You are viewing a plain text version of this content. The canonical link for it is here.
Posted to commits@sling.apache.org by ro...@apache.org on 2017/11/07 09:47:27 UTC

[sling-org-apache-sling-jcr-jackrabbit-accessmanager] annotated tag org.apache.sling.jcr.jackrabbit.accessmanager-2.0.2-incubator created (now 5fa6529)

This is an automated email from the ASF dual-hosted git repository.

rombert pushed a change to annotated tag org.apache.sling.jcr.jackrabbit.accessmanager-2.0.2-incubator
in repository https://gitbox.apache.org/repos/asf/sling-org-apache-sling-jcr-jackrabbit-accessmanager.git.


      at 5fa6529  (tag)
 tagging 137dc28bd78d26c70c6815abca35edaa3a22afe1 (commit)
      by Felix Meschberger
      on Thu Jun 18 09:21:02 2009 +0000

- Log -----------------------------------------------------------------
org.apache.sling.jcr.jackrabbit.accessmanager-2.0.2-incubator
-----------------------------------------------------------------------

This annotated tag includes the following new commits:

     new d3f7b97  Import jackrabbit-accessmanager
     new 6e7aae9  SLING-879: New Bundle to provide actions for interacting with the jackrabbit AccessManager. Patch provided by Eric Norman. https://issues.apache.org/jira/browse/SLING-879
     new 1431cb1  SLING-941: Lots of svn:eol-style settings missing
     new 1ab84c7  SLING-941: Lots of svn:eol-style settings missing
     new 8c19a30  SLING-941: Lots of svn:eol-style settings missing
     new d78f209  Use released version of jackrabbit api
     new 067e7fc  Use jackrabbit api bundle instead of Sling's obsolete version.
     new ab58792  Use release parent pom
     new f64de42  Use released version as dependencies.
     new 258a10d  [maven-release-plugin] prepare release org.apache.sling.jcr.jackrabbit.accessmanager-2.0.0-incubator
     new 70bb409  [maven-release-plugin] prepare for next development iteration
     new 9f5f16d  Use next dev version of parent pom
     new 8101ae1  Add license header
     new 3640d2b  [maven-release-plugin]  copy for tag org.apache.sling.jcr.jackrabbit.accessmanager-2.0.2-incubator
     new dc2cc3e  Move Sling to new TLP location
     new 137dc28  Move Sling to new TLP location

The 16 revisions listed above as "new" are entirely new to this
repository and will be described in separate emails.  The revisions
listed as "add" were already present in the repository and have only
been added to this reference.


-- 
To stop receiving notification emails like this one, please contact
['"commits@sling.apache.org" <co...@sling.apache.org>'].

[sling-org-apache-sling-jcr-jackrabbit-accessmanager] 01/16: Import jackrabbit-accessmanager

Posted by ro...@apache.org.
This is an automated email from the ASF dual-hosted git repository.

rombert pushed a commit to annotated tag org.apache.sling.jcr.jackrabbit.accessmanager-2.0.2-incubator
in repository https://gitbox.apache.org/repos/asf/sling-org-apache-sling-jcr-jackrabbit-accessmanager.git

commit d3f7b97c3145002dad85ee280a5b1174d89aa2a4
Author: Juan Vazquez <jv...@apache.org>
AuthorDate: Wed Mar 18 14:41:30 2009 +0000

    Import jackrabbit-accessmanager
    
    git-svn-id: https://svn.apache.org/repos/asf/incubator/sling/trunk/bundles/jcr/jackrabbit-accessmanager@755608 13f79535-47bb-0310-9956-ffa450edef68

-- 
To stop receiving notification emails like this one, please contact
"commits@sling.apache.org" <co...@sling.apache.org>.

[sling-org-apache-sling-jcr-jackrabbit-accessmanager] 05/16: SLING-941: Lots of svn:eol-style settings missing

Posted by ro...@apache.org.
This is an automated email from the ASF dual-hosted git repository.

rombert pushed a commit to annotated tag org.apache.sling.jcr.jackrabbit.accessmanager-2.0.2-incubator
in repository https://gitbox.apache.org/repos/asf/sling-org-apache-sling-jcr-jackrabbit-accessmanager.git

commit 8c19a30a341571adf75a29df589936ce975fc4b7
Author: Jukka Zitting <ju...@apache.org>
AuthorDate: Fri Apr 24 13:16:52 2009 +0000

    SLING-941: Lots of svn:eol-style settings missing
    
    Set svn:eol-style to native on all text files that lack the setting.
    
    git-svn-id: https://svn.apache.org/repos/asf/incubator/sling/trunk/bundles/jcr/jackrabbit-accessmanager@768299 13f79535-47bb-0310-9956-ffa450edef68
---
 README.txt | 74 +++++++++++++++++++++++++++++++-------------------------------
 1 file changed, 37 insertions(+), 37 deletions(-)

diff --git a/README.txt b/README.txt
index 3482a22..c6a8b37 100644
--- a/README.txt
+++ b/README.txt
@@ -1,37 +1,37 @@
-Apache Sling Jackrabbit JSR-283 Access Control Manager Support
-
-Provides actions for the JSR-283 Access Control Manager.
-
-Disclaimer
-==========
-Apache Sling is an effort undergoing incubation at The Apache Software Foundation (ASF),
-sponsored by the Apache Jackrabbit PMC. Incubation is required of all newly accepted
-projects until a further review indicates that the infrastructure, communications,
-and decision making process have stabilized in a manner consistent with other
-successful ASF projects. While incubation status is not necessarily a reflection of
-the completeness or stability of the code, it does indicate that the project has yet
-to be fully endorsed by the ASF.
-
-Getting Started
-===============
-
-This component uses a Maven 2 (http://maven.apache.org/) build
-environment. It requires a Java 5 JDK (or higher) and Maven (http://maven.apache.org/)
-2.0.7 or later. We recommend to use the latest Maven version.
-
-If you have Maven 2 installed, you can compile and
-package the jar using the following command:
-
-    mvn package
-
-See the Maven 2 documentation for other build features.
-
-The latest source code for this component is available in the
-Subversion (http://subversion.tigris.org/) source repository of
-the Apache Software Foundation. If you have Subversion installed,
-you can checkout the latest source using the following command:
-
-    svn checkout http://svn.apache.org/repos/asf/incubator/sling/trunk/servlets/post
-
-See the Subversion documentation for other source control features.
-
+Apache Sling Jackrabbit JSR-283 Access Control Manager Support
+
+Provides actions for the JSR-283 Access Control Manager.
+
+Disclaimer
+==========
+Apache Sling is an effort undergoing incubation at The Apache Software Foundation (ASF),
+sponsored by the Apache Jackrabbit PMC. Incubation is required of all newly accepted
+projects until a further review indicates that the infrastructure, communications,
+and decision making process have stabilized in a manner consistent with other
+successful ASF projects. While incubation status is not necessarily a reflection of
+the completeness or stability of the code, it does indicate that the project has yet
+to be fully endorsed by the ASF.
+
+Getting Started
+===============
+
+This component uses a Maven 2 (http://maven.apache.org/) build
+environment. It requires a Java 5 JDK (or higher) and Maven (http://maven.apache.org/)
+2.0.7 or later. We recommend to use the latest Maven version.
+
+If you have Maven 2 installed, you can compile and
+package the jar using the following command:
+
+    mvn package
+
+See the Maven 2 documentation for other build features.
+
+The latest source code for this component is available in the
+Subversion (http://subversion.tigris.org/) source repository of
+the Apache Software Foundation. If you have Subversion installed,
+you can checkout the latest source using the following command:
+
+    svn checkout http://svn.apache.org/repos/asf/incubator/sling/trunk/servlets/post
+
+See the Subversion documentation for other source control features.
+

-- 
To stop receiving notification emails like this one, please contact
"commits@sling.apache.org" <co...@sling.apache.org>.

