonnull RestrictionProvider 
restrictionProvider,
-                                      @Nonnull ConfigurationParameters options,
-                                      @Nonnull Context ctx) {
+    static CompiledPermissions create(@NotNull Root root,
+                                      @NotNull String workspaceName,
+                                      @NotNull PermissionStore store,
+                                      @NotNull Set<Principal> principals,
+                                      @NotNull RestrictionProvider 
restrictionProvider,
+                                      @NotNull ConfigurationParameters options,
+                                      @NotNull Context ctx) {
         Tree permissionsTree = PermissionUtil.getPermissionsRoot(root, 
workspaceName);
         if (!permissionsTree.exists() || principals.isEmpty()) {
             return NoPermissions.getInstance();
@@ -134,7 +132,7 @@ final class CompiledPermissionImpl imple
 
     //------------------------------------------------< CompiledPermissions 
>---
     @Override
-    public void refresh(@Nonnull Root root, @Nonnull String workspaceName) {
+    public void refresh(@NotNull Root root, @NotNull String workspaceName) {
         this.root = root;
         this.bitsProvider = new PrivilegeBitsProvider(root);
         this.versionManager = null;
@@ -144,7 +142,7 @@ final class CompiledPermissionImpl imple
         groupStore.flush();
     }
 
-    @Nonnull
+    @NotNull
     @Override
     public RepositoryPermission getRepositoryPermission() {
         return new RepositoryPermission() {
@@ -156,15 +154,15 @@ final class CompiledPermissionImpl imple
         };
     }
 
-    @Nonnull
+    @NotNull
     @Override
-    public TreePermission getTreePermission(@Nonnull Tree tree, @Nonnull 
TreePermission parentPermission) {
+    public TreePermission getTreePermission(@NotNull Tree tree, @NotNull 
TreePermission parentPermission) {
         return getTreePermission(tree, typeProvider.getType(tree, 
getParentType(parentPermission)), parentPermission);
     }
 
-    @Nonnull
+    @NotNull
     @Override
-    public TreePermission getTreePermission(@Nonnull Tree tree, @Nonnull 
TreeType type, @Nonnull TreePermission parentPermission) {
+    public TreePermission getTreePermission(@NotNull Tree tree, @NotNull 
TreeType type, @NotNull TreePermission parentPermission) {
         if (tree.isRoot()) {
             return createRootPermission(tree);
         }
@@ -210,8 +208,8 @@ final class CompiledPermissionImpl imple
         }
     }
 
-    @Nonnull
-    private TreePermission buildVersionDelegatee(@Nonnull Tree 
versionableTree) {
+    @NotNull
+    private TreePermission buildVersionDelegatee(@NotNull Tree 
versionableTree) {
         if (!versionableTree.exists()) {
             return TreePermission.EMPTY;
         } else if (versionableTree.isRoot()) {
@@ -227,8 +225,8 @@ final class CompiledPermissionImpl imple
         }
     }
 
-    @Nonnull
-    private TreePermission buildParentPermission(@Nonnull Tree tree) {
+    @NotNull
+    private TreePermission buildParentPermission(@NotNull Tree tree) {
         List<Tree> trees = new ArrayList<Tree>();
         while (!tree.isRoot()) {
             tree = tree.getParent();
@@ -244,7 +242,7 @@ final class CompiledPermissionImpl imple
     }
 
     @Override
-    public boolean isGranted(@Nonnull Tree tree, @Nullable PropertyState 
property, long permissions) {
+    public boolean isGranted(@NotNull Tree tree, @Nullable PropertyState 
property, long permissions) {
         TreeType type = typeProvider.getType(tree);
         switch (type) {
             case HIDDEN:
@@ -274,31 +272,31 @@ final class CompiledPermissionImpl imple
     }
 
     @Override
-    public boolean isGranted(@Nonnull String path, long permissions) {
+    public boolean isGranted(@NotNull String path, long permissions) {
         EntryPredicate predicate = new EntryPredicate(path, 
Permissions.respectParentPermissions(permissions));
         return hasPermissions(getEntryIterator(predicate), predicate, 
permissions, path);
     }
 
-    @Nonnull
+    @NotNull
     @Override
     public Set<String> getPrivileges(@Nullable Tree tree) {
         return bitsProvider.getPrivilegeNames(internalGetPrivileges(tree));
     }
 
