Modified: jackrabbit/oak/branches/1.8/oak-core/src/main/java/org/apache/jackrabbit/oak/query/ExecutionContext.java URL: http://svn.apache.org/viewvc/jackrabbit/oak/branches/1.8/oak-core/src/main/java/org/apache/jackrabbit/oak/query/ExecutionContext.java?rev=1846014&r1=1846013&r2=1846014&view=diff ============================================================================== --- jackrabbit/oak/branches/1.8/oak-core/src/main/java/org/apache/jackrabbit/oak/query/ExecutionContext.java (original) +++ jackrabbit/oak/branches/1.8/oak-core/src/main/java/org/apache/jackrabbit/oak/query/ExecutionContext.java Wed Nov 7 13:57:55 2018 @@ -19,14 +19,13 @@ package org.apache.jackrabbit.oak.query; -import javax.annotation.CheckForNull; -import javax.annotation.Nonnull; - import org.apache.jackrabbit.oak.api.Root; import org.apache.jackrabbit.oak.query.ast.NodeTypeInfoProvider; import org.apache.jackrabbit.oak.spi.query.QueryIndexProvider; import org.apache.jackrabbit.oak.spi.security.authorization.permission.PermissionProvider; import org.apache.jackrabbit.oak.spi.state.NodeState; +import org.jetbrains.annotations.NotNull; +import org.jetbrains.annotations.Nullable; /** * An instance of this class provides the context for the execution of a query, @@ -65,7 +64,7 @@ public class ExecutionContext { * * @return base state of the content tree against which the query runs. */ - @Nonnull + @NotNull public NodeState getBaseState() { return baseState; } @@ -85,7 +84,7 @@ public class ExecutionContext { * * @return root of the content tree against which the query runs. */ - @Nonnull + @NotNull public Root getRoot() { return root; } @@ -94,7 +93,7 @@ public class ExecutionContext { * @return Index provider for indexes matching the state of the content tree as * returned from {@link #getBaseState()}. */ - @Nonnull + @NotNull public QueryIndexProvider getIndexProvider() { return indexProvider; } @@ -103,7 +102,7 @@ public class ExecutionContext { return settings; } - @CheckForNull + @Nullable public PermissionProvider getPermissionProvider() { return permissionProvider; }
Modified: jackrabbit/oak/branches/1.8/oak-core/src/main/java/org/apache/jackrabbit/oak/query/Query.java URL: http://svn.apache.org/viewvc/jackrabbit/oak/branches/1.8/oak-core/src/main/java/org/apache/jackrabbit/oak/query/Query.java?rev=1846014&r1=1846013&r2=1846014&view=diff ============================================================================== --- jackrabbit/oak/branches/1.8/oak-core/src/main/java/org/apache/jackrabbit/oak/query/Query.java (original) +++ jackrabbit/oak/branches/1.8/oak-core/src/main/java/org/apache/jackrabbit/oak/query/Query.java Wed Nov 7 13:57:55 2018 @@ -16,9 +16,8 @@ package org.apache.jackrabbit.oak.query; import java.util.Iterator; import java.util.List; -import javax.annotation.Nonnull; -import javax.annotation.Nullable; - +import org.jetbrains.annotations.NotNull; +import org.jetbrains.annotations.Nullable; import org.osgi.annotation.versioning.ProviderType; import org.apache.jackrabbit.oak.api.PropertyValue; @@ -139,7 +138,7 @@ public interface Query { * @return {@code this} if no conversions are possible or a new instance of * a {@link Query}. Cannot return null. */ - @Nonnull + @NotNull Query buildAlternativeQuery(); /** Modified: jackrabbit/oak/branches/1.8/oak-core/src/main/java/org/apache/jackrabbit/oak/query/QueryEngineImpl.java URL: http://svn.apache.org/viewvc/jackrabbit/oak/branches/1.8/oak-core/src/main/java/org/apache/jackrabbit/oak/query/QueryEngineImpl.java?rev=1846014&r1=1846013&r2=1846014&view=diff ============================================================================== --- jackrabbit/oak/branches/1.8/oak-core/src/main/java/org/apache/jackrabbit/oak/query/QueryEngineImpl.java (original) +++ jackrabbit/oak/branches/1.8/oak-core/src/main/java/org/apache/jackrabbit/oak/query/QueryEngineImpl.java Wed Nov 7 13:57:55 2018 @@ -27,8 +27,6 @@ import java.util.Map.Entry; import java.util.Set; import java.util.concurrent.atomic.AtomicInteger; -import javax.annotation.Nonnull; - import org.apache.jackrabbit.oak.api.PropertyValue; import org.apache.jackrabbit.oak.api.QueryEngine; import org.apache.jackrabbit.oak.api.Result; @@ -38,6 +36,7 @@ import org.apache.jackrabbit.oak.namepat import org.apache.jackrabbit.oak.query.ast.NodeTypeInfoProvider; import org.apache.jackrabbit.oak.query.stats.QueryStatsData.QueryExecutionStats; import org.apache.jackrabbit.oak.query.xpath.XPathToSQL2Converter; +import org.jetbrains.annotations.NotNull; import org.slf4j.Logger; import org.slf4j.LoggerFactory; import org.slf4j.MDC; @@ -293,8 +292,8 @@ public abstract class QueryEngineImpl im * If there are multiple, the first one is the original, and the second the alternative. * @return the query */ - @Nonnull - private Query prepareAndSelect(@Nonnull List<Query> queries) { + @NotNull + private Query prepareAndSelect(@NotNull List<Query> queries) { Query result = null; if (checkNotNull(queries).size() == 1) { @@ -380,7 +379,7 @@ public abstract class QueryEngineImpl im * * @param querySelectionMode cannot be null */ - protected void setQuerySelectionMode(@Nonnull QuerySelectionMode querySelectionMode) { + protected void setQuerySelectionMode(@NotNull QuerySelectionMode querySelectionMode) { this.querySelectionMode = querySelectionMode; } } Modified: jackrabbit/oak/branches/1.8/oak-core/src/main/java/org/apache/jackrabbit/oak/query/QueryImpl.java URL: http://svn.apache.org/viewvc/jackrabbit/oak/branches/1.8/oak-core/src/main/java/org/apache/jackrabbit/oak/query/QueryImpl.java?rev=1846014&r1=1846013&r2=1846014&view=diff ============================================================================== --- jackrabbit/oak/branches/1.8/oak-core/src/main/java/org/apache/jackrabbit/oak/query/QueryImpl.java (original) +++ jackrabbit/oak/branches/1.8/oak-core/src/main/java/org/apache/jackrabbit/oak/query/QueryImpl.java Wed Nov 7 13:57:55 2018 @@ -29,8 +29,6 @@ import java.util.List; import java.util.Map; import java.util.Set; -import javax.annotation.Nonnull; - import org.apache.jackrabbit.oak.api.PropertyValue; import org.apache.jackrabbit.oak.api.Result.SizePrecision; import org.apache.jackrabbit.oak.api.Tree; @@ -94,6 +92,7 @@ import org.apache.jackrabbit.oak.spi.que import org.apache.jackrabbit.oak.spi.query.QueryIndexProvider; import org.apache.jackrabbit.oak.spi.state.NodeState; import org.apache.jackrabbit.oak.spi.state.NodeStateUtils; +import org.jetbrains.annotations.NotNull; import org.slf4j.Logger; import org.slf4j.LoggerFactory; @@ -1341,7 +1340,7 @@ public class QueryImpl implements Query return result; } - private static String recomposeStatement(@Nonnull QueryImpl query) { + private static String recomposeStatement(@NotNull QueryImpl query) { checkNotNull(query); String original = query.getStatement(); String origUpper = original.toUpperCase(); @@ -1369,7 +1368,7 @@ public class QueryImpl implements Query * @param right the second subquery * @return the union query */ - private UnionQueryImpl newAlternativeUnionQuery(@Nonnull Query left, @Nonnull Query right) { + private UnionQueryImpl newAlternativeUnionQuery(@NotNull Query left, @NotNull Query right) { UnionQueryImpl u = new UnionQueryImpl( false, checkNotNull(left, "`left` cannot be null"), Modified: jackrabbit/oak/branches/1.8/oak-core/src/main/java/org/apache/jackrabbit/oak/query/ValueConverter.java URL: http://svn.apache.org/viewvc/jackrabbit/oak/branches/1.8/oak-core/src/main/java/org/apache/jackrabbit/oak/query/ValueConverter.java?rev=1846014&r1=1846013&r2=1846014&view=diff ============================================================================== --- jackrabbit/oak/branches/1.8/oak-core/src/main/java/org/apache/jackrabbit/oak/query/ValueConverter.java (original) +++ jackrabbit/oak/branches/1.8/oak-core/src/main/java/org/apache/jackrabbit/oak/query/ValueConverter.java Wed Nov 7 13:57:55 2018 @@ -17,9 +17,6 @@ package org.apache.jackrabbit.oak.query; import java.net.URI; -import javax.annotation.CheckForNull; -import javax.annotation.Nonnull; -import javax.annotation.Nullable; import javax.jcr.PropertyType; import org.apache.jackrabbit.oak.api.Blob; @@ -27,6 +24,8 @@ import org.apache.jackrabbit.oak.api.Pro import org.apache.jackrabbit.oak.api.Type; import org.apache.jackrabbit.oak.namepath.NamePathMapper; import org.apache.jackrabbit.oak.plugins.memory.PropertyValues; +import org.jetbrains.annotations.NotNull; +import org.jetbrains.annotations.Nullable; import org.slf4j.Logger; import org.slf4j.LoggerFactory; @@ -88,7 +87,7 @@ public class ValueConverter { * @return the converted value * @throws IllegalArgumentException if mapping is illegal */ - public static PropertyValue convert(@Nonnull PropertyValue value, int targetType, @Nullable NamePathMapper mapper) { + public static PropertyValue convert(@NotNull PropertyValue value, int targetType, @Nullable NamePathMapper mapper) { int sourceType = value.getType().tag(); if (sourceType == targetType) { return value; @@ -191,7 +190,7 @@ public class ValueConverter { PropertyType.nameFromValue(targetType)); } - private static String getOakPath(@Nonnull String jcrPath, @CheckForNull NamePathMapper mapper) { + private static String getOakPath(@NotNull String jcrPath, @Nullable NamePathMapper mapper) { if (mapper == null) { // to simplify testing, a getNamePathMapper isn't required return jcrPath; @@ -203,4 +202,4 @@ public class ValueConverter { } return p; } -} \ No newline at end of file +} Modified: jackrabbit/oak/branches/1.8/oak-core/src/main/java/org/apache/jackrabbit/oak/query/ast/AstElement.java URL: http://svn.apache.org/viewvc/jackrabbit/oak/branches/1.8/oak-core/src/main/java/org/apache/jackrabbit/oak/query/ast/AstElement.java?rev=1846014&r1=1846013&r2=1846014&view=diff ============================================================================== --- jackrabbit/oak/branches/1.8/oak-core/src/main/java/org/apache/jackrabbit/oak/query/ast/AstElement.java (original) +++ jackrabbit/oak/branches/1.8/oak-core/src/main/java/org/apache/jackrabbit/oak/query/ast/AstElement.java Wed Nov 7 13:57:55 2018 @@ -18,12 +18,11 @@ */ package org.apache.jackrabbit.oak.query.ast; -import javax.annotation.Nonnull; - import org.apache.jackrabbit.oak.api.PropertyValue; import org.apache.jackrabbit.oak.commons.PathUtils; import org.apache.jackrabbit.oak.query.QueryImpl; import org.apache.jackrabbit.oak.query.ValueConverter; +import org.jetbrains.annotations.NotNull; /** * The base class for all abstract syntax tree nodes. @@ -152,7 +151,7 @@ abstract class AstElement { * @return a clone of self. Default implementation in {@link AstElement} returns same reference * to {@code this}. */ - @Nonnull + @NotNull public AstElement copyOf() { return this; } Modified: jackrabbit/oak/branches/1.8/oak-core/src/main/java/org/apache/jackrabbit/oak/query/ast/AstElementFactory.java URL: http://svn.apache.org/viewvc/jackrabbit/oak/branches/1.8/oak-core/src/main/java/org/apache/jackrabbit/oak/query/ast/AstElementFactory.java?rev=1846014&r1=1846013&r2=1846014&view=diff ============================================================================== --- jackrabbit/oak/branches/1.8/oak-core/src/main/java/org/apache/jackrabbit/oak/query/ast/AstElementFactory.java (original) +++ jackrabbit/oak/branches/1.8/oak-core/src/main/java/org/apache/jackrabbit/oak/query/ast/AstElementFactory.java Wed Nov 7 13:57:55 2018 @@ -17,10 +17,9 @@ import static com.google.common.base.Pre import java.util.ArrayList; -import javax.annotation.Nonnull; - import org.apache.jackrabbit.oak.api.PropertyValue; import org.apache.jackrabbit.oak.spi.query.QueryConstants; +import org.jetbrains.annotations.NotNull; import org.slf4j.Logger; import org.slf4j.LoggerFactory; @@ -190,8 +189,8 @@ public class AstElementFactory { * @param e the element to be cloned. Cannot be null. * @return same as {@link AstElement#copyOf()} */ - @Nonnull - public static AstElement copyElementAndCheckReference(@Nonnull final AstElement e) { + @NotNull + public static AstElement copyElementAndCheckReference(@NotNull final AstElement e) { AstElement clone = checkNotNull(e).copyOf(); if (clone == e && LOG.isDebugEnabled()) { Modified: jackrabbit/oak/branches/1.8/oak-core/src/main/java/org/apache/jackrabbit/oak/query/ast/ConstraintImpl.java URL: http://svn.apache.org/viewvc/jackrabbit/oak/branches/1.8/oak-core/src/main/java/org/apache/jackrabbit/oak/query/ast/ConstraintImpl.java?rev=1846014&r1=1846013&r2=1846014&view=diff ============================================================================== --- jackrabbit/oak/branches/1.8/oak-core/src/main/java/org/apache/jackrabbit/oak/query/ast/ConstraintImpl.java (original) +++ jackrabbit/oak/branches/1.8/oak-core/src/main/java/org/apache/jackrabbit/oak/query/ast/ConstraintImpl.java Wed Nov 7 13:57:55 2018 @@ -19,10 +19,9 @@ package org.apache.jackrabbit.oak.query. import java.util.Collections; import java.util.Set; -import javax.annotation.Nonnull; - import org.apache.jackrabbit.oak.spi.query.fulltext.FullTextExpression; import org.apache.jackrabbit.oak.query.index.FilterImpl; +import org.jetbrains.annotations.NotNull; /** * The base class for constraints. @@ -174,7 +173,7 @@ public abstract class ConstraintImpl ext * @return the set of union constraints, if available, or an empty set if * conversion is not possible */ - @Nonnull + @NotNull public Set<ConstraintImpl> convertToUnion() { return Collections.emptySet(); } Modified: jackrabbit/oak/branches/1.8/oak-core/src/main/java/org/apache/jackrabbit/oak/query/ast/NotFullTextSearchImpl.java URL: http://svn.apache.org/viewvc/jackrabbit/oak/branches/1.8/oak-core/src/main/java/org/apache/jackrabbit/oak/query/ast/NotFullTextSearchImpl.java?rev=1846014&r1=1846013&r2=1846014&view=diff ============================================================================== --- jackrabbit/oak/branches/1.8/oak-core/src/main/java/org/apache/jackrabbit/oak/query/ast/NotFullTextSearchImpl.java (original) +++ jackrabbit/oak/branches/1.8/oak-core/src/main/java/org/apache/jackrabbit/oak/query/ast/NotFullTextSearchImpl.java Wed Nov 7 13:57:55 2018 @@ -20,10 +20,9 @@ import static com.google.common.base.Pre import java.util.Set; -import javax.annotation.Nonnull; - import org.apache.jackrabbit.oak.api.PropertyValue; import org.apache.jackrabbit.oak.query.index.FilterImpl; +import org.jetbrains.annotations.NotNull; import com.google.common.base.Splitter; import com.google.common.collect.ImmutableSet; @@ -61,7 +60,7 @@ public class NotFullTextSearchImpl exten return raw.toString().trim(); } - private static boolean isKeyword(@Nonnull String term) { + private static boolean isKeyword(@NotNull String term) { return KEYWORDS.contains(checkNotNull(term).toLowerCase()); } Modified: jackrabbit/oak/branches/1.8/oak-core/src/main/java/org/apache/jackrabbit/oak/query/ast/SelectorImpl.java URL: http://svn.apache.org/viewvc/jackrabbit/oak/branches/1.8/oak-core/src/main/java/org/apache/jackrabbit/oak/query/ast/SelectorImpl.java?rev=1846014&r1=1846013&r2=1846014&view=diff ============================================================================== --- jackrabbit/oak/branches/1.8/oak-core/src/main/java/org/apache/jackrabbit/oak/query/ast/SelectorImpl.java (original) +++ jackrabbit/oak/branches/1.8/oak-core/src/main/java/org/apache/jackrabbit/oak/query/ast/SelectorImpl.java Wed Nov 7 13:57:55 2018 @@ -30,8 +30,6 @@ import java.util.ArrayList; import java.util.List; import java.util.Set; -import javax.annotation.Nonnull; - import org.apache.jackrabbit.oak.api.PropertyState; import org.apache.jackrabbit.oak.api.PropertyValue; import org.apache.jackrabbit.oak.api.Result.SizePrecision; @@ -55,6 +53,7 @@ import org.apache.jackrabbit.oak.spi.que import org.apache.jackrabbit.oak.spi.query.QueryIndex.AdvancedQueryIndex; import org.apache.jackrabbit.oak.spi.query.QueryIndex.IndexPlan; import org.apache.jackrabbit.oak.spi.state.NodeState; +import org.jetbrains.annotations.NotNull; import org.slf4j.Logger; import org.slf4j.LoggerFactory; @@ -200,7 +199,7 @@ public class SelectorImpl extends Source * @return all of the matching supertypes, or empty if the * {@link #matchesAllTypes} flag is set */ - @Nonnull + @NotNull public Set<String> getSupertypes() { return supertypes; } @@ -209,7 +208,7 @@ public class SelectorImpl extends Source * @return all of the matching primary subtypes, or empty if the * {@link #matchesAllTypes} flag is set */ - @Nonnull + @NotNull public Set<String> getPrimaryTypes() { return primaryTypes; } @@ -218,7 +217,7 @@ public class SelectorImpl extends Source * @return all of the matching mixin types, or empty if the * {@link #matchesAllTypes} flag is set */ - @Nonnull + @NotNull public Set<String> getMixinTypes() { return mixinTypes; } Modified: jackrabbit/oak/branches/1.8/oak-core/src/main/java/org/apache/jackrabbit/oak/query/index/FilterImpl.java URL: http://svn.apache.org/viewvc/jackrabbit/oak/branches/1.8/oak-core/src/main/java/org/apache/jackrabbit/oak/query/index/FilterImpl.java?rev=1846014&r1=1846013&r2=1846014&view=diff ============================================================================== --- jackrabbit/oak/branches/1.8/oak-core/src/main/java/org/apache/jackrabbit/oak/query/index/FilterImpl.java (original) +++ jackrabbit/oak/branches/1.8/oak-core/src/main/java/org/apache/jackrabbit/oak/query/index/FilterImpl.java Wed Nov 7 13:57:55 2018 @@ -27,8 +27,6 @@ import java.util.Map.Entry; import java.util.Set; import java.util.TreeMap; -import javax.annotation.Nonnull; -import javax.annotation.Nullable; import javax.jcr.PropertyType; import javax.jcr.Session; @@ -44,6 +42,8 @@ import org.apache.jackrabbit.oak.query.a import org.apache.jackrabbit.oak.spi.query.fulltext.FullTextExpression; import org.apache.jackrabbit.oak.spi.query.Filter; import org.apache.jackrabbit.oak.spi.security.authorization.permission.PermissionProvider; +import org.jetbrains.annotations.NotNull; +import org.jetbrains.annotations.Nullable; /** * A filter or lookup condition. @@ -270,7 +270,7 @@ public class FilterImpl implements Filte return matchesAllTypes; } - @Override @Nonnull + @Override @NotNull public Set<String> getSupertypes() { if (selector == null) { return Collections.emptySet(); @@ -278,7 +278,7 @@ public class FilterImpl implements Filte return selector.getSupertypes(); } - @Override @Nonnull + @Override @NotNull public Set<String> getPrimaryTypes() { if (selector == null) { return Collections.emptySet(); @@ -286,7 +286,7 @@ public class FilterImpl implements Filte return selector.getPrimaryTypes(); } - @Override @Nonnull + @Override @NotNull public Set<String> getMixinTypes() { if (selector == null) { return Collections.emptySet(); Modified: jackrabbit/oak/branches/1.8/oak-core/src/main/java/org/apache/jackrabbit/oak/security/SecurityProviderImpl.java URL: http://svn.apache.org/viewvc/jackrabbit/oak/branches/1.8/oak-core/src/main/java/org/apache/jackrabbit/oak/security/SecurityProviderImpl.java?rev=1846014&r1=1846013&r2=1846014&view=diff ============================================================================== --- jackrabbit/oak/branches/1.8/oak-core/src/main/java/org/apache/jackrabbit/oak/security/SecurityProviderImpl.java (original) +++ jackrabbit/oak/branches/1.8/oak-core/src/main/java/org/apache/jackrabbit/oak/security/SecurityProviderImpl.java Wed Nov 7 13:57:55 2018 @@ -19,9 +19,6 @@ package org.apache.jackrabbit.oak.securi import java.util.HashSet; import java.util.Map; import java.util.Set; -import javax.annotation.Nonnull; -import javax.annotation.Nullable; - import com.google.common.collect.ImmutableMap; import org.apache.jackrabbit.oak.osgi.OsgiWhiteboard; import org.apache.jackrabbit.oak.plugins.tree.RootProvider; @@ -56,6 +53,8 @@ import org.apache.jackrabbit.oak.spi.sec import org.apache.jackrabbit.oak.spi.security.user.UserConstants; import org.apache.jackrabbit.oak.spi.whiteboard.Whiteboard; import org.apache.jackrabbit.oak.spi.whiteboard.WhiteboardAware; +import org.jetbrains.annotations.NotNull; +import org.jetbrains.annotations.Nullable; import org.osgi.framework.BundleContext; import static com.google.common.base.Preconditions.checkNotNull; @@ -100,7 +99,7 @@ public class SecurityProviderImpl implem * * @param configuration security configuration */ - public SecurityProviderImpl(@Nonnull ConfigurationParameters configuration) { + public SecurityProviderImpl(@NotNull ConfigurationParameters configuration) { checkNotNull(configuration); this.configuration = configuration; @@ -115,7 +114,7 @@ public class SecurityProviderImpl implem } @Override - public void setWhiteboard(@Nonnull Whiteboard whiteboard) { + public void setWhiteboard(@NotNull Whiteboard whiteboard) { this.whiteboard = whiteboard; } @@ -124,7 +123,7 @@ public class SecurityProviderImpl implem return whiteboard; } - @Nonnull + @NotNull @Override public ConfigurationParameters getParameters(@Nullable String name) { if (name == null) { @@ -139,7 +138,7 @@ public class SecurityProviderImpl implem return params; } - @Nonnull + @NotNull @Override public Iterable<? extends SecurityConfiguration> getConfigurations() { Set<SecurityConfiguration> scs = new HashSet<SecurityConfiguration>(); @@ -153,9 +152,9 @@ public class SecurityProviderImpl implem } @SuppressWarnings("unchecked") - @Nonnull + @NotNull @Override - public <T> T getConfiguration(@Nonnull Class<T> configClass) { + public <T> T getConfiguration(@NotNull Class<T> configClass) { if (AuthenticationConfiguration.class == configClass) { return (T) authenticationConfiguration; } else if (AuthorizationConfiguration.class == configClass) { @@ -191,32 +190,32 @@ public class SecurityProviderImpl implem } @SuppressWarnings("UnusedDeclaration") - protected void bindPrincipalConfiguration(@Nonnull PrincipalConfiguration reference) { + protected void bindPrincipalConfiguration(@NotNull PrincipalConfiguration reference) { principalConfiguration.addConfiguration(initConfiguration(reference)); } @SuppressWarnings("UnusedDeclaration") - protected void unbindPrincipalConfiguration(@Nonnull PrincipalConfiguration reference) { + protected void unbindPrincipalConfiguration(@NotNull PrincipalConfiguration reference) { principalConfiguration.removeConfiguration(reference); } @SuppressWarnings("UnusedDeclaration") - protected void bindTokenConfiguration(@Nonnull TokenConfiguration reference) { + protected void bindTokenConfiguration(@NotNull TokenConfiguration reference) { tokenConfiguration.addConfiguration(initConfiguration(reference)); } @SuppressWarnings("UnusedDeclaration") - protected void unbindTokenConfiguration(@Nonnull TokenConfiguration reference) { + protected void unbindTokenConfiguration(@NotNull TokenConfiguration reference) { tokenConfiguration.removeConfiguration(reference); } @SuppressWarnings("UnusedDeclaration") - protected void bindAuthorizationConfiguration(@Nonnull AuthorizationConfiguration reference) { + protected void bindAuthorizationConfiguration(@NotNull AuthorizationConfiguration reference) { authorizationConfiguration.addConfiguration(initConfiguration(reference)); } @SuppressWarnings("UnusedDeclaration") - protected void unbindAuthorizationConfiguration(@Nonnull AuthorizationConfiguration reference) { + protected void unbindAuthorizationConfiguration(@NotNull AuthorizationConfiguration reference) { authorizationConfiguration.removeConfiguration(reference); } @@ -236,11 +235,11 @@ public class SecurityProviderImpl implem initConfiguration(privilegeConfiguration); } - private <T extends SecurityConfiguration> T initConfiguration(@Nonnull T config) { + private <T extends SecurityConfiguration> T initConfiguration(@NotNull T config) { return initConfiguration(config, ConfigurationParameters.EMPTY); } - private <T extends SecurityConfiguration> T initConfiguration(@Nonnull T config, @Nonnull ConfigurationParameters params) { + private <T extends SecurityConfiguration> T initConfiguration(@NotNull T config, @NotNull ConfigurationParameters params) { if (config instanceof ConfigurationBase) { ConfigurationBase cfg = (ConfigurationBase) config; cfg.setSecurityProvider(this); @@ -251,14 +250,14 @@ public class SecurityProviderImpl implem return config; } - private CompositeConfiguration initCompositeConfiguration(@Nonnull CompositeConfiguration composite, @Nonnull SecurityConfiguration defaultConfig) { + private CompositeConfiguration initCompositeConfiguration(@NotNull CompositeConfiguration composite, @NotNull SecurityConfiguration defaultConfig) { composite.setRootProvider(rootProvider); composite.setTreeProvider(treeProvider); composite.setDefaultConfig(initDefaultConfiguration(defaultConfig)); return composite; } - private <T extends SecurityConfiguration> T initDefaultConfiguration(@Nonnull T config) { + private <T extends SecurityConfiguration> T initDefaultConfiguration(@NotNull T config) { if (config instanceof ConfigurationBase) { ConfigurationBase cfg = (ConfigurationBase) config; cfg.setRootProvider(rootProvider); Modified: jackrabbit/oak/branches/1.8/oak-core/src/main/java/org/apache/jackrabbit/oak/security/authentication/AuthenticationConfigurationImpl.java URL: http://svn.apache.org/viewvc/jackrabbit/oak/branches/1.8/oak-core/src/main/java/org/apache/jackrabbit/oak/security/authentication/AuthenticationConfigurationImpl.java?rev=1846014&r1=1846013&r2=1846014&view=diff ============================================================================== --- jackrabbit/oak/branches/1.8/oak-core/src/main/java/org/apache/jackrabbit/oak/security/authentication/AuthenticationConfigurationImpl.java (original) +++ jackrabbit/oak/branches/1.8/oak-core/src/main/java/org/apache/jackrabbit/oak/security/authentication/AuthenticationConfigurationImpl.java Wed Nov 7 13:57:55 2018 @@ -17,8 +17,6 @@ package org.apache.jackrabbit.oak.security.authentication; import java.util.Map; -import javax.annotation.Nonnull; - import org.apache.jackrabbit.oak.api.ContentRepository; import org.apache.jackrabbit.oak.spi.security.ConfigurationBase; import org.apache.jackrabbit.oak.spi.security.ConfigurationParameters; @@ -28,6 +26,7 @@ import org.apache.jackrabbit.oak.spi.sec import org.apache.jackrabbit.oak.spi.security.authentication.LoginContextProvider; import org.apache.jackrabbit.oak.spi.whiteboard.Whiteboard; import org.apache.jackrabbit.oak.spi.whiteboard.WhiteboardAware; +import org.jetbrains.annotations.NotNull; import org.osgi.service.component.annotations.Activate; import org.osgi.service.component.annotations.Component; import org.osgi.service.metatype.annotations.AttributeDefinition; @@ -96,7 +95,7 @@ public class AuthenticationConfiguration } //----------------------------------------------< SecurityConfiguration >--- - @Nonnull + @NotNull @Override public String getName() { return NAME; @@ -127,7 +126,7 @@ public class AuthenticationConfiguration * @param contentRepository The content repository. * @return An new instance of {@link LoginContextProvider}. */ - @Nonnull + @NotNull @Override public LoginContextProvider getLoginContextProvider(ContentRepository contentRepository) { String appName = getParameters().getConfigValue(PARAM_APP_NAME, DEFAULT_APP_NAME); Modified: jackrabbit/oak/branches/1.8/oak-core/src/main/java/org/apache/jackrabbit/oak/security/authentication/LoginContextProviderImpl.java URL: http://svn.apache.org/viewvc/jackrabbit/oak/branches/1.8/oak-core/src/main/java/org/apache/jackrabbit/oak/security/authentication/LoginContextProviderImpl.java?rev=1846014&r1=1846013&r2=1846014&view=diff ============================================================================== --- jackrabbit/oak/branches/1.8/oak-core/src/main/java/org/apache/jackrabbit/oak/security/authentication/LoginContextProviderImpl.java (original) +++ jackrabbit/oak/branches/1.8/oak-core/src/main/java/org/apache/jackrabbit/oak/security/authentication/LoginContextProviderImpl.java Wed Nov 7 13:57:55 2018 @@ -20,8 +20,6 @@ import java.security.AccessController; import java.security.NoSuchAlgorithmException; import java.security.NoSuchProviderException; -import javax.annotation.CheckForNull; -import javax.annotation.Nonnull; import javax.jcr.Credentials; import javax.security.auth.Subject; import javax.security.auth.callback.CallbackHandler; @@ -37,6 +35,8 @@ import org.apache.jackrabbit.oak.spi.sec import org.apache.jackrabbit.oak.spi.security.authentication.LoginContextProvider; import org.apache.jackrabbit.oak.spi.security.authentication.PreAuthContext; import org.apache.jackrabbit.oak.spi.whiteboard.Whiteboard; +import org.jetbrains.annotations.NotNull; +import org.jetbrains.annotations.Nullable; import org.slf4j.Logger; import org.slf4j.LoggerFactory; @@ -69,7 +69,7 @@ class LoginContextProviderImpl implement } @Override - @Nonnull + @NotNull public LoginContext getLoginContext(Credentials credentials, String workspaceName) throws LoginException { Subject subject = getSubject(); @@ -86,7 +86,7 @@ class LoginContextProviderImpl implement } //------------------------------------------------------------< private >--- - @CheckForNull + @Nullable private static Subject getSubject() { Subject subject = null; try { @@ -97,12 +97,12 @@ class LoginContextProviderImpl implement return subject; } - @Nonnull + @NotNull private CallbackHandler getCallbackHandler(Credentials credentials, String workspaceName) { return new CallbackHandlerImpl(credentials, workspaceName, contentRepository, securityProvider, whiteboard); } - @Nonnull + @NotNull private Configuration getConfiguration() { if (configuration == null) { Configuration loginConfig = null; Modified: jackrabbit/oak/branches/1.8/oak-core/src/main/java/org/apache/jackrabbit/oak/security/authentication/token/CommitMarker.java URL: http://svn.apache.org/viewvc/jackrabbit/oak/branches/1.8/oak-core/src/main/java/org/apache/jackrabbit/oak/security/authentication/token/CommitMarker.java?rev=1846014&r1=1846013&r2=1846014&view=diff ============================================================================== --- jackrabbit/oak/branches/1.8/oak-core/src/main/java/org/apache/jackrabbit/oak/security/authentication/token/CommitMarker.java (original) +++ jackrabbit/oak/branches/1.8/oak-core/src/main/java/org/apache/jackrabbit/oak/security/authentication/token/CommitMarker.java Wed Nov 7 13:57:55 2018 @@ -19,9 +19,8 @@ package org.apache.jackrabbit.oak.securi import java.util.Collections; import java.util.Map; -import javax.annotation.Nonnull; - import org.apache.jackrabbit.oak.spi.commit.CommitInfo; +import org.jetbrains.annotations.NotNull; /** * Marker object to help the {@link org.apache.jackrabbit.oak.security.authentication.token.TokenValidatorProvider.TokenValidator} @@ -40,9 +39,9 @@ final class CommitMarker { return Collections.<String, Object>singletonMap(CommitMarker.KEY, CommitMarker.INSTANCE); } - static boolean isValidCommitInfo(@Nonnull CommitInfo commitInfo) { + static boolean isValidCommitInfo(@NotNull CommitInfo commitInfo) { return CommitMarker.INSTANCE == commitInfo.getInfo().get(CommitMarker.KEY); } private CommitMarker() {} -} \ No newline at end of file +} Modified: jackrabbit/oak/branches/1.8/oak-core/src/main/java/org/apache/jackrabbit/oak/security/authentication/token/TokenAuthentication.java URL: http://svn.apache.org/viewvc/jackrabbit/oak/branches/1.8/oak-core/src/main/java/org/apache/jackrabbit/oak/security/authentication/token/TokenAuthentication.java?rev=1846014&r1=1846013&r2=1846014&view=diff ============================================================================== --- jackrabbit/oak/branches/1.8/oak-core/src/main/java/org/apache/jackrabbit/oak/security/authentication/token/TokenAuthentication.java (original) +++ jackrabbit/oak/branches/1.8/oak-core/src/main/java/org/apache/jackrabbit/oak/security/authentication/token/TokenAuthentication.java Wed Nov 7 13:57:55 2018 @@ -18,9 +18,6 @@ package org.apache.jackrabbit.oak.securi import java.security.Principal; import java.util.Date; -import javax.annotation.CheckForNull; -import javax.annotation.Nonnull; -import javax.annotation.Nullable; import javax.jcr.Credentials; import javax.security.auth.login.LoginException; @@ -28,6 +25,8 @@ import org.apache.jackrabbit.api.securit import org.apache.jackrabbit.oak.spi.security.authentication.Authentication; import org.apache.jackrabbit.oak.spi.security.authentication.token.TokenInfo; import org.apache.jackrabbit.oak.spi.security.authentication.token.TokenProvider; +import org.jetbrains.annotations.NotNull; +import org.jetbrains.annotations.Nullable; import org.slf4j.Logger; import org.slf4j.LoggerFactory; @@ -65,7 +64,7 @@ class TokenAuthentication implements Aut return false; } - @CheckForNull + @Nullable @Override public String getUserId() { if (tokenInfo == null) { @@ -74,7 +73,7 @@ class TokenAuthentication implements Aut return tokenInfo.getUserId(); } - @CheckForNull + @Nullable @Override public Principal getUserPrincipal() { if (tokenInfo == null) { @@ -88,7 +87,7 @@ class TokenAuthentication implements Aut } //-----------------------------------------------------------< internal >--- - @Nonnull + @NotNull TokenInfo getTokenInfo() { if (tokenInfo == null) { throw new IllegalStateException("Token info can only be retrieved after successful authentication."); Modified: jackrabbit/oak/branches/1.8/oak-core/src/main/java/org/apache/jackrabbit/oak/security/authentication/token/TokenConfigurationImpl.java URL: http://svn.apache.org/viewvc/jackrabbit/oak/branches/1.8/oak-core/src/main/java/org/apache/jackrabbit/oak/security/authentication/token/TokenConfigurationImpl.java?rev=1846014&r1=1846013&r2=1846014&view=diff ============================================================================== --- jackrabbit/oak/branches/1.8/oak-core/src/main/java/org/apache/jackrabbit/oak/security/authentication/token/TokenConfigurationImpl.java (original) +++ jackrabbit/oak/branches/1.8/oak-core/src/main/java/org/apache/jackrabbit/oak/security/authentication/token/TokenConfigurationImpl.java Wed Nov 7 13:57:55 2018 @@ -21,8 +21,6 @@ import java.util.List; import java.util.Map; import java.util.Set; import java.util.concurrent.ConcurrentHashMap; -import javax.annotation.Nonnull; - import com.google.common.collect.ImmutableList; import com.google.common.collect.ImmutableMap; import com.google.common.collect.ImmutableSet; @@ -40,6 +38,7 @@ import org.apache.jackrabbit.oak.spi.sec import org.apache.jackrabbit.oak.spi.security.authentication.token.TokenProvider; import org.apache.jackrabbit.oak.spi.security.user.UserConfiguration; import org.apache.jackrabbit.oak.spi.security.user.util.PasswordUtil; +import org.jetbrains.annotations.NotNull; import org.osgi.service.component.annotations.Activate; import org.osgi.service.component.annotations.Component; import org.osgi.service.component.annotations.Reference; @@ -110,7 +109,7 @@ public class TokenConfigurationImpl exte super(); } - public TokenConfigurationImpl(@Nonnull SecurityProvider securityProvider) { + public TokenConfigurationImpl(@NotNull SecurityProvider securityProvider) { super(securityProvider, securityProvider.getParameters(NAME)); } @@ -136,15 +135,15 @@ public class TokenConfigurationImpl exte } //----------------------------------------------< SecurityConfiguration >--- - @Nonnull + @NotNull @Override public String getName() { return NAME; } - @Nonnull + @NotNull @Override - public List<? extends ValidatorProvider> getValidators(@Nonnull String workspaceName, @Nonnull Set<Principal> principals, @Nonnull MoveTracker moveTracker) { + public List<? extends ValidatorProvider> getValidators(@NotNull String workspaceName, @NotNull Set<Principal> principals, @NotNull MoveTracker moveTracker) { ValidatorProvider vp = new TokenValidatorProvider(getSecurityProvider().getParameters(UserConfiguration.NAME), getTreeProvider()); return ImmutableList.of(vp); } @@ -156,7 +155,7 @@ public class TokenConfigurationImpl exte * @param root The target root. * @return A new instance of {@link org.apache.jackrabbit.oak.spi.security.authentication.token.TokenProvider}. */ - @Nonnull + @NotNull @Override public TokenProvider getTokenProvider(Root root) { UserConfiguration uc = getSecurityProvider().getConfiguration(UserConfiguration.class); @@ -173,4 +172,4 @@ public class TokenConfigurationImpl