[sling-org-apache-sling-jcr-jackrabbit-accessmanager] 13/16: Add license header

Posted by ro...@apache.org.
This is an automated email from the ASF dual-hosted git repository.

rombert pushed a commit to annotated tag org.apache.sling.jcr.jackrabbit.accessmanager-2.0.2-incubator
in repository https://gitbox.apache.org/repos/asf/sling-org-apache-sling-jcr-jackrabbit-accessmanager.git

commit 8101ae1f6c2f564e46327a3da2a9e8d3100023bb
Author: Felix Meschberger <fm...@apache.org>
AuthorDate: Wed May 6 12:32:26 2009 +0000

    Add license header
    
    git-svn-id: https://svn.apache.org/repos/asf/incubator/sling/trunk/bundles/jcr/jackrabbit-accessmanager@772176 13f79535-47bb-0310-9956-ffa450edef68
---
 pom.xml | 21 ++++++++++++++++++++-
 1 file changed, 20 insertions(+), 1 deletion(-)

diff --git a/pom.xml b/pom.xml
index fe832c9..50a2f12 100644
--- a/pom.xml
+++ b/pom.xml
@@ -1,3 +1,22 @@
+<?xml version="1.0" encoding="ISO-8859-1"?>
+<!--
+    Licensed to the Apache Software Foundation (ASF) under one
+    or more contributor license agreements.  See the NOTICE file
+    distributed with this work for additional information
+    regarding copyright ownership.  The ASF licenses this file
+    to you under the Apache License, Version 2.0 (the
+    "License"); you may not use this file except in compliance
+    with the License.  You may obtain a copy of the License at
+                                     
+    http://www.apache.org/licenses/LICENSE-2.0
+        
+    Unless required by applicable law or agreed to in writing,
+    software distributed under the License is distributed on an
+    "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY
+    KIND, either express or implied.  See the License for the
+    specific language governing permissions and limitations
+    under the License.
+-->
 <project xmlns="http://maven.apache.org/POM/4.0.0" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://maven.apache.org/POM/4.0.0 http://maven.apache.org/maven-v4_0_0.xsd">
 	
 	<modelVersion>4.0.0</modelVersion>
@@ -114,4 +133,4 @@
 			<artifactId>org.osgi.compendium</artifactId>
 		</dependency>
 	</dependencies>
-</project>
\ No newline at end of file
+</project>

-- 
To stop receiving notification emails like this one, please contact
"commits@sling.apache.org" <co...@sling.apache.org>.

[sling-org-apache-sling-jcr-jackrabbit-accessmanager] 16/16: Move Sling to new TLP location

Posted by ro...@apache.org.
This is an automated email from the ASF dual-hosted git repository.

rombert pushed a commit to annotated tag org.apache.sling.jcr.jackrabbit.accessmanager-2.0.2-incubator
in repository https://gitbox.apache.org/repos/asf/sling-org-apache-sling-jcr-jackrabbit-accessmanager.git

commit 137dc28bd78d26c70c6815abca35edaa3a22afe1
Merge: dc2cc3e 3640d2b
Author: Felix Meschberger <fm...@apache.org>
AuthorDate: Thu Jun 18 09:21:02 2009 +0000

    Move Sling to new TLP location
    
    git-svn-id: https://svn.apache.org/repos/asf/sling/tags/org.apache.sling.jcr.jackrabbit.accessmanager-2.0.2-incubator@785979 13f79535-47bb-0310-9956-ffa450edef68


-- 
To stop receiving notification emails like this one, please contact
"commits@sling.apache.org" <co...@sling.apache.org>.

[sling-org-apache-sling-jcr-jackrabbit-accessmanager] 07/16: Use jackrabbit api bundle instead of Sling's obsolete version.

Posted by ro...@apache.org.
This is an automated email from the ASF dual-hosted git repository.

rombert pushed a commit to annotated tag org.apache.sling.jcr.jackrabbit.accessmanager-2.0.2-incubator
in repository https://gitbox.apache.org/repos/asf/sling-org-apache-sling-jcr-jackrabbit-accessmanager.git

commit 067e7fc4258d8776ec2a734f097fc5f6c164a3b5
Author: Carsten Ziegeler <cz...@apache.org>
AuthorDate: Tue May 5 14:37:38 2009 +0000

    Use jackrabbit api bundle instead of Sling's obsolete version.
    
    git-svn-id: https://svn.apache.org/repos/asf/incubator/sling/trunk/bundles/jcr/jackrabbit-accessmanager@771746 13f79535-47bb-0310-9956-ffa450edef68
---
 pom.xml | 10 +++++-----
 1 file changed, 5 insertions(+), 5 deletions(-)

diff --git a/pom.xml b/pom.xml
index 66f63ea..bd03049 100644
--- a/pom.xml
+++ b/pom.xml
@@ -92,11 +92,11 @@
 			<artifactId>org.apache.sling.servlets.post</artifactId>
 			<version>2.0.3-incubator-SNAPSHOT</version>
 		</dependency>
-		<dependency>
-			<groupId>org.apache.sling</groupId>
-			<artifactId>org.apache.sling.jcr.jackrabbit.api</artifactId>
-			<version>2.0.2-incubator</version>
-		</dependency>
+        <dependency>
+            <groupId>org.apache.jackrabbit</groupId>
+            <artifactId>jackrabbit-api</artifactId>
+            <version>1.5.0</version>
+        </dependency>
 		<dependency>
 			<groupId>org.apache.sling</groupId>
 			<artifactId>org.apache.sling.jcr.base</artifactId>

-- 
To stop receiving notification emails like this one, please contact
"commits@sling.apache.org" <co...@sling.apache.org>.

[sling-org-apache-sling-jcr-jackrabbit-accessmanager] 09/16: Use released version as dependencies.

Posted by ro...@apache.org.
This is an automated email from the ASF dual-hosted git repository.

rombert pushed a commit to annotated tag org.apache.sling.jcr.jackrabbit.accessmanager-2.0.2-incubator
in repository https://gitbox.apache.org/repos/asf/sling-org-apache-sling-jcr-jackrabbit-accessmanager.git

commit f64de42b4fcbb451597c3fdd55d32fe3bb202d15
Author: Carsten Ziegeler <cz...@apache.org>
AuthorDate: Tue May 5 15:25:58 2009 +0000

    Use released version as dependencies.
    
    git-svn-id: https://svn.apache.org/repos/asf/incubator/sling/trunk/bundles/jcr/jackrabbit-accessmanager@771800 13f79535-47bb-0310-9956-ffa450edef68
---
 pom.xml | 8 ++++----
 1 file changed, 4 insertions(+), 4 deletions(-)

diff --git a/pom.xml b/pom.xml
index 8f0f8a5..b294ac7 100644
--- a/pom.xml
+++ b/pom.xml
@@ -79,18 +79,18 @@
       <dependency>
          <groupId>org.apache.sling</groupId>
          <artifactId>org.apache.sling.commons.json</artifactId>
-         <version>2.0.3-incubator-SNAPSHOT</version>
+         <version>2.0.4-incubator</version>
       </dependency>
 		
 		<dependency>
 			<groupId>org.apache.sling</groupId>
 			<artifactId>org.apache.sling.api</artifactId>
-			<version>2.0.3-incubator-SNAPSHOT</version>
+			<version>2.0.4-incubator</version>
 		</dependency>
 		<dependency>
 			<groupId>org.apache.sling</groupId>
 			<artifactId>org.apache.sling.servlets.post</artifactId>
-			<version>2.0.3-incubator-SNAPSHOT</version>
+			<version>2.0.4-incubator</version>
 		</dependency>
         <dependency>
             <groupId>org.apache.jackrabbit</groupId>
@@ -100,7 +100,7 @@
 		<dependency>
 			<groupId>org.apache.sling</groupId>
 			<artifactId>org.apache.sling.jcr.base</artifactId>
-			<version>2.0.3-incubator-SNAPSHOT</version>
+			<version>2.0.4-incubator</version>
 		</dependency>
 		<dependency>
 			<groupId>org.apache.jackrabbit</groupId>

-- 
To stop receiving notification emails like this one, please contact
"commits@sling.apache.org" <co...@sling.apache.org>.