     @Override
-    public boolean hasPrivileges(@Nullable Tree tree, @Nonnull String... 
privilegeNames) {
+    public boolean hasPrivileges(@Nullable Tree tree, @NotNull String... 
privilegeNames) {
         return 
internalGetPrivileges(tree).includes(bitsProvider.getBits(privilegeNames));
     }
 
     //------------------------------------------------------------< private 
>---
 
-    private boolean internalIsGranted(@Nonnull Tree tree, @Nullable 
PropertyState property, long permissions) {
+    private boolean internalIsGranted(@NotNull Tree tree, @Nullable 
PropertyState property, long permissions) {
         EntryPredicate predicate = new EntryPredicate(tree, property, 
Permissions.respectParentPermissions(permissions));
         return hasPermissions(getEntryIterator(predicate), predicate, 
permissions, tree.getPath());
     }
 
-    private boolean hasPermissions(@Nonnull Iterator<PermissionEntry> entries,
-                                   @Nonnull EntryPredicate predicate,
+    private boolean hasPermissions(@NotNull Iterator<PermissionEntry> entries,
+                                   @NotNull EntryPredicate predicate,
                                    long permissions, @Nullable String path) {
         // calculate readable paths if the given permissions includes any read 
permission.
         boolean isReadable = Permissions.diff(Permissions.READ, permissions) 
!= Permissions.READ && readPolicy.isReadablePath(path, false);
@@ -367,7 +365,7 @@ final class CompiledPermissionImpl imple
         return (allows | ~permissions) == -1;
     }
 
-    @Nonnull
+    @NotNull
     private PrivilegeBits internalGetPrivileges(@Nullable Tree tree) {
         TreeType type = (tree == null) ? TreeType.DEFAULT : 
typeProvider.getType(tree);
         switch (type) {
@@ -388,7 +386,7 @@ final class CompiledPermissionImpl imple
         }
     }
 
-    @Nonnull
+    @NotNull
     private PrivilegeBits getPrivilegeBits(@Nullable Tree tree) {
         EntryPredicate pred = (tree == null)
                 ? new EntryPredicate()
@@ -414,15 +412,15 @@ final class CompiledPermissionImpl imple
         return allowBits;
     }
 
-    @Nonnull
-    private Iterator<PermissionEntry> getEntryIterator(@Nonnull EntryPredicate 
predicate) {
+    @NotNull
+    private Iterator<PermissionEntry> getEntryIterator(@NotNull EntryPredicate 
predicate) {
         Iterator<PermissionEntry> userEntries = 
userStore.getEntryIterator(predicate);
         Iterator<PermissionEntry> groupEntries = 
groupStore.getEntryIterator(predicate);
         return concat(userEntries, groupEntries);
     }
 
-    @CheckForNull
-    private Tree getEvaluationTree(@Nonnull Tree versionStoreTree) {
+    @Nullable
+    private Tree getEvaluationTree(@NotNull Tree versionStoreTree) {
         if (ReadOnlyVersionManager.isVersionStoreTree(versionStoreTree)) {
             return versionStoreTree;
         } else {
@@ -430,7 +428,7 @@ final class CompiledPermissionImpl imple
         }
     }
 
-    @Nonnull
+    @NotNull
     private ReadOnlyVersionManager getVersionManager() {
         if (versionManager == null) {
             versionManager = ReadOnlyVersionManager.getInstance(root, 
NamePathMapper.DEFAULT);
@@ -438,7 +436,7 @@ final class CompiledPermissionImpl imple
         return versionManager;
     }
 
-    private static TreeType getParentType(@Nonnull TreePermission 
parentPermission) {
+    private static TreeType getParentType(@NotNull TreePermission 
parentPermission) {
         if (parentPermission instanceof TreePermissionImpl) {
             return ((TreePermissionImpl) parentPermission).type;
         } else if (parentPermission == TreePermission.EMPTY) {
@@ -452,7 +450,7 @@ final class CompiledPermissionImpl imple
         }
     }
 
-    private TreePermissionImpl createRootPermission(@Nonnull Tree rootTree) {
+    private TreePermissionImpl createRootPermission(@NotNull Tree rootTree) {
         return new TreePermissionImpl(rootTree, TreeType.DEFAULT, EMPTY);
     }
 