exte return CompositeCredentialsSupport.newInstance(() -> ImmutableSet.copyOf(credentialsSupport.values())); } } -} \ No newline at end of file +} Modified: jackrabbit/oak/branches/1.8/oak-core/src/main/java/org/apache/jackrabbit/oak/security/authentication/token/TokenLoginModule.java URL: http://svn.apache.org/viewvc/jackrabbit/oak/branches/1.8/oak-core/src/main/java/org/apache/jackrabbit/oak/security/authentication/token/TokenLoginModule.java?rev=1846014&r1=1846013&r2=1846014&view=diff ============================================================================== --- jackrabbit/oak/branches/1.8/oak-core/src/main/java/org/apache/jackrabbit/oak/security/authentication/token/TokenLoginModule.java (original) +++ jackrabbit/oak/branches/1.8/oak-core/src/main/java/org/apache/jackrabbit/oak/security/authentication/token/TokenLoginModule.java Wed Nov 7 13:57:55 2018 @@ -22,9 +22,6 @@ import java.util.Collections; import java.util.HashMap; import java.util.Map; import java.util.Set; -import javax.annotation.CheckForNull; -import javax.annotation.Nonnull; -import javax.annotation.Nullable; import javax.jcr.Credentials; import javax.security.auth.callback.Callback; import javax.security.auth.callback.UnsupportedCallbackException; @@ -40,6 +37,8 @@ import org.apache.jackrabbit.oak.spi.sec import org.apache.jackrabbit.oak.spi.security.authentication.token.TokenConfiguration; import org.apache.jackrabbit.oak.spi.security.authentication.token.TokenInfo; import org.apache.jackrabbit.oak.spi.security.authentication.token.TokenProvider; +import org.jetbrains.annotations.NotNull; +import org.jetbrains.annotations.Nullable; import org.slf4j.Logger; import org.slf4j.LoggerFactory; @@ -194,7 +193,7 @@ public final class TokenLoginModule exte } //------------------------------------------------< AbstractLoginModule >--- - @Nonnull + @NotNull @Override protected Set<Class> getSupportedCredentials() { return Collections.<Class>singleton(TokenCredentials.class); @@ -215,7 +214,7 @@ public final class TokenLoginModule exte * Retrieve the token provider * @return the token provider or {@code null}. */ - @CheckForNull + @Nullable private TokenProvider getTokenProvider() { TokenProvider provider = null; SecurityProvider securityProvider = getSecurityProvider(); @@ -245,8 +244,8 @@ public final class TokenLoginModule exte * @param tokenInfo The tokenInfo to retrieve attributes from. * @return The {@code AuthInfo} resulting from the successful login. */ - @CheckForNull - private AuthInfo getAuthInfo(@Nullable TokenInfo tokenInfo, @Nonnull Set<? extends Principal> principals) { + @Nullable + private AuthInfo getAuthInfo(@Nullable TokenInfo tokenInfo, @NotNull Set<? extends Principal> principals) { if (tokenInfo != null) { Map<String, Object> attributes = new HashMap<String, Object>(); Map<String, String> publicAttributes = tokenInfo.getPublicAttributes(); @@ -259,7 +258,7 @@ public final class TokenLoginModule exte } } - private void updateSubject(@Nonnull TokenCredentials tc, @Nullable AuthInfo authInfo, + private void updateSubject(@NotNull TokenCredentials tc, @Nullable AuthInfo authInfo, @Nullable Set<? extends Principal> principals) { if (!subject.isReadOnly()) { subject.getPublicCredentials().add(tc); Modified: jackrabbit/oak/branches/1.8/oak-core/src/main/java/org/apache/jackrabbit/oak/security/authentication/token/TokenProviderImpl.java URL: http://svn.apache.org/viewvc/jackrabbit/oak/branches/1.8/oak-core/src/main/java/org/apache/jackrabbit/oak/security/authentication/token/TokenProviderImpl.java?rev=1846014&r1=1846013&r2=1846014&view=diff ============================================================================== --- jackrabbit/oak/branches/1.8/oak-core/src/main/java/org/apache/jackrabbit/oak/security/authentication/token/TokenProviderImpl.java (original) +++ jackrabbit/oak/branches/1.8/oak-core/src/main/java/org/apache/jackrabbit/oak/security/authentication/token/TokenProviderImpl.java Wed Nov 7 13:57:55 2018 @@ -27,9 +27,6 @@ import java.util.Collections; import java.util.HashMap; import java.util.Map; import java.util.UUID; -import javax.annotation.CheckForNull; -import javax.annotation.Nonnull; -import javax.annotation.Nullable; import javax.jcr.AccessDeniedException; import javax.jcr.Credentials; import javax.jcr.RepositoryException; @@ -59,6 +56,8 @@ import org.apache.jackrabbit.oak.spi.sec import org.apache.jackrabbit.oak.plugins.tree.TreeUtil; import org.apache.jackrabbit.util.ISO8601; import org.apache.jackrabbit.util.Text; +import org.jetbrains.annotations.NotNull; +import org.jetbrains.annotations.Nullable; import org.slf4j.Logger; import org.slf4j.LoggerFactory; @@ -126,11 +125,11 @@ class TokenProviderImpl implements Token private final IdentifierManager identifierManager; private final long cleanupThreshold; - TokenProviderImpl(@Nonnull Root root, @Nonnull ConfigurationParameters options, @Nonnull UserConfiguration userConfiguration) { + TokenProviderImpl(@NotNull Root root, @NotNull ConfigurationParameters options, @NotNull UserConfiguration userConfiguration) { this(root, options, userConfiguration, SimpleCredentialsSupport.getInstance()); } - TokenProviderImpl(@Nonnull Root root, @Nonnull ConfigurationParameters options, @Nonnull UserConfiguration userConfiguration, @Nonnull CredentialsSupport credentialsSupport) { + TokenProviderImpl(@NotNull Root root, @NotNull ConfigurationParameters options, @NotNull UserConfiguration userConfiguration, @NotNull CredentialsSupport credentialsSupport) { this.root = root; this.options = options; this.credentialsSupport = credentialsSupport; @@ -155,7 +154,7 @@ class TokenProviderImpl implements Token * empty value; {@code false} otherwise. */ @Override - public boolean doCreateToken(@Nonnull Credentials credentials) { + public boolean doCreateToken(@NotNull Credentials credentials) { Credentials creds = extractCredentials(credentials); if (creds == null) { return false; @@ -175,9 +174,9 @@ class TokenProviderImpl implements Token * @return A new {@code TokenInfo} or {@code null} if the token could not * be created. */ - @CheckForNull + @Nullable @Override - public TokenInfo createToken(@Nonnull Credentials credentials) { + public TokenInfo createToken(@NotNull Credentials credentials) { Credentials creds = extractCredentials(credentials); String uid = (creds != null) ? credentialsSupport.getUserId(creds) : null; @@ -209,7 +208,7 @@ class TokenProviderImpl implements Token * be created. */ @Override - public TokenInfo createToken(@Nonnull String userId, @Nonnull Map<String, ?> attributes) { + public TokenInfo createToken(@NotNull String userId, @NotNull Map<String, ?> attributes) { String error = "Failed to create login token. {}"; User user = getUser(userId); Tree tokenParent = (user == null) ? null : getTokenParent(user); @@ -264,7 +263,7 @@ class TokenProviderImpl implements Token * associated with a valid user. */ @Override - public TokenInfo getTokenInfo(@Nonnull String token) { + public TokenInfo getTokenInfo(@NotNull String token) { int pos = token.indexOf(DELIM); String nodeId = (pos == -1) ? token : token.substring(0, pos); Tree tokenTree = identifierManager.getTree(nodeId); @@ -287,7 +286,7 @@ class TokenProviderImpl implements Token return creationTime + tokenExpiration; } - private static long getExpirationTime(@Nonnull Tree tokenTree, long defaultValue) { + private static long getExpirationTime(@NotNull Tree tokenTree, long defaultValue) { return TreeUtil.getLong(tokenTree, TOKEN_ATTRIBUTE_EXPIRY, defaultValue); } @@ -295,14 +294,14 @@ class TokenProviderImpl implements Token return expirationTime < loginTime; } - private static void setExpirationTime(@Nonnull Tree tree, long time) { + private static void setExpirationTime(@NotNull Tree tree, long time) { Calendar calendar = Calendar.getInstance(); calendar.setTimeInMillis(time); tree.setProperty(TOKEN_ATTRIBUTE_EXPIRY, ISO8601.format(calendar), DATE); } - @CheckForNull - private Credentials extractCredentials(@Nonnull Credentials credentials) { + @Nullable + private Credentials extractCredentials(@NotNull Credentials credentials) { Credentials creds = credentials; if (credentials instanceof ImpersonationCredentials) { creds = ((ImpersonationCredentials) credentials).getBaseCredentials(); @@ -315,7 +314,7 @@ class TokenProviderImpl implements Token } } - @Nonnull + @NotNull private static String generateKey(int size) { SecureRandom random = new SecureRandom(); byte key[] = new byte[size]; @@ -329,12 +328,12 @@ class TokenProviderImpl implements Token return res.toString(); } - @Nonnull - private static String getKeyValue(@Nonnull String key, @Nonnull String userId) { + @NotNull + private static String getKeyValue(@NotNull String key, @NotNull String userId) { return key + userId; } - private static boolean isValidTokenTree(@CheckForNull Tree tokenTree) { + private static boolean isValidTokenTree(@Nullable Tree tokenTree) { if (tokenTree == null || !tokenTree.exists()) { return false; } else { @@ -343,13 +342,13 @@ class TokenProviderImpl implements Token } } - @Nonnull - private Tree getTokenTree(@Nonnull TokenInfoImpl tokenInfo) { + @NotNull + private Tree getTokenTree(@NotNull TokenInfoImpl tokenInfo) { return root.getTree(tokenInfo.tokenPath); } - @CheckForNull - private User getUser(@Nonnull Tree tokenTree) throws RepositoryException { + @Nullable + private User getUser(@NotNull Tree tokenTree) throws RepositoryException { String userPath = Text.getRelativeParent(tokenTree.getPath(), 2); Authorizable authorizable = userManager.getAuthorizableByPath(userPath); if (authorizable != null && !authorizable.isGroup() && !