[sling-org-apache-sling-jcr-jackrabbit-accessmanager] 06/16: Use released version of jackrabbit api

Posted by ro...@apache.org.
This is an automated email from the ASF dual-hosted git repository.

rombert pushed a commit to annotated tag org.apache.sling.jcr.jackrabbit.accessmanager-2.0.2-incubator
in repository https://gitbox.apache.org/repos/asf/sling-org-apache-sling-jcr-jackrabbit-accessmanager.git

commit d78f2099945358b02c173b69705f153e90cba3d6
Author: Carsten Ziegeler <cz...@apache.org>
AuthorDate: Tue May 5 08:26:58 2009 +0000

    Use released version of jackrabbit api
    
    git-svn-id: https://svn.apache.org/repos/asf/incubator/sling/trunk/bundles/jcr/jackrabbit-accessmanager@771617 13f79535-47bb-0310-9956-ffa450edef68
---
 pom.xml | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/pom.xml b/pom.xml
index 39c8b6a..66f63ea 100644
--- a/pom.xml
+++ b/pom.xml
@@ -95,7 +95,7 @@
 		<dependency>
 			<groupId>org.apache.sling</groupId>
 			<artifactId>org.apache.sling.jcr.jackrabbit.api</artifactId>
-			<version>2.0.3-incubator-SNAPSHOT</version>
+			<version>2.0.2-incubator</version>
 		</dependency>
 		<dependency>
 			<groupId>org.apache.sling</groupId>

-- 
To stop receiving notification emails like this one, please contact
"commits@sling.apache.org" <co...@sling.apache.org>.

[sling-org-apache-sling-jcr-jackrabbit-accessmanager] 11/16: [maven-release-plugin] prepare for next development iteration

Posted by ro...@apache.org.
This is an automated email from the ASF dual-hosted git repository.

rombert pushed a commit to annotated tag org.apache.sling.jcr.jackrabbit.accessmanager-2.0.2-incubator
in repository https://gitbox.apache.org/repos/asf/sling-org-apache-sling-jcr-jackrabbit-accessmanager.git

commit 70bb40910b7daab52dc6e3d6d228be8301999a11
Author: Carsten Ziegeler <cz...@apache.org>
AuthorDate: Tue May 5 16:18:33 2009 +0000

    [maven-release-plugin] prepare for next development iteration
    
    git-svn-id: https://svn.apache.org/repos/asf/incubator/sling/trunk/bundles/jcr/jackrabbit-accessmanager@771889 13f79535-47bb-0310-9956-ffa450edef68
---
 pom.xml | 8 ++++----
 1 file changed, 4 insertions(+), 4 deletions(-)

diff --git a/pom.xml b/pom.xml
index 5645b1e..158ce07 100644
--- a/pom.xml
+++ b/pom.xml
@@ -10,7 +10,7 @@
 
 	<artifactId>org.apache.sling.jcr.jackrabbit.accessmanager</artifactId>
 	<packaging>bundle</packaging>
-	<version>2.0.0-incubator</version>
+	<version>2.0.1-incubator-SNAPSHOT</version>
 	<name>Apache Sling Jackrabbit JSR-283 Access Control Manager Support</name>
 	<description>
 		Provides SlingPostOperations for the Jackrabbit JSR-283 Access Control Manager.
@@ -18,13 +18,13 @@
 
 	<scm>
 		<connection>
-			scm:svn:http://svn.apache.org/repos/asf/incubator/sling/tags/org.apache.sling.jcr.jackrabbit.accessmanager-2.0.0-incubator
+			scm:svn:http://svn.apache.org/repos/asf/incubator/sling/trunk/bundles/jcr/jackrabbit-accessmanager
 		</connection>
 		<developerConnection>
-			scm:svn:https://svn.apache.org/repos/asf/incubator/sling/tags/org.apache.sling.jcr.jackrabbit.accessmanager-2.0.0-incubator
+			scm:svn:https://svn.apache.org/repos/asf/incubator/sling/trunk/bundles/jcr/jackrabbit-accessmanager
 		</developerConnection>
 		<url>
-			http://svn.apache.org/viewvc/incubator/sling/tags/org.apache.sling.jcr.jackrabbit.accessmanager-2.0.0-incubator
+			http://svn.apache.org/viewvc/incubator/sling/trunk/bundles/jcr/jackrabbit-accessmanager
 		</url>
 	</scm>
 

-- 
To stop receiving notification emails like this one, please contact
"commits@sling.apache.org" <co...@sling.apache.org>.

[sling-org-apache-sling-jcr-jackrabbit-accessmanager] 10/16: [maven-release-plugin] prepare release org.apache.sling.jcr.jackrabbit.accessmanager-2.0.0-incubator

Posted by ro...@apache.org.
This is an automated email from the ASF dual-hosted git repository.

rombert pushed a commit to annotated tag org.apache.sling.jcr.jackrabbit.accessmanager-2.0.2-incubator
in repository https://gitbox.apache.org/repos/asf/sling-org-apache-sling-jcr-jackrabbit-accessmanager.git

commit 258a10d31cb33dee58e92821c38d7ca088d406c9
Author: Carsten Ziegeler <cz...@apache.org>
AuthorDate: Tue May 5 16:18:15 2009 +0000

    [maven-release-plugin] prepare release org.apache.sling.jcr.jackrabbit.accessmanager-2.0.0-incubator
    
    git-svn-id: https://svn.apache.org/repos/asf/incubator/sling/trunk/bundles/jcr/jackrabbit-accessmanager@771887 13f79535-47bb-0310-9956-ffa450edef68
---
 pom.xml | 16 +++++++---------
 1 file changed, 7 insertions(+), 9 deletions(-)

diff --git a/pom.xml b/pom.xml
index b294ac7..5645b1e 100644
--- a/pom.xml
+++ b/pom.xml
@@ -1,6 +1,4 @@
-<project xmlns="http://maven.apache.org/POM/4.0.0"
-	xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
-	xsi:schemaLocation="http://maven.apache.org/POM/4.0.0 http://maven.apache.org/maven-v4_0_0.xsd">
+<project xmlns="http://maven.apache.org/POM/4.0.0" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://maven.apache.org/POM/4.0.0 http://maven.apache.org/maven-v4_0_0.xsd">
 	
 	<modelVersion>4.0.0</modelVersion>
 	<parent>
@@ -12,7 +10,7 @@
 
 	<artifactId>org.apache.sling.jcr.jackrabbit.accessmanager</artifactId>
 	<packaging>bundle</packaging>
-	<version>2.0.0-incubator-SNAPSHOT</version>
+	<version>2.0.0-incubator</version>
 	<name>Apache Sling Jackrabbit JSR-283 Access Control Manager Support</name>
 	<description>
 		Provides SlingPostOperations for the Jackrabbit JSR-283 Access Control Manager.
@@ -20,13 +18,13 @@
 