@@ -482,9 +480,9 @@ final class CompiledPermissionImpl imple
         }
 
         //-------------------------------------------------< TreePermission 
>---
-        @Nonnull
+        @NotNull
         @Override
-        public TreePermission getChildPermission(@Nonnull String childName, 
@Nonnull NodeState childState) {
+        public TreePermission getChildPermission(@NotNull String childName, 
@NotNull NodeState childState) {
             Tree childTree = new ImmutableTree((ImmutableTree) tree, 
childName, childState);
             return getTreePermission(childTree, 
typeProvider.getType(childTree, type), this);
         }
@@ -517,7 +515,7 @@ final class CompiledPermissionImpl imple
         }
 
         @Override
-        public boolean canRead(@Nonnull PropertyState property) {
+        public boolean canRead(@NotNull PropertyState property) {
             boolean isAcTree = isAcTree();
             if (!isAcTree && isReadableTree) {
                 return true;
@@ -555,7 +553,7 @@ final class CompiledPermissionImpl imple
         }
 
         @Override
-        public boolean isGranted(long permissions, @Nonnull PropertyState 
property) {
+        public boolean isGranted(long permissions, @NotNull PropertyState 
property) {
             EntryPredicate predicate = new EntryPredicate(tree, property, 
Permissions.respectParentPermissions(permissions));
             Iterator<PermissionEntry> it = concat(new LazyIterator(this, true, 
predicate), new LazyIterator(this, false, predicate));
             return hasPermissions(it, predicate, permissions, tree.getPath());
@@ -598,7 +596,7 @@ final class CompiledPermissionImpl imple
 
         private TreePermissionImpl tp;
 
-        private LazyIterator(@Nonnull TreePermissionImpl treePermission, 
boolean isUser, @Nonnull EntryPredicate predicate) {
+        private LazyIterator(@NotNull TreePermissionImpl treePermission, 
boolean isUser, @NotNull EntryPredicate predicate) {
             this.treePermission = treePermission;
             this.isUser = isUser;
             this.predicate = predicate;
@@ -631,8 +629,8 @@ final class CompiledPermissionImpl imple
 
     private interface ReadPolicy {
 
-        boolean isReadableTree(@Nonnull Tree tree, @Nullable 
TreePermissionImpl parent);
-        boolean isReadableTree(@Nonnull Tree tree, boolean exactMatch);
+        boolean isReadableTree(@NotNull Tree tree, @Nullable 
TreePermissionImpl parent);
+        boolean isReadableTree(@NotNull Tree tree, boolean exactMatch);
         boolean isReadablePath(@Nullable String treePath, boolean exactMatch);
     }
 
@@ -643,12 +641,12 @@ final class CompiledPermissionImpl imple
         private EmptyReadPolicy() {}
 
         @Override
-        public boolean isReadableTree(@Nonnull Tree tree, @Nullable 
TreePermissionImpl parent) {
+        public boolean isReadableTree(@NotNull Tree tree, @Nullable 
TreePermissionImpl parent) {
             return false;
         }
 
         @Override
-        public boolean isReadableTree(@Nonnull Tree tree, boolean exactMatch) {
+        public boolean isReadableTree(@NotNull Tree tree, boolean exactMatch) {
             return false;
         }
 
@@ -677,7 +675,7 @@ final class CompiledPermissionImpl imple
         }
 
         @Override
-        public boolean isReadableTree(@Nonnull Tree tree, @Nullable 
TreePermissionImpl parent) {
+        public boolean isReadableTree(@NotNull Tree tree, @Nullable 
TreePermissionImpl parent) {
             if (parent != null) {
                 if (parent.isReadableTree) {
                     return true;
@@ -692,7 +690,7 @@ final class CompiledPermissionImpl imple
         }
 
         @Override
-        public boolean isReadableTree(@Nonnull Tree tree, boolean exactMatch) {
+        public boolean isReadableTree(@NotNull Tree tree, boolean exactMatch) {
             String targetPath = tree.getPath();
             for (String path : readPaths) {
                 if (targetPath.equals(path)) {

Modified: 
jackrabbit/oak/branches/1.8/oak-core/src/main/java/org/apache/jackrabbit/oak/security/authorization/permission/CompiledPermissions.java
URL: 
http://svn.apache.org/viewvc/jackrabbit/oak/branches/1.8/oak-core/src/main/java/org/apache/jackrabbit/oak/security/authorization/permission/CompiledPermissions.java?rev=1846014&r1=1846013&r2=1846014&view=diff
==============================================================================
--- 
jackrabbit/oak/branches/1.8/oak-core/src/main/java/org/apache/jackrabbit/oak/security/authorization/permission/CompiledPermissions.java
 (original)
+++ 
jackrabbit/oak/branches/1.8/oak-core/src/main/java/org/apache/jackrabbit/oak/security/authorization/permission/CompiledPermissions.java
 Wed Nov  7 13:57:55 2018
@@ -17,15 +17,14 @@
 package org.apache.jackrabbit.oak.security.authorization.permission;
 