((User) authorizable).isDisabled()) { @@ -359,8 +358,8 @@ class TokenProviderImpl implements Token } } - @CheckForNull - private User getUser(@Nonnull String userId) { + @Nullable + private User getUser(@NotNull String userId) { try { Authorizable user = userManager.getAuthorizable(userId); if (user != null && !user.isGroup()) { @@ -375,8 +374,8 @@ class TokenProviderImpl implements Token return null; } - @CheckForNull - private Tree getTokenParent(@Nonnull User user) { + @Nullable + private Tree getTokenParent(@NotNull User user) { Tree tokenParent = null; String parentPath = null; try { @@ -418,9 +417,9 @@ class TokenProviderImpl implements Token * new token node. * */ - private TokenInfo createTokenNode(@Nonnull Tree parent, @Nonnull String tokenName, - long expTime, @Nonnull String uuid, - @Nonnull String id, Map<String, ?> attributes) + private TokenInfo createTokenNode(@NotNull Tree parent, @NotNull String tokenName, + long expTime, @NotNull String uuid, + @NotNull String id, Map<String, ?> attributes) throws AccessDeniedException, UnsupportedEncodingException, NoSuchAlgorithmException { Tree tokenNode = TreeUtil.addChild(parent, tokenName, TOKEN_NT_NAME); @@ -458,7 +457,7 @@ class TokenProviderImpl implements Token * @param token * The token info used as random data to skip cleanup. */ - private void cleanupExpired(@Nonnull String userId, @Nonnull Tree parent, long currentTime, @Nonnull String token) { + private void cleanupExpired(@NotNull String userId, @NotNull Tree parent, long currentTime, @NotNull String token) { if (cleanupThreshold > NO_TOKEN_CLEANUP && shouldRunCleanup(token)) { long start = System.currentTimeMillis(); long active = 0; @@ -496,7 +495,7 @@ class TokenProviderImpl implements Token * @param tkn * @return true if the cleanup should run */ - static boolean shouldRunCleanup(@Nonnull String token) { + static boolean shouldRunCleanup(@NotNull String token) { return token.charAt(0) < '2'; } @@ -518,7 +517,7 @@ class TokenProviderImpl implements Token private final Map<String, String> mandatoryAttributes; private final Map<String, String> publicAttributes; - private TokenInfoImpl(@Nonnull Tree tokenTree, @Nonnull String token, @Nonnull String userId, @Nullable Principal principal) { + private TokenInfoImpl(@NotNull Tree tokenTree, @NotNull String token, @NotNull String userId, @Nullable Principal principal) { this.token = token; this.tokenPath = tokenTree.getPath(); this.userId = userId; @@ -544,20 +543,20 @@ class TokenProviderImpl implements Token } } - @CheckForNull + @Nullable Principal getPrincipal() { return principal; } //------------------------------------------------------< TokenInfo >--- - @Nonnull + @NotNull @Override public String getUserId() { return userId; } - @Nonnull + @NotNull @Override public String getToken() { return token; @@ -613,7 +612,7 @@ class TokenProviderImpl implements Token } @Override - public boolean matches(@Nonnull TokenCredentials tokenCredentials) { + public boolean matches(@NotNull TokenCredentials tokenCredentials) { String tk = tokenCredentials.getToken(); int pos = tk.lastIndexOf(DELIM); if (pos > -1) { @@ -644,13 +643,13 @@ class TokenProviderImpl implements Token return true; } - @Nonnull + @NotNull @Override public Map<String, String> getPrivateAttributes() { return Collections.unmodifiableMap(mandatoryAttributes); } - @Nonnull + @NotNull @Override public Map<String, String> getPublicAttributes() { return Collections.unmodifiableMap(publicAttributes); @@ -664,7 +663,7 @@ class TokenProviderImpl implements Token * @return {@code true} if the specified {@code attributeName} * starts with or equals {@link #TOKEN_ATTRIBUTE}. */ - private boolean isMandatoryAttribute(@Nonnull String attributeName) { + private boolean isMandatoryAttribute(@NotNull String attributeName) { return attributeName.startsWith(TOKEN_ATTRIBUTE); } @@ -678,7 +677,7 @@ class TokenProviderImpl implements Token * @return {@code true} if the specified property name doesn't seem * to represent repository internal information. */ - private boolean isInfoAttribute(@Nonnull String attributeName) { + private boolean isInfoAttribute(@NotNull String attributeName) { String prefix = Text.getNamespacePrefix(attributeName); return !NamespaceConstants.RESERVED_PREFIXES.contains(prefix); } Modified: jackrabbit/oak/branches/1.8/oak-core/src/main/java/org/apache/jackrabbit/oak/security/authentication/token/TokenValidatorProvider.java URL: http://svn.apache.org/viewvc/jackrabbit/oak/branches/1.8/oak-core/src/main/java/org/apache/jackrabbit/oak/security/authentication/token/TokenValidatorProvider.java?rev=1846014&r1=1846013&r2=1846014&view=diff ============================================================================== --- jackrabbit/oak/branches/1.8/oak-core/src/main/java/org/apache/jackrabbit/oak/security/authentication/token/TokenValidatorProvider.java (original) +++ jackrabbit/oak/branches/1.8/oak-core/src/main/java/org/apache/jackrabbit/oak/security/authentication/token/TokenValidatorProvider.java Wed Nov 7 13:57:55 2018 @@ -16,10 +16,6 @@ */ package org.apache.jackrabbit.oak.security.authentication.token; -import javax.annotation.CheckForNull; -import javax.annotation.Nonnull; -import javax.annotation.Nullable; - import org.apache.jackrabbit.JcrConstants; import org.apache.jackrabbit.oak.api.CommitFailedException; import org.apache.jackrabbit.oak.api.PropertyState; @@ -38,6 +34,8 @@ import org.apache.jackrabbit.oak.spi.sec import org.apache.jackrabbit.oak.spi.security.user.util.PasswordUtil; import org.apache.jackrabbit.oak.spi.state.NodeState; import org.apache.jackrabbit.util.Text; +import org.jetbrains.annotations.NotNull; +import org.jetbrains.annotations.Nullable; import org.slf4j.Logger; import org.slf4j.LoggerFactory; @@ -51,7 +49,7 @@ class TokenValidatorProvider extends Val private final TreeProvider treeProvider; - TokenValidatorProvider(@Nonnull ConfigurationParameters userConfig, @Nonnull TreeProvider treeProvider) { + TokenValidatorProvider(@NotNull ConfigurationParameters userConfig, @NotNull TreeProvider treeProvider) { userRootPath = userConfig.getConfigValue(UserConstants.PARAM_USER_PATH, UserConstants.DEFAULT_USER_PATH); this.treeProvider = treeProvider; } @@ -61,7 +59,7 @@ class TokenValidatorProvider extends Val return new TokenValidator(before, after, commitInfo); } - private static CommitFailedException constraintViolation(int code, @Nonnull String message) { + private static CommitFailedException constraintViolation(int code, @NotNull String message) { return new CommitFailedException(CommitFailedException.CONSTRAINT, code, message); } @@ -71,11 +69,11 @@ class TokenValidatorProvider extends Val private final Tree parentAfter; private final CommitInfo commitInfo; - TokenValidator(@Nonnull NodeState parentBefore, @Nonnull NodeState parentAfter, @Nonnull CommitInfo commitInfo) { + TokenValidator(@NotNull NodeState parentBefore, @NotNull NodeState parentAfter, @NotNull CommitInfo commitInfo) { this(treeProvider.createReadOnlyTree(parentBefore), treeProvider.createReadOnlyTree(parentAfter), commitInfo); } - private TokenValidator(@Nullable Tree parentBefore, @Nonnull Tree parentAfter, @Nonnull CommitInfo commitInfo) { + private TokenValidator(@Nullable Tree parentBefore, @NotNull Tree parentAfter, @NotNull CommitInfo commitInfo) { this.parentBefore = parentBefore; this.parentAfter = parentAfter; this.commitInfo = commitInfo; @@ -150,18 +148,18 @@ class TokenValidatorProvider extends Val } } - private void verifyHierarchy(@Nonnull String path) throws CommitFailedException { + private void verifyHierarchy(@NotNull String path) throws CommitFailedException { if (!Text.isDescendant(userRootPath, path)) { String msg = "Attempt to create a token (or it's parent) outside of configured scope " + path; throw constraintViolation(64, msg); } } - private boolean isTokenTree(@CheckForNull Tree tree) { + private boolean isTokenTree(@Nullable Tree tree) { return tree != null && TOKEN_NT_NAME.equals(TreeUtil.getPrimaryTypeName(tree)); } - private void validateTokenTree(@Nonnull Tree tokenTree) throws CommitFailedException { + private void validateTokenTree(@NotNull Tree tokenTree) throws CommitFailedException { // enforce changing being made by the TokenProvider implementation verifyCommitInfo(); @@ -183,11 +181,11 @@ class TokenValidatorProvider extends Val } } - private boolean isTokensParent(@CheckForNull Tree tree) { + private boolean isTokensParent(@Nullable