 	<scm>
 		<connection>
-			scm:svn:http://svn.apache.org/repos/asf/incubator/sling/trunk/bundles/jcr/jackrabbit-accessmanager
+			scm:svn:http://svn.apache.org/repos/asf/incubator/sling/tags/org.apache.sling.jcr.jackrabbit.accessmanager-2.0.0-incubator
 		</connection>
 		<developerConnection>
-			scm:svn:https://svn.apache.org/repos/asf/incubator/sling/trunk/bundles/jcr/jackrabbit-accessmanager
+			scm:svn:https://svn.apache.org/repos/asf/incubator/sling/tags/org.apache.sling.jcr.jackrabbit.accessmanager-2.0.0-incubator
 		</developerConnection>
 		<url>
-			http://svn.apache.org/viewvc/incubator/sling/trunk/bundles/jcr/jackrabbit-accessmanager
+			http://svn.apache.org/viewvc/incubator/sling/tags/org.apache.sling.jcr.jackrabbit.accessmanager-2.0.0-incubator
 		</url>
 	</scm>
 
@@ -48,8 +46,8 @@
                      org.apache.sling.jcr.jackrabbit.accessmanager;version=${pom.version},
                      org.apache.sling.jcr.jackrabbit.accessmanager.post;version=${pom.version}                   
 						</Export-Package>
-						<Sling-Initial-Content></Sling-Initial-Content>
-						<Sling-Nodetypes></Sling-Nodetypes>
+						<Sling-Initial-Content />
+						<Sling-Nodetypes />
 					</instructions>
 				</configuration>
 			</plugin>

-- 
To stop receiving notification emails like this one, please contact
"commits@sling.apache.org" <co...@sling.apache.org>.

[sling-org-apache-sling-jcr-jackrabbit-accessmanager] 14/16: [maven-release-plugin] copy for tag org.apache.sling.jcr.jackrabbit.accessmanager-2.0.2-incubator

Posted by ro...@apache.org.
This is an automated email from the ASF dual-hosted git repository.

rombert pushed a commit to annotated tag org.apache.sling.jcr.jackrabbit.accessmanager-2.0.2-incubator
in repository https://gitbox.apache.org/repos/asf/sling-org-apache-sling-jcr-jackrabbit-accessmanager.git

commit 3640d2bda8736c3fc75b8e5027cabbfd403369d8
Author: Carsten Ziegeler <cz...@apache.org>
AuthorDate: Wed May 6 13:17:35 2009 +0000

    [maven-release-plugin]  copy for tag org.apache.sling.jcr.jackrabbit.accessmanager-2.0.2-incubator
    
    git-svn-id: https://svn.apache.org/repos/asf/incubator/sling/tags/org.apache.sling.jcr.jackrabbit.accessmanager-2.0.2-incubator@772224 13f79535-47bb-0310-9956-ffa450edef68
---
 pom.xml                                |  10 +-
 src/main/resources/META-INF/DISCLAIMER |   7 ++
 src/main/resources/META-INF/LICENSE    | 202 +++++++++++++++++++++++++++++++++
 src/main/resources/META-INF/NOTICE     |   8 ++
 4 files changed, 222 insertions(+), 5 deletions(-)

diff --git a/pom.xml b/pom.xml
index 50a2f12..513a7fe 100644
--- a/pom.xml
+++ b/pom.xml
@@ -23,13 +23,13 @@
 	<parent>
 		<groupId>org.apache.sling</groupId>
 		<artifactId>sling</artifactId>
-		<version>6-incubator-SNAPSHOT</version>
+        <version>5-incubator</version>
 		<relativePath>../../../parent/pom.xml</relativePath>
 	</parent>
 
 	<artifactId>org.apache.sling.jcr.jackrabbit.accessmanager</artifactId>
 	<packaging>bundle</packaging>
-	<version>2.0.1-incubator-SNAPSHOT</version>
+	<version>2.0.2-incubator</version>
 	<name>Apache Sling Jackrabbit JSR-283 Access Control Manager Support</name>
 	<description>
 		Provides SlingPostOperations for the Jackrabbit JSR-283 Access Control Manager.
@@ -37,13 +37,13 @@
 
 	<scm>
 		<connection>
-			scm:svn:http://svn.apache.org/repos/asf/incubator/sling/trunk/bundles/jcr/jackrabbit-accessmanager
+			scm:svn:http://svn.apache.org/repos/asf/incubator/sling/tags/org.apache.sling.jcr.jackrabbit.accessmanager-2.0.2-incubator
 		</connection>
 		<developerConnection>
-			scm:svn:https://svn.apache.org/repos/asf/incubator/sling/trunk/bundles/jcr/jackrabbit-accessmanager
+			scm:svn:https://svn.apache.org/repos/asf/incubator/sling/tags/org.apache.sling.jcr.jackrabbit.accessmanager-2.0.2-incubator
 		</developerConnection>
 		<url>
-			http://svn.apache.org/viewvc/incubator/sling/trunk/bundles/jcr/jackrabbit-accessmanager
+			http://svn.apache.org/viewvc/incubator/sling/tags/org.apache.sling.jcr.jackrabbit.accessmanager-2.0.2-incubator
 		</url>
 	</scm>
 