 import java.util.Set;
-import javax.annotation.Nonnull;
-import javax.annotation.Nullable;
-
 import org.apache.jackrabbit.oak.api.PropertyState;
 import org.apache.jackrabbit.oak.api.Root;
 import org.apache.jackrabbit.oak.api.Tree;
 import org.apache.jackrabbit.oak.plugins.tree.TreeType;
 import 
org.apache.jackrabbit.oak.spi.security.authorization.permission.RepositoryPermission;
 import 
org.apache.jackrabbit.oak.spi.security.authorization.permission.TreePermission;
+import org.jetbrains.annotations.NotNull;
+import org.jetbrains.annotations.Nullable;
 
 /**
  * Internal interface to process methods defined by
@@ -45,7 +44,7 @@ interface CompiledPermissions {
      * @param workspaceName The workspace name.
      * @see {@link 
org.apache.jackrabbit.oak.spi.security.authorization.permission.PermissionProvider#refresh()}
      */
-    void refresh(@Nonnull Root root, @Nonnull String workspaceName);
+    void refresh(@NotNull Root root, @NotNull String workspaceName);
 
     /**
      * Returns the {@link 
org.apache.jackrabbit.oak.spi.security.authorization.permission.RepositoryPermission}
@@ -54,7 +53,7 @@ interface CompiledPermissions {
      * @return an instance of {@code RepositoryPermission}.
      * @see {@link 
org.apache.jackrabbit.oak.spi.security.authorization.permission.PermissionProvider#getRepositoryPermission()}
      */
-    @Nonnull
+    @NotNull
     RepositoryPermission getRepositoryPermission();
 
     /**
@@ -66,8 +65,8 @@ interface CompiledPermissions {
      * @return The permissions for the specified tree.
      * @see {@link 
org.apache.jackrabbit.oak.spi.security.authorization.permission.TreePermission#getChildPermission(String,
 org.apache.jackrabbit.oak.spi.state.NodeState)}
      */
-    @Nonnull
-    TreePermission getTreePermission(@Nonnull Tree tree, @Nonnull 
TreePermission parentPermission);
+    @NotNull
+    TreePermission getTreePermission(@NotNull Tree tree, @NotNull 
TreePermission parentPermission);
 
     /**
      * Returns the tree permissions for the specified {@code tree}.
@@ -78,8 +77,8 @@ interface CompiledPermissions {
      * @return The permissions for the specified tree.
      * @see {@link 
org.apache.jackrabbit.oak.spi.security.authorization.permission.TreePermission#getChildPermission(String,
 org.apache.jackrabbit.oak.spi.state.NodeState)}
      */
-    @Nonnull
-    TreePermission getTreePermission(@Nonnull Tree tree, @Nonnull TreeType 
type, @Nonnull TreePermission parentPermission);
+    @NotNull
+    TreePermission getTreePermission(@NotNull Tree tree, @NotNull TreeType 
type, @NotNull TreePermission parentPermission);
 
     /**
      * Returns {@code true} if the given {@code permissions} are granted on the
@@ -92,7 +91,7 @@ interface CompiledPermissions {
      * @return {@code true} if granted.
      * @see {@link 
org.apache.jackrabbit.oak.spi.security.authorization.permission.PermissionProvider#isGranted(org.apache.jackrabbit.oak.api.Tree,
 org.apache.jackrabbit.oak.api.PropertyState, long)}
      */
-    boolean isGranted(@Nonnull Tree tree, @Nullable PropertyState property, 
long permissions);
+    boolean isGranted(@NotNull Tree tree, @Nullable PropertyState property, 
long permissions);
 
     /**
      * Returns {@code true} if the given {@code permissions} are granted on the
@@ -103,7 +102,7 @@ interface CompiledPermissions {
      * @return {@code true} if granted.
      * @see {@link 
org.apache.jackrabbit.oak.spi.security.authorization.permission.PermissionProvider#isGranted(String,
 String)}
      */
-    boolean isGranted(@Nonnull String path, long permissions);
+    boolean isGranted(@NotNull String path, long permissions);
 