Tree tree) { return tree != null && TOKENS_NODE_NAME.equals(tree.getName()); } - private void validateTokensParent(@Nonnull Tree tokensParent) throws CommitFailedException { + private void validateTokensParent(@NotNull Tree tokensParent) throws CommitFailedException { verifyHierarchy(tokensParent.getPath()); @@ -202,4 +200,4 @@ class TokenValidatorProvider extends Val } } } -} \ No newline at end of file +} Modified: jackrabbit/oak/branches/1.8/oak-core/src/main/java/org/apache/jackrabbit/oak/security/authentication/user/LoginModuleImpl.java URL: http://svn.apache.org/viewvc/jackrabbit/oak/branches/1.8/oak-core/src/main/java/org/apache/jackrabbit/oak/security/authentication/user/LoginModuleImpl.java?rev=1846014&r1=1846013&r2=1846014&view=diff ============================================================================== --- jackrabbit/oak/branches/1.8/oak-core/src/main/java/org/apache/jackrabbit/oak/security/authentication/user/LoginModuleImpl.java (original) +++ jackrabbit/oak/branches/1.8/oak-core/src/main/java/org/apache/jackrabbit/oak/security/authentication/user/LoginModuleImpl.java Wed Nov 7 13:57:55 2018 @@ -22,9 +22,6 @@ import java.util.HashMap; import java.util.HashSet; import java.util.Map; import java.util.Set; -import javax.annotation.CheckForNull; -import javax.annotation.Nonnull; -import javax.annotation.Nullable; import javax.jcr.Credentials; import javax.jcr.GuestCredentials; import javax.jcr.SimpleCredentials; @@ -46,6 +43,8 @@ import org.apache.jackrabbit.oak.spi.sec import org.apache.jackrabbit.oak.spi.security.user.UserConfiguration; import org.apache.jackrabbit.oak.spi.security.user.UserConstants; import org.apache.jackrabbit.oak.spi.security.user.util.UserUtil; +import org.jetbrains.annotations.NotNull; +import org.jetbrains.annotations.Nullable; import org.slf4j.Logger; import org.slf4j.LoggerFactory; @@ -179,7 +178,7 @@ public final class LoginModuleImpl exten } //------------------------------------------------< AbstractLoginModule >--- - @Nonnull + @NotNull @Override protected Set<Class> getSupportedCredentials() { return SUPPORTED_CREDENTIALS; @@ -195,8 +194,8 @@ public final class LoginModuleImpl exten } //-------------------------------------------------------------------------- - @CheckForNull - private String getLoginId(@CheckForNull PreAuthenticatedLogin preAuthenticatedLogin) { + @Nullable + private String getLoginId(@Nullable PreAuthenticatedLogin preAuthenticatedLogin) { if (preAuthenticatedLogin != null) { return preAuthenticatedLogin.getUserId(); } @@ -241,7 +240,7 @@ public final class LoginModuleImpl exten } } - @CheckForNull + @Nullable private Authentication getUserAuthentication(@Nullable String loginName) { SecurityProvider securityProvider = getSecurityProvider(); Root root = getRoot(); @@ -257,7 +256,7 @@ public final class LoginModuleImpl exten return null; } - private AuthInfo createAuthInfo(@Nonnull Set<? extends Principal> principals) { + private AuthInfo createAuthInfo(@NotNull Set<? extends Principal> principals) { Credentials creds; if (credentials instanceof ImpersonationCredentials) { creds = ((ImpersonationCredentials) credentials).getBaseCredentials(); Modified: jackrabbit/oak/branches/1.8/oak-core/src/main/java/org/apache/jackrabbit/oak/security/authorization/AuthorizationConfigurationImpl.java URL: http://svn.apache.org/viewvc/jackrabbit/oak/branches/1.8/oak-core/src/main/java/org/apache/jackrabbit/oak/security/authorization/AuthorizationConfigurationImpl.java?rev=1846014&r1=1846013&r2=1846014&view=diff ============================================================================== --- jackrabbit/oak/branches/1.8/oak-core/src/main/java/org/apache/jackrabbit/oak/security/authorization/AuthorizationConfigurationImpl.java (original) +++ jackrabbit/oak/branches/1.8/oak-core/src/main/java/org/apache/jackrabbit/oak/security/authorization/AuthorizationConfigurationImpl.java Wed Nov 7 13:57:55 2018 @@ -20,7 +20,6 @@ import java.security.Principal; import java.util.List; import java.util.Map; import java.util.Set; -import javax.annotation.Nonnull; import javax.jcr.security.AccessControlManager; import com.google.common.collect.ImmutableList; @@ -56,6 +55,7 @@ import org.apache.jackrabbit.oak.spi.sec import org.apache.jackrabbit.oak.spi.security.privilege.PrivilegeConstants; import org.apache.jackrabbit.oak.spi.xml.ImportBehavior; import org.apache.jackrabbit.oak.spi.xml.ProtectedItemImporter; +import org.jetbrains.annotations.NotNull; import org.osgi.service.component.annotations.Activate; import org.osgi.service.component.annotations.Component; import org.osgi.service.component.annotations.Reference; @@ -123,7 +123,7 @@ public class AuthorizationConfigurationI super(); } - public AuthorizationConfigurationImpl(@Nonnull SecurityProvider securityProvider) { + public AuthorizationConfigurationImpl(@NotNull SecurityProvider securityProvider) { super(securityProvider, securityProvider.getParameters(NAME)); } @@ -135,55 +135,55 @@ public class AuthorizationConfigurationI } //----------------------------------------------< SecurityConfiguration >--- - @Nonnull + @NotNull @Override public String getName() { return NAME; } - @Nonnull + @NotNull @Override public Context getContext() { return AuthorizationContext.getInstance(); } - @Nonnull + @NotNull @Override public WorkspaceInitializer getWorkspaceInitializer() { return new AuthorizationInitializer(mountInfoProvider); } - @Nonnull + @NotNull @Override - public List<? extends CommitHook> getCommitHooks(@Nonnull String workspaceName) { + public List<? extends CommitHook> getCommitHooks(@NotNull String workspaceName) { return ImmutableList.of( new VersionablePathHook(workspaceName), new PermissionHook(workspaceName, getRestrictionProvider(), mountInfoProvider, getRootProvider(), getTreeProvider())); } - @Nonnull + @NotNull @Override - public List<ValidatorProvider> getValidators(@Nonnull String workspaceName, @Nonnull Set<Principal> principals, @Nonnull MoveTracker moveTracker) { + public List<ValidatorProvider> getValidators(@NotNull String workspaceName, @NotNull Set<Principal> principals, @NotNull MoveTracker moveTracker) { return ImmutableList.of( new PermissionStoreValidatorProvider(), new PermissionValidatorProvider(getSecurityProvider(), workspaceName, principals, moveTracker, getRootProvider(), getTreeProvider()), new AccessControlValidatorProvider(getSecurityProvider(), getRootProvider(), getTreeProvider())); } - @Nonnull + @NotNull @Override public List<ProtectedItemImporter> getProtectedItemImporters() { return ImmutableList.of(new AccessControlImporter()); } //-----------------------------------------< AccessControlConfiguration >--- - @Nonnull + @NotNull @Override - public AccessControlManager getAccessControlManager(@Nonnull Root root, @Nonnull NamePathMapper namePathMapper) { + public AccessControlManager getAccessControlManager(@NotNull Root root, @NotNull NamePathMapper namePathMapper) { return new AccessControlManagerImpl(root, namePathMapper, getSecurityProvider()); } - @Nonnull + @NotNull @Override public RestrictionProvider getRestrictionProvider() { RestrictionProvider restrictionProvider = getParameters().getConfigValue(AccessControlConstants.PARAM_RESTRICTION_PROVIDER, null, RestrictionProvider.class); @@ -194,10 +194,10 @@ public class AuthorizationConfigurationI return restrictionProvider; } - @Nonnull + @NotNull @Override - public PermissionProvider getPermissionProvider(@Nonnull Root root, @Nonnull String workspaceName, - @Nonnull Set<Principal> principals) { + public PermissionProvider getPermissionProvider(@NotNull Root root, @NotNull String workspaceName, + @NotNull Set<Principal> principals) { Context ctx = getSecurityProvider().getConfiguration(AuthorizationConfiguration.class).getContext(); if (mountInfoProvider.hasNonDefaultMounts()) { Modified: jackrabbit/oak/branches/1.8/oak-core/src/main/java/org/apache/jackrabbit/oak/security/authorization/AuthorizationContext.java URL: http://svn.apache.org/viewvc/jackrabbit/oak/branches/1.8/oak-core/src/main/java/org/apache/jackrabbit/oak/security/authorization/AuthorizationContext.java?rev=1846014&r1=1846013&r2=1846014&view=diff ============================================================================== --- jackrabbit/oak/branches/1.8/oak-core/src/main/java/org/apache/jackrabbit/oak/security/authorization/AuthorizationContext.java (original) +++ jackrabbit/oak/branches/1.8/oak-core/src/main/java/org/apache/jackrabbit/oak/security/authorization/AuthorizationContext.java Wed Nov 7 13:57:55 2018 @@ -16,8 +16,6 @@ */ package org.apache.jackrabbit.oak.security.authorization; -import javax.annotation.Nonnull; - import com.google.common.collect.Iterables; import org.apache.jackrabbit.oak.api.PropertyState; import org.apache.jackrabbit.oak.api.Tree; @@ -26,6 +24,7 @@ import org.apache.jackrabbit.oak.spi.sec import org.apache.jackrabbit.oak.plugins.tree.TreeLocation; import org.apache.jackrabbit.oak.spi.security.Context; import org.apache.jackrabbit.oak.plugins.tree.TreeUtil; +import