diff --git a/src/main/resources/META-INF/DISCLAIMER b/src/main/resources/META-INF/DISCLAIMER
new file mode 100644
index 0000000..90850c2
--- /dev/null
+++ b/src/main/resources/META-INF/DISCLAIMER
@@ -0,0 +1,7 @@
+Apache Sling is an effort undergoing incubation at The Apache Software Foundation (ASF),
+sponsored by the Apache Jackrabbit PMC. Incubation is required of all newly accepted
+projects until a further review indicates that the infrastructure, communications,
+and decision making process have stabilized in a manner consistent with other
+successful ASF projects. While incubation status is not necessarily a reflection of
+the completeness or stability of the code, it does indicate that the project has yet
+to be fully endorsed by the ASF.
\ No newline at end of file
diff --git a/src/main/resources/META-INF/LICENSE b/src/main/resources/META-INF/LICENSE
new file mode 100644
index 0000000..d645695
--- /dev/null
+++ b/src/main/resources/META-INF/LICENSE
@@ -0,0 +1,202 @@
+
+                                 Apache License
+                           Version 2.0, January 2004
+                        http://www.apache.org/licenses/
+
+   TERMS AND CONDITIONS FOR USE, REPRODUCTION, AND DISTRIBUTION
+
+   1. Definitions.
+
+      "License" shall mean the terms and conditions for use, reproduction,
+      and distribution as defined by Sections 1 through 9 of this document.
+
+      "Licensor" shall mean the copyright owner or entity authorized by
+      the copyright owner that is granting the License.
+
+      "Legal Entity" shall mean the union of the acting entity and all
+      other entities that control, are controlled by, or are under common
+      control with that entity. For the purposes of this definition,
+      "control" means (i) the power, direct or indirect, to cause the
+      direction or management of such entity, whether by contract or
+      otherwise, or (ii) ownership of fifty percent (50%) or more of the
+      outstanding shares, or (iii) beneficial ownership of such entity.
+
+      "You" (or "Your") shall mean an individual or Legal Entity
+      exercising permissions granted by this License.
+
+      "Source" form shall mean the preferred form for making modifications,
+      including but not limited to software source code, documentation
+      source, and configuration files.
+
+      "Object" form shall mean any form resulting from mechanical
+      transformation or translation of a Source form, including but
+      not limited to compiled object code, generated documentation,
+      and conversions to other media types.
+
+      "Work" shall mean the work of authorship, whether in Source or
+      Object form, made available under the License, as indicated by a
+      copyright notice that is included in or attached to the work
+      (an example is provided in the Appendix below).
+
+      "Derivative Works" shall mean any work, whether in Source or Object
+      form, that is based on (or derived from) the Work and for which the
+      editorial revisions, annotations, elaborations, or other modifications
+      represent, as a whole, an original work of authorship. For the purposes
+      of this License, Derivative Works shall not include works that remain
+      separable from, or merely link (or bind by name) to the interfaces of,
+      the Work and Derivative Works thereof.
+
+      "Contribution" shall mean any work of authorship, including
+      the original version of the Work and any modifications or additions
+      to that Work or Derivative Works thereof, that is intentionally
+      submitted to Licensor for inclusion in the Work by the copyright owner
+      or by an individual or Legal Entity authorized to submit on behalf of
+      the copyright owner. For the purposes of this definition, "submitted"
+      means any form of electronic, verbal, or written communication sent
+      to the Licensor or its representatives, including but not limited to
+      communication on electronic mailing lists, source code control systems,
+      and issue tracking systems that are managed by, or on behalf of, the
+      Licensor for the purpose of discussing and improving the Work, but
+      excluding communication that is conspicuously marked or otherwise
+      designated in writing by the copyright owner as "Not a Contribution."
+
+      "Contributor" shall mean Licensor and any individual or Legal Entity
+      on behalf of whom a Contribution has been received by Licensor and
+      subsequently incorporated within the Work.
+
+   2. Grant of Copyright License. Subject to the terms and conditions of
+      this License, each Contributor hereby grants to You a perpetual,
+      worldwide, non-exclusive, no-charge, royalty-free, irrevocable
+      copyright license to reproduce, prepare Derivative Works of,
+      publicly display, publicly perform, sublicense, and distribute the
+      Work and such Derivative Works in Source or Object form.
+
+   3. Grant of Patent License. Subject to the terms and conditions of
+      this License, each Contributor hereby grants to You a perpetual,
+      worldwide, non-exclusive, no-charge, royalty-free, irrevocable
+      (except as stated in this section) patent license to make, have made,
+      use, offer to sell, sell, import, and otherwise transfer the Work,
+      where such license applies only to those patent claims licensable
+      by such Contributor that are necessarily infringed by their
+      Contribution(s) alone or by combination of their Contribution(s)
+      with the Work to which such Contribution(s) was submitted. If You
+      institute patent litigation against any entity (including a
+      cross-claim or counterclaim in a lawsuit) alleging that the Work
+      or a Contribution incorporated within the Work constitutes direct
+      or contributory patent infringement, then any patent licenses
+      granted to You under this License for that Work shall terminate
+      as of the date such litigation is filed.
+
+   4. Redistribution. You may reproduce and distribute copies of the
+      Work or Derivative Works thereof in any medium, with or without
+      modifications, and in Source or Object form, provided that You
+      meet the following conditions:
+
+      (a) You must give any other recipients of the Work or
+          Derivative Works a copy of this License; and
+
+      (b) You must cause any modified files to carry prominent notices
+          stating that You changed the files; and
+
+      (c) You must retain, in the Source form of any Derivative Works
+          that You distribute, all copyright, patent, trademark, and
+          attribution notices from the Source form of the Work,
+          excluding those notices that do not pertain to any part of
+          the Derivative Works; and
+
+      (d) If the Work includes a "NOTICE" text file as part of its
+          distribution, then any Derivative Works that You distribute must
+          include a readable copy of the attribution notices contained
+          within such NOTICE file, excluding those notices that do not
+          pertain to any part of the Derivative Works, in at least one
+          of the following places: within a NOTICE text file distributed
+          as part of the Derivative Works; within the Source form or
+          documentation, if provided along with the Derivative Works; or,
+          within a display generated by the Derivative Works, if and
+          wherever such third-party notices normally appear. The contents
+          of the NOTICE file are for informational purposes only and
+          do not modify the License. You may add Your own attribution
+          notices within Derivative Works that You distribute, alongside
+          or as an addendum to the NOTICE text from the Work, provided
+          that such additional attribution notices cannot be construed
+          as modifying the License.
+
+      You may add Your own copyright statement to Your modifications and
+      may provide additional or different license terms and conditions
+      for use, reproduction, or distribution of Your modifications, or
+      for any such Derivative Works as a whole, provided Your use,
+      reproduction, and distribution of the Work otherwise complies with
+      the conditions stated in this License.
+
+   5. Submission of Contributions. Unless You explicitly state otherwise,
+      any Contribution intentionally submitted for inclusion in the Work
+      by You to the Licensor shall be under the terms and conditions of
+      this License, without any additional terms or conditions.
+      Notwithstanding the above, nothing herein shall supersede or modify
+      the terms of any separate license agreement you may have executed
+      with Licensor regarding such Contributions.
+
+   6. Trademarks. This License does not grant permission to use the trade
+      names, trademarks, service marks, or product names of the Licensor,
+      except as required for reasonable and customary use in describing the
+      origin of the Work and reproducing the content of the NOTICE file.
+
+   7. Disclaimer of Warranty. Unless required by applicable law or
+      agreed to in writing, Licensor provides the Work (and each
+      Contributor provides its Contributions) on an "AS IS" BASIS,
+      WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or
+      implied, including, without limitation, any warranties or conditions
+      of TITLE, NON-INFRINGEMENT, MERCHANTABILITY, or FITNESS FOR A
+      PARTICULAR PURPOSE. You are solely responsible for determining the
+      appropriateness of using or redistributing the Work and assume any
+      risks associated with Your exercise of permissions under this License.
+
+   8. Limitation of Liability. In no event and under no legal theory,
+      whether in tort (including negligence), contract, or otherwise,
+      unless required by applicable law (such as deliberate and grossly
+      negligent acts) or agreed to in writing, shall any Contributor be
+      liable to You for damages, including any direct, indirect, special,
+      incidental, or consequential damages of any character arising as a
+      result of this License or out of the use or inability to use the
+      Work (including but not limited to damages for loss of goodwill,
+      work stoppage, computer failure or malfunction, or any and all
+      other commercial damages or losses), even if such Contributor
+      has been advised of the possibility of such damages.
+
+   9. Accepting Warranty or Additional Liability. While redistributing
+      the Work or Derivative Works thereof, You may choose to offer,
+      and charge a fee for, acceptance of support, warranty, indemnity,
+      or other liability obligations and/or rights consistent with this
+      License. However, in accepting such obligations, You may act only
+      on Your own behalf and on Your sole responsibility, not on behalf
+      of any other Contributor, and only if You agree to indemnify,
+      defend, and hold each Contributor harmless for any liability
+      incurred by, or claims asserted against, such Contributor by reason
+      of your accepting any such warranty or additional liability.
+
+   END OF TERMS AND CONDITIONS
+
+   APPENDIX: How to apply the Apache License to your work.
+
+      To apply the Apache License to your work, attach the following
+      boilerplate notice, with the fields enclosed by brackets "[]"
+      replaced with your own identifying information. (Don't include
+      the brackets!)  The text should be enclosed in the appropriate
+      comment syntax for the file format. We also recommend that a
+      file or class name and description of purpose be included on the
+      same "printed page" as the copyright notice for easier
+      identification within third-party archives.
+
+   Copyright [yyyy] [name of copyright owner]
+
+   Licensed under the Apache License, Version 2.0 (the "License");
+   you may not use this file except in compliance with the License.
+   You may obtain a copy of the License at
+
+       http://www.apache.org/licenses/LICENSE-2.0
+
+   Unless required by applicable law or agreed to in writing, software
+   distributed under the License is distributed on an "AS IS" BASIS,
+   WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+   See the License for the specific language governing permissions and
+   limitations under the License.
diff --git a/src/main/resources/META-INF/NOTICE b/src/main/resources/META-INF/NOTICE
new file mode 100644
index 0000000..05117dd
--- /dev/null
+++ b/src/main/resources/META-INF/NOTICE
@@ -0,0 +1,8 @@
+Apache Sling Jackrabbit JSR-283 Access Control Manager Support
+Copyright 2008-2009 The Apache Software Foundation
+
+Apache Sling is based on source code originally developed 
+by Day Software (http://www.day.com/).
+
+This product includes software developed at
+The Apache Software Foundation (http://www.apache.org/).