     /**
      * Retrieve the privileges granted at the specified {@code tree}.
@@ -113,7 +112,7 @@ interface CompiledPermissions {
      * @return the set of privileges or an empty set if no privileges are 
granted.
      * @see {@link 
org.apache.jackrabbit.oak.spi.security.authorization.permission.PermissionProvider#getPrivileges(org.apache.jackrabbit.oak.api.Tree)}
      */
-    @Nonnull
+    @NotNull
     Set<String> getPrivileges(@Nullable Tree tree);
 
     /**
@@ -125,5 +124,5 @@ interface CompiledPermissions {
      * @param privilegeNames The privilege names to be tested.
      * @return {@code true} if the tree has privileges
      */
-    boolean hasPrivileges(@Nullable Tree tree, @Nonnull String... 
privilegeNames);
+    boolean hasPrivileges(@Nullable Tree tree, @NotNull String... 
privilegeNames);
 }

Modified: 
jackrabbit/oak/branches/1.8/oak-core/src/main/java/org/apache/jackrabbit/oak/security/authorization/permission/EntryPredicate.java
URL: 
http://svn.apache.org/viewvc/jackrabbit/oak/branches/1.8/oak-core/src/main/java/org/apache/jackrabbit/oak/security/authorization/permission/EntryPredicate.java?rev=1846014&r1=1846013&r2=1846014&view=diff
==============================================================================
--- 
jackrabbit/oak/branches/1.8/oak-core/src/main/java/org/apache/jackrabbit/oak/security/authorization/permission/EntryPredicate.java
 (original)
+++ 
jackrabbit/oak/branches/1.8/oak-core/src/main/java/org/apache/jackrabbit/oak/security/authorization/permission/EntryPredicate.java
 Wed Nov  7 13:57:55 2018
@@ -16,14 +16,12 @@
  */
 package org.apache.jackrabbit.oak.security.authorization.permission;
 
-import javax.annotation.CheckForNull;
-import javax.annotation.Nonnull;
-import javax.annotation.Nullable;
-
 import com.google.common.base.Predicate;
 import org.apache.jackrabbit.oak.api.PropertyState;
 import org.apache.jackrabbit.oak.api.Tree;
 import org.apache.jackrabbit.oak.commons.PathUtils;
+import org.jetbrains.annotations.NotNull;
+import org.jetbrains.annotations.Nullable;
 
 /**
  * Predicate used to evaluation if a given {@code PermissionEntry} matches
@@ -43,11 +41,11 @@ final class EntryPredicate implements Pr
         this(null, null, null, false);
     }
 
-    EntryPredicate(@Nonnull Tree tree, @Nullable PropertyState property, 
boolean respectParent) {
+    EntryPredicate(@NotNull Tree tree, @Nullable PropertyState property, 
boolean respectParent) {
         this(tree, property, tree.getPath(), respectParent);
     }
 
-    EntryPredicate(@Nonnull String path, boolean respectParent) {
+    EntryPredicate(@NotNull String path, boolean respectParent) {
         this(null, null, path, respectParent);
     }
 
@@ -67,7 +65,7 @@ final class EntryPredicate implements Pr
         this.respectParent = parent != null || parentPath != null;
     }
 
-    @CheckForNull
+    @Nullable
     String getPath() {
         return path;
     }
@@ -92,4 +90,4 @@ final class EntryPredicate implements Pr
             return entry.matches();
         }
     }
-}
\ No newline at end of file
+}

Modified: 
jackrabbit/oak/branches/1.8/oak-core/src/main/java/org/apache/jackrabbit/oak/security/authorization/permission/MountPermissionProvider.java
URL: 
http://svn.apache.org/viewvc/jackrabbit/oak/branches/1.8/oak-core/src/main/java/org/apache/jackrabbit/oak/security/authorization/permission/MountPermissionProvider.java?rev=1846014&r1=1846013&r2=1846014&view=diff
==============================================================================
--- 
jackrabbit/oak/branches/1.8/oak-core/src/main/java/org/apache/jackrabbit/oak/security/authorization/permission/MountPermissionProvider.java
 (original)
+++ 
jackrabbit/oak/branches/1.8/oak-core/src/main/java/org/apache/jackrabbit/oak/security/authorization/permission/MountPermissionProvider.java
 Wed Nov  7 13:57:55 2018
@@ -23,8 +23,6 @@ import java.util.Collection;
 import java.util.List;
 import java.util.Set;
 