org.jetbrains.annotations.NotNull; final class AuthorizationContext implements Context, AccessControlConstants, PermissionConstants { @@ -44,12 +43,12 @@ final class AuthorizationContext impleme //------------------------------------------------------------< Context >--- @Override - public boolean definesProperty(@Nonnull Tree parent, @Nonnull PropertyState property) { + public boolean definesProperty(@NotNull Tree parent, @NotNull PropertyState property) { return definesTree(parent); } @Override - public boolean definesContextRoot(@Nonnull Tree tree) { + public boolean definesContextRoot(@NotNull Tree tree) { String name = tree.getName(); if (isNodeName(name)) { return NT_REP_ACL.equals(TreeUtil.getPrimaryTypeName(tree)); @@ -59,13 +58,13 @@ final class AuthorizationContext impleme } @Override - public boolean definesTree(@Nonnull Tree tree) { + public boolean definesTree(@NotNull Tree tree) { String ntName = TreeUtil.getPrimaryTypeName(tree); return ntName != null && isNtName(ntName); } @Override - public boolean definesLocation(@Nonnull TreeLocation location) { + public boolean definesLocation(@NotNull TreeLocation location) { PropertyState p = location.getProperty(); Tree tree = (p == null) ? location.getTree() : location.getParent().getTree(); if (tree != null) { @@ -76,11 +75,11 @@ final class AuthorizationContext impleme } @Override - public boolean definesInternal(@Nonnull Tree tree) { + public boolean definesInternal(@NotNull Tree tree) { return PermissionConstants.REP_PERMISSION_STORE.equals(tree.getName()); } - private static boolean isNodeName(@Nonnull String name) { + private static boolean isNodeName(@NotNull String name) { for (String n : NODE_NAMES) { if (n.equals(name)) { return true; @@ -89,7 +88,7 @@ final class AuthorizationContext impleme return false; } - private static boolean isItemName(@Nonnull String name) { + private static boolean isItemName(@NotNull String name) { if (isNodeName(name)) { return true; } @@ -101,7 +100,7 @@ final class AuthorizationContext impleme return false; } - private static boolean isNtName(@Nonnull String name) { + private static boolean isNtName(@NotNull String name) { for (String n : NT_NAMES) { if (n.equals(name)) { return true; Modified: jackrabbit/oak/branches/1.8/oak-core/src/main/java/org/apache/jackrabbit/oak/security/authorization/accesscontrol/ACL.java URL: http://svn.apache.org/viewvc/jackrabbit/oak/branches/1.8/oak-core/src/main/java/org/apache/jackrabbit/oak/security/authorization/accesscontrol/ACL.java?rev=1846014&r1=1846013&r2=1846014&view=diff ============================================================================== --- jackrabbit/oak/branches/1.8/oak-core/src/main/java/org/apache/jackrabbit/oak/security/authorization/accesscontrol/ACL.java (original) +++ jackrabbit/oak/branches/1.8/oak-core/src/main/java/org/apache/jackrabbit/oak/security/authorization/accesscontrol/ACL.java Wed Nov 7 13:57:55 2018 @@ -23,8 +23,6 @@ import java.util.HashSet; import java.util.List; import java.util.Map; import java.util.Set; -import javax.annotation.Nonnull; -import javax.annotation.Nullable; import javax.jcr.RepositoryException; import javax.jcr.Value; import javax.jcr.security.AccessControlEntry; @@ -41,6 +39,8 @@ import org.apache.jackrabbit.oak.spi.sec import org.apache.jackrabbit.oak.spi.security.authorization.restriction.Restriction; import org.apache.jackrabbit.oak.spi.security.authorization.restriction.RestrictionDefinition; import org.apache.jackrabbit.oak.spi.security.privilege.PrivilegeBits; +import org.jetbrains.annotations.NotNull; +import org.jetbrains.annotations.Nullable; import org.slf4j.Logger; import org.slf4j.LoggerFactory; @@ -51,7 +51,7 @@ abstract class ACL extends AbstractAcces private final List<ACE> entries = new ArrayList<ACE>(); ACL(@Nullable String oakPath, @Nullable List<ACE> entries, - @Nonnull NamePathMapper namePathMapper) { + @NotNull NamePathMapper namePathMapper) { super(oakPath, namePathMapper); if (entries != null) { this.entries.addAll(entries); @@ -64,7 +64,7 @@ abstract class ACL extends AbstractAcces abstract PrivilegeBits getPrivilegeBits(Privilege[] privileges); //------------------------------------------< AbstractAccessControlList >--- - @Nonnull + @NotNull @Override public List<ACE> getEntries() { return entries; @@ -185,7 +185,7 @@ abstract class ACL extends AbstractAcces return (ACE) entry; } - private boolean internalAddEntry(@Nonnull ACE entry) throws RepositoryException { + private boolean internalAddEntry(@NotNull ACE entry) throws RepositoryException { final Principal principal = entry.getPrincipal(); List<ACE> subList = Lists.newArrayList(Iterables.filter(entries, new Predicate<ACE>() { @Override @@ -234,7 +234,7 @@ abstract class ACL extends AbstractAcces return true; } - private ACE createACE(@Nonnull ACE existing, @Nonnull PrivilegeBits newPrivilegeBits) throws RepositoryException { + private ACE createACE(@NotNull ACE existing, @NotNull PrivilegeBits newPrivilegeBits) throws RepositoryException { return createACE(existing.getPrincipal(), newPrivilegeBits, existing.isAllow(), existing.getRestrictions()); } } Modified: jackrabbit/oak/branches/1.8/oak-core/src/main/java/org/apache/jackrabbit/oak/security/authorization/accesscontrol/AccessControlImporter.java URL: http://svn.apache.org/viewvc/jackrabbit/oak/branches/1.8/oak-core/src/main/java/org/apache/jackrabbit/oak/security/authorization/accesscontrol/AccessControlImporter.java?rev=1846014&r1=1846013&r2=1846014&view=diff ============================================================================== --- jackrabbit/oak/branches/1.8/oak-core/src/main/java/org/apache/jackrabbit/oak/security/authorization/accesscontrol/AccessControlImporter.java (original) +++ jackrabbit/oak/branches/1.8/oak-core/src/main/java/org/apache/jackrabbit/oak/security/authorization/accesscontrol/AccessControlImporter.java Wed Nov 7 13:57:55 2018 @@ -21,9 +21,6 @@ import java.util.ArrayList; import java.util.HashMap; import java.util.List; import java.util.Map; -import javax.annotation.CheckForNull; -import javax.annotation.Nonnull; -import javax.annotation.Nullable; import javax.jcr.PropertyType; import javax.jcr.RepositoryException; import javax.jcr.Session; @@ -53,6 +50,8 @@ import org.apache.jackrabbit.oak.spi.xml import org.apache.jackrabbit.oak.spi.xml.ProtectedNodeImporter; import org.apache.jackrabbit.oak.spi.xml.ReferenceChangeTracker; import org.apache.jackrabbit.oak.spi.xml.TextValue; +import org.jetbrains.annotations.NotNull; +import org.jetbrains.annotations.Nullable; import org.slf4j.Logger; import org.slf4j.LoggerFactory; @@ -85,9 +84,9 @@ public class AccessControlImporter imple //----------------------------------------------< ProtectedItemImporter >--- @Override - public boolean init(@Nonnull Session session, @Nonnull Root root, @Nonnull NamePathMapper namePathMapper, + public boolean init(@NotNull Session session, @NotNull Root root, @NotNull NamePathMapper namePathMapper, boolean isWorkspaceImport, int uuidBehavior, - @Nonnull ReferenceChangeTracker referenceTracker, @Nonnull SecurityProvider securityProvider) { + @NotNull ReferenceChangeTracker referenceTracker, @NotNull SecurityProvider securityProvider) { if (initialized) { throw new IllegalStateException("Already initialized"); } @@ -122,7 +121,7 @@ public class AccessControlImporter imple //----------------------------------------------< ProtectedNodeImporter >--- @Override - public boolean start(@Nonnull Tree protectedParent) throws RepositoryException { + public boolean start(@NotNull Tree protectedParent) throws RepositoryException { checkInitialized(); // the acl node must have been added during the regular import before @@ -132,7 +131,7 @@ public class AccessControlImporter imple } @Override - public void end(@Nonnull Tree protectedParent) throws RepositoryException { + public void end(@NotNull Tree protectedParent) throws RepositoryException { if (acl != null) { acMgr.setPolicy(acl.getPath(), acl); acl = null; @@ -142,7 +141,7 @@ public class AccessControlImporter imple } @Override - public void startChildInfo(@Nonnull NodeInfo childInfo, @Nonnull List<PropInfo> propInfos) throws RepositoryException { + public void startChildInfo(@NotNull NodeInfo childInfo, @NotNull List<PropInfo> propInfos) throws RepositoryException { checkInitialized(); String ntName = childInfo.getPrimaryTypeName(); if (NT_REP_GRANT_ACE.equals(ntName) || NT_REP_DENY_ACE.equals(ntName)) { @@ -198,7 +197,7 @@ public class AccessControlImporter imple } } - @CheckForNull + @Nullable private JackrabbitAccessControlList getACL(Tree tree) throws RepositoryException { String nodeName = tree.getName(); @@ -226,7 +225,7 @@ public class AccessControlImporter imple return acList; } - @CheckForNull + @Nullable private JackrabbitAccessControlList getACL(@Nullable String path) throws RepositoryException { JackrabbitAccessControlList acList = null; for (AccessControlPolicy p : acMgr.getPolicies(path)) { @@ -304,4 +303,4 @@ public class AccessControlImporter imple } } } -} \ No newline at end of file +}