-- 
To stop receiving notification emails like this one, please contact
"commits@sling.apache.org" <co...@sling.apache.org>.

[sling-org-apache-sling-jcr-jackrabbit-accessmanager] 12/16: Use next dev version of parent pom

Posted by ro...@apache.org.
This is an automated email from the ASF dual-hosted git repository.

rombert pushed a commit to annotated tag org.apache.sling.jcr.jackrabbit.accessmanager-2.0.2-incubator
in repository https://gitbox.apache.org/repos/asf/sling-org-apache-sling-jcr-jackrabbit-accessmanager.git

commit 9f5f16d2f3a76a06ea454017fb0ec70ae7564467
Author: Carsten Ziegeler <cz...@apache.org>
AuthorDate: Tue May 5 17:11:34 2009 +0000

    Use next dev version of parent pom
    
    git-svn-id: https://svn.apache.org/repos/asf/incubator/sling/trunk/bundles/jcr/jackrabbit-accessmanager@771937 13f79535-47bb-0310-9956-ffa450edef68
---
 pom.xml | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/pom.xml b/pom.xml
index 158ce07..fe832c9 100644
--- a/pom.xml
+++ b/pom.xml
@@ -4,7 +4,7 @@
 	<parent>
 		<groupId>org.apache.sling</groupId>
 		<artifactId>sling</artifactId>
-		<version>5-incubator</version>
+		<version>6-incubator-SNAPSHOT</version>
 		<relativePath>../../../parent/pom.xml</relativePath>
 	</parent>
 

-- 
To stop receiving notification emails like this one, please contact
"commits@sling.apache.org" <co...@sling.apache.org>.

[sling-org-apache-sling-jcr-jackrabbit-accessmanager] 04/16: SLING-941: Lots of svn:eol-style settings missing

Posted by ro...@apache.org.
This is an automated email from the ASF dual-hosted git repository.

rombert pushed a commit to annotated tag org.apache.sling.jcr.jackrabbit.accessmanager-2.0.2-incubator
in repository https://gitbox.apache.org/repos/asf/sling-org-apache-sling-jcr-jackrabbit-accessmanager.git

commit 1ab84c7550fae2ea64af1ccdc897aa8e0a76a797
Author: Jukka Zitting <ju...@apache.org>
AuthorDate: Fri Apr 24 12:27:24 2009 +0000

    SLING-941: Lots of svn:eol-style settings missing
    
    Set svn:eol-style to native on all XML files that lack the setting.
    
    git-svn-id: https://svn.apache.org/repos/asf/incubator/sling/trunk/bundles/jcr/jackrabbit-accessmanager@768273 13f79535-47bb-0310-9956-ffa450edef68
---
 pom.xml | 236 ++++++++++++++++++++++++++++++++--------------------------------
 1 file changed, 118 insertions(+), 118 deletions(-)