-import javax.annotation.Nonnull;
-
 import org.apache.jackrabbit.oak.api.Root;
 import org.apache.jackrabbit.oak.plugins.tree.RootProvider;
 import org.apache.jackrabbit.oak.spi.mount.Mount;
@@ -32,13 +30,14 @@ import org.apache.jackrabbit.oak.spi.mou
 import org.apache.jackrabbit.oak.spi.security.ConfigurationParameters;
 import org.apache.jackrabbit.oak.spi.security.Context;
 import 
org.apache.jackrabbit.oak.spi.security.authorization.restriction.RestrictionProvider;
+import org.jetbrains.annotations.NotNull;
 
 import com.google.common.collect.ImmutableSet;
 
 public class MountPermissionProvider extends PermissionProviderImpl {
 
-    @Nonnull
-    public static String getPermissionRootName(@Nonnull Mount mount, @Nonnull 
String workspace) {
+    @NotNull
+    public static String getPermissionRootName(@NotNull Mount mount, @NotNull 
String workspace) {
         if (mount.isDefault()) {
             return workspace;
         } else {
@@ -48,11 +47,11 @@ public class MountPermissionProvider ext
 
     private final MountInfoProvider mountInfoProvider;
 
-    public MountPermissionProvider(@Nonnull Root root, @Nonnull String 
workspaceName,
-                                   @Nonnull Set<Principal> principals, 
@Nonnull RestrictionProvider restrictionProvider,
-                                   @Nonnull ConfigurationParameters options, 
@Nonnull Context ctx,
-                                   @Nonnull MountInfoProvider 
mountInfoProvider,
-                                   @Nonnull RootProvider rootProvider) {
+    public MountPermissionProvider(@NotNull Root root, @NotNull String 
workspaceName,
+                                   @NotNull Set<Principal> principals, 
@NotNull RestrictionProvider restrictionProvider,
+                                   @NotNull ConfigurationParameters options, 
@NotNull Context ctx,
+                                   @NotNull MountInfoProvider 
mountInfoProvider,
+                                   @NotNull RootProvider rootProvider) {
         super(root, workspaceName, principals, restrictionProvider, options, 
ctx, rootProvider);
         this.mountInfoProvider = mountInfoProvider;
     }

Modified: 
jackrabbit/oak/branches/1.8/oak-core/src/main/java/org/apache/jackrabbit/oak/security/authorization/permission/MoveAwarePermissionValidator.java
URL: 
http://svn.apache.org/viewvc/jackrabbit/oak/branches/1.8/oak-core/src/main/java/org/apache/jackrabbit/oak/security/authorization/permission/MoveAwarePermissionValidator.java?rev=1846014&r1=1846013&r2=1846014&view=diff
==============================================================================
--- 
jackrabbit/oak/branches/1.8/oak-core/src/main/java/org/apache/jackrabbit/oak/security/authorization/permission/MoveAwarePermissionValidator.java
 (original)
+++ 
jackrabbit/oak/branches/1.8/oak-core/src/main/java/org/apache/jackrabbit/oak/security/authorization/permission/MoveAwarePermissionValidator.java
 Wed Nov  7 13:57:55 2018
@@ -16,10 +16,6 @@
  */
 package org.apache.jackrabbit.oak.security.authorization.permission;
 
-import javax.annotation.CheckForNull;
-import javax.annotation.Nonnull;
-import javax.annotation.Nullable;
-
 import org.apache.jackrabbit.oak.api.CommitFailedException;
 import org.apache.jackrabbit.oak.api.Root;
 import org.apache.jackrabbit.oak.api.Tree;
@@ -33,6 +29,8 @@ import org.apache.jackrabbit.oak.spi.sec
 import 
org.apache.jackrabbit.oak.spi.security.authorization.permission.Permissions;
 import 
org.apache.jackrabbit.oak.spi.security.authorization.permission.TreePermission;
 import org.apache.jackrabbit.oak.spi.state.NodeState;
+import org.jetbrains.annotations.NotNull;
+import org.jetbrains.annotations.Nullable;
 
 import static org.apache.jackrabbit.oak.api.CommitFailedException.ACCESS;
 
@@ -40,31 +38,31 @@ public class MoveAwarePermissionValidato
 
     private final MoveContext moveCtx;
 