diff --git a/pom.xml b/pom.xml
index b51abe4..39c8b6a 100644
--- a/pom.xml
+++ b/pom.xml
@@ -1,119 +1,119 @@
-<project xmlns="http://maven.apache.org/POM/4.0.0"
-	xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
-	xsi:schemaLocation="http://maven.apache.org/POM/4.0.0 http://maven.apache.org/maven-v4_0_0.xsd">
-	
-	<modelVersion>4.0.0</modelVersion>
-	<parent>
-		<groupId>org.apache.sling</groupId>
-		<artifactId>sling</artifactId>
-		<version>5-incubator-SNAPSHOT</version>
-		<relativePath>../../../parent/pom.xml</relativePath>
-	</parent>
-
-	<artifactId>org.apache.sling.jcr.jackrabbit.accessmanager</artifactId>
-	<packaging>bundle</packaging>
-	<version>2.0.0-incubator-SNAPSHOT</version>
-	<name>Apache Sling Jackrabbit JSR-283 Access Control Manager Support</name>
-	<description>
-		Provides SlingPostOperations for the Jackrabbit JSR-283 Access Control Manager.
-	</description>
-
-	<scm>
-		<connection>
-			scm:svn:http://svn.apache.org/repos/asf/incubator/sling/trunk/bundles/jcr/jackrabbit-accessmanager
-		</connection>
-		<developerConnection>
-			scm:svn:https://svn.apache.org/repos/asf/incubator/sling/trunk/bundles/jcr/jackrabbit-accessmanager
-		</developerConnection>
-		<url>
-			http://svn.apache.org/viewvc/incubator/sling/trunk/bundles/jcr/jackrabbit-accessmanager
-		</url>
-	</scm>
-
-	<build>
-		<plugins>
-			<plugin>
-				<groupId>org.apache.felix</groupId>
-				<artifactId>maven-scr-plugin</artifactId>
-			</plugin>
-			<plugin>
-				<groupId>org.apache.felix</groupId>
-				<artifactId>maven-bundle-plugin</artifactId>
-				<extensions>true</extensions>
-				<configuration>
-					<instructions>
-						<Private-Package>
-						</Private-Package>
-						<Export-Package>
-                     org.apache.sling.jcr.jackrabbit.accessmanager;version=${pom.version},
-                     org.apache.sling.jcr.jackrabbit.accessmanager.post;version=${pom.version}                   
-						</Export-Package>
-						<Sling-Initial-Content></Sling-Initial-Content>
-						<Sling-Nodetypes></Sling-Nodetypes>
-					</instructions>
-				</configuration>
-			</plugin>
-		</plugins>
-	</build>
-
-	<reporting>
-		<plugins>
-			<plugin>
-				<groupId>org.apache.maven.plugins</groupId>
-				<artifactId>maven-javadoc-plugin</artifactId>
-				<configuration>
-					<!-- No javadocs -->
-					<excludePackageNames>
-					</excludePackageNames>
-				</configuration>
-			</plugin>
-		</plugins>
-	</reporting>
-
-	<dependencies>
-		<dependency>
-			<groupId>javax.servlet</groupId>
-			<artifactId>servlet-api</artifactId>
-		</dependency>
-		
-      <dependency>
-         <groupId>org.apache.sling</groupId>
-         <artifactId>org.apache.sling.commons.json</artifactId>
-         <version>2.0.3-incubator-SNAPSHOT</version>
-      </dependency>
-		
-		<dependency>
-			<groupId>org.apache.sling</groupId>
-			<artifactId>org.apache.sling.api</artifactId>
-			<version>2.0.3-incubator-SNAPSHOT</version>
-		</dependency>
-		<dependency>
-			<groupId>org.apache.sling</groupId>
-			<artifactId>org.apache.sling.servlets.post</artifactId>
-			<version>2.0.3-incubator-SNAPSHOT</version>
-		</dependency>
-		<dependency>
-			<groupId>org.apache.sling</groupId>
-			<artifactId>org.apache.sling.jcr.jackrabbit.api</artifactId>
-			<version>2.0.3-incubator-SNAPSHOT</version>
-		</dependency>
-		<dependency>
-			<groupId>org.apache.sling</groupId>
-			<artifactId>org.apache.sling.jcr.base</artifactId>
-			<version>2.0.3-incubator-SNAPSHOT</version>
-		</dependency>
-		<dependency>
-			<groupId>org.apache.jackrabbit</groupId>
-			<artifactId>jackrabbit-api</artifactId>
-			<version>1.5.0</version>
-		</dependency>
-		<dependency>
-			<groupId>org.apache.felix</groupId>
-			<artifactId>org.osgi.core</artifactId>
-		</dependency>
-		<dependency>
-			<groupId>org.apache.felix</groupId>
-			<artifactId>org.osgi.compendium</artifactId>
-		</dependency>
-	</dependencies>
+<project xmlns="http://maven.apache.org/POM/4.0.0"
+	xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
+	xsi:schemaLocation="http://maven.apache.org/POM/4.0.0 http://maven.apache.org/maven-v4_0_0.xsd">
+	
+	<modelVersion>4.0.0</modelVersion>
+	<parent>
+		<groupId>org.apache.sling</groupId>
+		<artifactId>sling</artifactId>
+		<version>5-incubator-SNAPSHOT</version>
+		<relativePath>../../../parent/pom.xml</relativePath>
+	</parent>
+
+	<artifactId>org.apache.sling.jcr.jackrabbit.accessmanager</artifactId>
+	<packaging>bundle</packaging>
+	<version>2.0.0-incubator-SNAPSHOT</version>
+	<name>Apache Sling Jackrabbit JSR-283 Access Control Manager Support</name>
+	<description>
+		Provides SlingPostOperations for the Jackrabbit JSR-283 Access Control Manager.
+	</description>
+
+	<scm>
+		<connection>
+			scm:svn:http://svn.apache.org/repos/asf/incubator/sling/trunk/bundles/jcr/jackrabbit-accessmanager
+		</connection>
+		<developerConnection>
+			scm:svn:https://svn.apache.org/repos/asf/incubator/sling/trunk/bundles/jcr/jackrabbit-accessmanager
+		</developerConnection>
+		<url>
+			http://svn.apache.org/viewvc/incubator/sling/trunk/bundles/jcr/jackrabbit-accessmanager
+		</url>
+	</scm>
+
+	<build>
+		<plugins>
+			<plugin>
+				<groupId>org.apache.felix</groupId>
+				<artifactId>maven-scr-plugin</artifactId>
+			</plugin>
+			<plugin>
+				<groupId>org.apache.felix</groupId>
+				<artifactId>maven-bundle-plugin</artifactId>
+				<extensions>true</extensions>
+				<configuration>
+					<instructions>
+						<Private-Package>
+						</Private-Package>
+						<Export-Package>
+                     org.apache.sling.jcr.jackrabbit.accessmanager;version=${pom.version},
+                     org.apache.sling.jcr.jackrabbit.accessmanager.post;version=${pom.version}                   
+						</Export-Package>
+						<Sling-Initial-Content></Sling-Initial-Content>
+						<Sling-Nodetypes></Sling-Nodetypes>
+					</instructions>
+				</configuration>
+			</plugin>
+		</plugins>
+	</build>
+
+	<reporting>
+		<plugins>
+			<plugin>
+				<groupId>org.apache.maven.plugins</groupId>
+				<artifactId>maven-javadoc-plugin</artifactId>
+				<configuration>
+					<!-- No javadocs -->
+					<excludePackageNames>
+					</excludePackageNames>
+				</configuration>
+			</plugin>
+		</plugins>
+	</reporting>
+
+	<dependencies>
+		<dependency>
+			<groupId>javax.servlet</groupId>
+			<artifactId>servlet-api</artifactId>
+		</dependency>
+		
+      <dependency>
+         <groupId>org.apache.sling</groupId>
+         <artifactId>org.apache.sling.commons.json</artifactId>
+         <version>2.0.3-incubator-SNAPSHOT</version>
+      </dependency>
+		
+		<dependency>
+			<groupId>org.apache.sling</groupId>
+			<artifactId>org.apache.sling.api</artifactId>
+			<version>2.0.3-incubator-SNAPSHOT</version>
+		</dependency>
+		<dependency>
+			<groupId>org.apache.sling</groupId>
+			<artifactId>org.apache.sling.servlets.post</artifactId>
+			<version>2.0.3-incubator-SNAPSHOT</version>
+		</dependency>
+		<dependency>
+			<groupId>org.apache.sling</groupId>
+			<artifactId>org.apache.sling.jcr.jackrabbit.api</artifactId>
+			<version>2.0.3-incubator-SNAPSHOT</version>
+		</dependency>
+		<dependency>
+			<groupId>org.apache.sling</groupId>
+			<artifactId>org.apache.sling.jcr.base</artifactId>
+			<version>2.0.3-incubator-SNAPSHOT</version>
+		</dependency>
+		<dependency>
+			<groupId>org.apache.jackrabbit</groupId>
+			<artifactId>jackrabbit-api</artifactId>
+			<version>1.5.0</version>
+		</dependency>
+		<dependency>
+			<groupId>org.apache.felix</groupId>
+			<artifactId>org.osgi.core</artifactId>
+		</dependency>
+		<dependency>
+			<groupId>org.apache.felix</groupId>
+			<artifactId>org.osgi.compendium</artifactId>
+		</dependency>
+	</dependencies>
 </project>
\ No newline at end of file

-- 
To stop receiving notification emails like this one, please contact
"commits@sling.apache.org" <co...@sling.apache.org>.

[sling-org-apache-sling-jcr-jackrabbit-accessmanager] 03/16: SLING-941: Lots of svn:eol-style settings missing

Posted by ro...@apache.org.
This is an automated email from the ASF dual-hosted git repository.

rombert pushed a commit to annotated tag org.apache.sling.jcr.jackrabbit.accessmanager-2.0.2-incubator
in repository https://gitbox.apache.org/repos/asf/sling-org-apache-sling-jcr-jackrabbit-accessmanager.git

commit 1431cb128f3ddb9b614ba207c14b79b4dd2ef250
Author: Jukka Zitting <ju...@apache.org>
AuthorDate: Fri Apr 24 12:14:03 2009 +0000

    SLING-941: Lots of svn:eol-style settings missing
    
    Set svn:eol-style to native on all Java files that lack the setting.
    