-    MoveAwarePermissionValidator(@Nonnull NodeState rootBefore,
-                                 @Nonnull NodeState rootAfter,
-                                 @Nonnull PermissionProvider 
permissionProvider,
-                                 @Nonnull PermissionValidatorProvider provider,
-                                 @Nonnull MoveTracker moveTracker) {
+    MoveAwarePermissionValidator(@NotNull NodeState rootBefore,
+                                 @NotNull NodeState rootAfter,
+                                 @NotNull PermissionProvider 
permissionProvider,
+                                 @NotNull PermissionValidatorProvider provider,
+                                 @NotNull MoveTracker moveTracker) {
         super(rootBefore, rootAfter, permissionProvider, provider);
         moveCtx = new MoveContext(moveTracker, 
provider.createReadOnlyRoot(rootBefore), 
provider.createReadOnlyRoot(rootAfter));
     }
 
     private MoveAwarePermissionValidator(@Nullable Tree parentBefore,
                                          @Nullable Tree parentAfter,
-                                         @Nonnull TreePermission 
parentPermission,
-                                         @Nonnull PermissionValidator 
parentValidator) {
+                                         @NotNull TreePermission 
parentPermission,
+                                         @NotNull PermissionValidator 
parentValidator) {
         super(parentBefore, parentAfter, parentPermission, parentValidator);
 
         MoveAwarePermissionValidator pv = (MoveAwarePermissionValidator) 
parentValidator;
         moveCtx = pv.moveCtx;
     }
 
-    @Nonnull
+    @NotNull
     @Override
     PermissionValidator createValidator(@Nullable Tree parentBefore,
                                         @Nullable Tree parentAfter,
-                                        @Nonnull TreePermission 
parentPermission,
-                                        @Nonnull PermissionValidator 
parentValidator) {
+                                        @NotNull TreePermission 
parentPermission,
+                                        @NotNull PermissionValidator 
parentValidator) {
         if (moveCtx.containsMove(parentBefore, parentAfter)) {
             return new MoveAwarePermissionValidator(parentBefore, parentAfter, 
parentPermission, parentValidator);
         } else {
@@ -72,8 +70,8 @@ public class MoveAwarePermissionValidato
         }
     }
 
-    private Validator visibleValidator(@Nonnull Tree source,
-                                       @Nonnull Tree dest) {
+    private Validator visibleValidator(@NotNull Tree source,
+                                       @NotNull Tree dest) {
         // TODO improve: avoid calculating the 'before' permissions in case 
the current parent permissions already point to the correct tree.
         ImmutableTree immutableTree = (ImmutableTree) 
moveCtx.rootBefore.getTree("/");
         TreePermission tp = 
getPermissionProvider().getTreePermission(immutableTree
@@ -113,9 +111,9 @@ public class MoveAwarePermissionValidato
         private final Root rootBefore;
         private final Root rootAfter;
 
-        private MoveContext(@Nonnull MoveTracker moveTracker,
-                            @Nonnull Root before,
-                            @Nonnull Root after) {
+        private MoveContext(@NotNull MoveTracker moveTracker,
+                            @NotNull Root before,
+                            @NotNull Root after) {
             this.moveTracker = moveTracker;
             rootBefore = before;
             rootAfter = after;
@@ -125,7 +123,7 @@ public class MoveAwarePermissionValidato
             return 
moveTracker.containsMove(PermissionUtil.getPath(parentBefore, parentAfter));
         }
 
-        private boolean processAdd(@CheckForNull Tree parent, @Nonnull String 
name , @Nonnull MoveAwarePermissionValidator validator) throws 
CommitFailedException {
+        private boolean processAdd(@Nullable Tree parent, @NotNull String name 
, @NotNull MoveAwarePermissionValidator validator) throws CommitFailedException 
{
             if (parent == null) {
                 return false;
             }
@@ -143,7 +141,7 @@ public class MoveAwarePermissionValidato
             return false;
         }
 
-        private boolean processDelete(@CheckForNull Tree parent, @Nonnull 
String name, @Nonnull MoveAwarePermissionValidator validator) throws 
CommitFailedException {
+        private boolean processDelete(@Nullable Tree parent, @NotNull String 
name, @NotNull MoveAwarePermissionValidator validator) throws 
CommitFailedException {
             if (parent == null) {
                 return false;
             }
@@ -162,8 +160,8 @@ public class MoveAwarePermissionValidato
             return false;
         }
 
-        private boolean diff(@Nonnull ImmutableTree source, @Nonnull 
ImmutableTree dest,
-                             @Nonnull MoveAwarePermissionValidator validator) 
throws CommitFailedException {
+        private boolean diff(@NotNull ImmutableTree source, @NotNull 
ImmutableTree dest,
+                             @NotNull MoveAwarePermissionValidator validator) 
throws CommitFailedException {
             Validator nextValidator = validator.visibleValidator(source, dest);
             CommitFailedException e = EditorDiff.process(nextValidator , 
source.getNodeState(), dest.getNodeState());
             if (e != null) {
@@ -172,10 +170,10 @@ public class MoveAwarePermissionValidato
             return true;
         }
 
-        private void checkPermissions(@Nonnull Tree tree, long permissions) 
throws CommitFailedException {
+        private void checkPermissions(@NotNull Tree tree, long permissions) 
throws CommitFailedException {
             if (!getPermissionProvider().isGranted(tree, null, permissions)) {
                 throw new CommitFailedException(ACCESS, 0, "Access denied");
             }
         }
     }
-}
\ No newline at end of file
+}

Modified: 
jackrabbit/oak/branches/1.8/oak-core/src/main/java/org/apache/jackrabbit/oak/security/authorization/permission/NoPermissions.java
URL: 
http://svn.apache.org/viewvc/jackrabbit/oak/branches/1.8/oak-core/src/main/java/org/apache/jackrabbit/oak/security/authorization/permission/NoPermissions.java?rev=1846014&r1=1846013&r2=1846014&view=diff
==============================================================================
--- 
jackrabbit/oak/branches/1.8/oak-core/src/main/java/org/apache/jackrabbit/oak/security/authorization/permission/NoPermissions.java
 (original)
+++ 
jackrabbit/oak/branches/1.8/oak-core/src/main/java/org/apache/jackrabbit/oak/security/authorization/permission/NoPermissions.java
 Wed Nov  7 13:57:55 2018
@@ -18,15 +18,14 @@ package org.apache.jackrabbit.oak.securi
 
 import java.util.Collections;
 import java.util.Set;
-import javax.annotation.Nonnull;
-import javax.annotation.Nullable;
-
 import org.apache.jackrabbit.oak.api.PropertyState;
 import org.apache.jackrabbit.oak.api.Root;
 import org.apache.jackrabbit.oak.api.Tree;
 import org.apache.jackrabbit.oak.plugins.tree.TreeType;
 import 
org.apache.jackrabbit.oak.spi.security.authorization.permission.RepositoryPermission;
 import 
org.apache.jackrabbit.oak.spi.security.authorization.permission.TreePermission;
+import org.jetbrains.annotations.NotNull;
+import org.jetbrains.annotations.Nullable;
 
 /**
  * Implementation of the {@code CompiledPermission} interface that denies all 
permissions.
@@ -43,46 +42,46 @@ final class NoPermissions implements Com
     }
 
     @Override
-    public void refresh(@Nonnull Root root, @Nonnull String workspaceName) {
+    public void refresh(@NotNull Root root, @NotNull String workspaceName) {
         // nop
     }
 
-    @Nonnull
+    @NotNull
     @Override
     public RepositoryPermission getRepositoryPermission() {
         return RepositoryPermission.EMPTY;
     }
 
-    @Nonnull
+    @NotNull
     @Override
-    public TreePermission getTreePermission(@Nonnull Tree tree, @Nonnull 
TreePermission parentPermission) {
+    public TreePermission getTreePermission(@NotNull Tree tree, @NotNull 
TreePermission parentPermission) {
         return TreePermission.EMPTY;
     }
 
-    @Nonnull
+    @NotNull
     @Override
-    public TreePermission getTreePermission(@Nonnull Tree tree, @Nonnull 
TreeType type, @Nonnull TreePermission parentPermission) {
+    public TreePermission getTreePermission(@NotNull Tree tree, @NotNull 
TreeType type, @NotNull TreePermission parentPermission) {
         return TreePermission.EMPTY;
     }
 
     @Override
-    public boolean isGranted(@Nonnull Tree tree, @Nullable PropertyState 
property, long permissions) {
+    public boolean isGranted(@NotNull Tree tree, @Nullable PropertyState 
property, long permissions) {
         return false;
     }
 
     @Override
-    public boolean isGranted(@Nonnull String path, long permissions) {
+    public boolean isGranted(@NotNull String path, long permissions) {
         return false;
     }
 
-    @Nonnull
+    @NotNull
     @Override
     public Set<String> getPrivileges(@Nullable Tree tree) {
         return Collections.emptySet();
     }
 
     @Override
-    public boolean hasPrivileges(@Nullable Tree tree, @Nonnull String... 
privilegeNames) {
+    public boolean hasPrivileges(@Nullable Tree tree, @NotNull String... 
privilegeNames) {
         return false;
     }
 }


Reply via email to