    git-svn-id: https://svn.apache.org/repos/asf/incubator/sling/trunk/bundles/jcr/jackrabbit-accessmanager@768268 13f79535-47bb-0310-9956-ffa450edef68
---
 .../jackrabbit/accessmanager/PrivilegesInfo.java   | 1232 ++++++++++----------
 .../post/AbstractAccessPostServlet.java            |  508 ++++----
 .../accessmanager/post/DeleteAcesServlet.java      |  256 ++--
 .../accessmanager/post/GetAclServlet.java          |  360 +++---
 .../accessmanager/post/ModifyAceServlet.java       |  482 ++++----
 .../accessmanager/PrivilegesResources.properties   |   44 +-
 6 files changed, 1441 insertions(+), 1441 deletions(-)

diff --git a/src/main/java/org/apache/sling/jcr/jackrabbit/accessmanager/PrivilegesInfo.java b/src/main/java/org/apache/sling/jcr/jackrabbit/accessmanager/PrivilegesInfo.java
index aef7a29..3143650 100644
--- a/src/main/java/org/apache/sling/jcr/jackrabbit/accessmanager/PrivilegesInfo.java
+++ b/src/main/java/org/apache/sling/jcr/jackrabbit/accessmanager/PrivilegesInfo.java
@@ -1,616 +1,616 @@
-/*
- * Licensed to the Apache Software Foundation (ASF) under one or more
- * contributor license agreements.  See the NOTICE file distributed with
- * this work for additional information regarding copyright ownership.
- * The ASF licenses this file to You under the Apache License, Version 2.0
- * (the "License"); you may not use this file except in compliance with
- * the License.  You may obtain a copy of the License at
- *
- *      http://www.apache.org/licenses/LICENSE-2.0
- *
- * Unless required by applicable law or agreed to in writing, software
- * distributed under the License is distributed on an "AS IS" BASIS,
- * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
- * See the License for the specific language governing permissions and
- * limitations under the License.
- */
-package org.apache.sling.jcr.jackrabbit.accessmanager;
-
-import java.lang.reflect.InvocationTargetException;
-import java.lang.reflect.Method;
-import java.security.Principal;
-import java.util.Arrays;
-import java.util.HashSet;
-import java.util.Iterator;
-import java.util.LinkedHashMap;
-import java.util.Locale;
-import java.util.Map;
-import java.util.ResourceBundle;
-import java.util.Set;
-
-import javax.jcr.Node;
-import javax.jcr.RepositoryException;
-import javax.jcr.Session;
-
-import org.apache.jackrabbit.api.jsr283.security.AccessControlEntry;
-import org.apache.jackrabbit.api.jsr283.security.AccessControlList;
-import org.apache.jackrabbit.api.jsr283.security.AccessControlManager;
-import org.apache.jackrabbit.api.jsr283.security.AccessControlPolicy;
-import org.apache.jackrabbit.api.jsr283.security.Privilege;
-import org.apache.jackrabbit.api.security.principal.PrincipalManager;
-import org.apache.sling.jcr.base.util.AccessControlUtil;
-
-/**
- * Helper class to assist in the usage of access control from scripts.
- */
-public class PrivilegesInfo {
-	
-	/**
-	 * Return the supported Privileges for the specified node.
-	 * 
-	 * @param node the node to check
-	 * @return array of Privileges
-	 * @throws RepositoryException
-	 */
-	public Privilege [] getSupportedPrivileges(Node node) throws RepositoryException {
-		return getSupportedPrivileges(node.getSession(), node.getPath());
-	}
-	
-	/**
-	 * Returns the supported privileges for the specified path.
-	 * 
-	 * @param session the session for the current user
-	 * @param absPath the path to get the privileges for
-	 * @return array of Privileges
-	 * @throws RepositoryException
-	 */
-	public Privilege [] getSupportedPrivileges(Session session, String absPath) throws RepositoryException {
-		AccessControlManager accessControlManager = AccessControlUtil.getAccessControlManager(session);
-		Privilege[] supportedPrivileges = accessControlManager.getSupportedPrivileges(absPath);
-		return supportedPrivileges;
-	}
-	
-	/**
-	 * Wrapper class that holds the set of Privileges that are granted 
-	 * and/or denied for a specific principal.
-	 */
-	public static class AccessRights {
-		private Set<Privilege> granted = new HashSet<Privilege>();
-		private Set<Privilege> denied = new HashSet<Privilege>();
-
-		private transient static ResourceBundle resBundle = null; 
-		private ResourceBundle getResourceBundle(Locale locale) {
-			if (resBundle == null || !resBundle.getLocale().equals(locale)) {
-				resBundle = ResourceBundle.getBundle(getClass().getPackage().getName() + ".PrivilegesResources", locale);
-			}
-			return resBundle;
-		}
-		
-
-		public Set<Privilege> getGranted() {
-			return granted;
-		}
-		public Set<Privilege> getDenied() {
-			return denied;
-		}
-		
-		public String getPrivilegeSetDisplayName(Locale locale) {
-			if (denied != null && !denied.isEmpty()) {
-				//if there are any denied privileges, then this is a custom privilege set
-				return getResourceBundle(locale).getString("privilegeset.custom");
-			} else {
-				if (granted.isEmpty()) {
-					//appears to have an empty privilege set
-					return getResourceBundle(locale).getString("privilegeset.none");
-				}
-					
-				if (granted.size() == 1) {
-					//check if the single privilege is jcr:all or jcr:read
-					Iterator<Privilege> iterator = granted.iterator();
-					Privilege next = iterator.next();
-					if ("jcr:all".equals(next.getName())) {
-						//full control privilege set
-						return getResourceBundle(locale).getString("privilegeset.all");
-					} else if ("jcr:read".equals(next.getName())) {
-						//readonly privilege set
-						return getResourceBundle(locale).getString("privilegeset.readonly");
-					} 
-				} else if (granted.size() == 2) {
-					//check if the two privileges are jcr:read and jcr:write
-					Iterator<Privilege> iterator = granted.iterator();
-					Privilege next = iterator.next();
-					Privilege next2 = iterator.next();
-					if ( ("jcr:read".equals(next.getName()) && "jcr:write".equals(next2.getName())) ||
-							("jcr:read".equals(next2.getName()) && "jcr:write".equals(next.getName())) ) {
-						//read/write privileges
-						return getResourceBundle(locale).getString("privilegeset.readwrite");
-					}
-				}
-
-				//some other set of privileges
-				return getResourceBundle(locale).getString("privilegeset.custom");
-			}
-		}
-	}
-
-	/**
-	 * Returns the mapping of declared access rights that have been set for the resource at
-	 * the given path. 
-	 * 
-	 * @param node the node to get the access rights for
-	 * @return map of access rights.  Key is the user/group principal, value contains the granted/denied privileges
-	 * @throws RepositoryException
-	 */
-	public Map<Principal, AccessRights> getDeclaredAccessRights(Node node) throws RepositoryException {
-		Map<Principal, AccessRights> accessRights = getDeclaredAccessRights(node.getSession(), node.getPath());
-		return accessRights;
-	}
-	
-	/**
-	 * Returns the mapping of declared access rights that have been set for the resource at
-	 * the given path. 
-	 * 
-	 * @param session the current user session.
-	 * @param absPath the path of the resource to get the access rights for
-	 * @return map of access rights.  Key is the user/group principal, value contains the granted/denied privileges
-	 * @throws RepositoryException
-	 */
-	public Map<Principal, AccessRights> getDeclaredAccessRights(Session session, String absPath) throws RepositoryException {
-		Map<Principal, AccessRights> accessMap = new LinkedHashMap<Principal, AccessRights>();
-		AccessControlEntry[] entries = getDeclaredAccessControlEntries(session, absPath);
-		if (entries != null) {
-			for (AccessControlEntry ace : entries) {
-				Principal principal = ace.getPrincipal();
-				AccessRights accessPrivleges = accessMap.get(principal);
-				if (accessPrivleges == null) {
-					accessPrivleges = new AccessRights();
-					accessMap.put(principal, accessPrivleges);
-				}
-				boolean allow = AccessControlUtil.isAllow(ace);
-				if (allow) {
-					accessPrivleges.getGranted().addAll(Arrays.asList(ace.getPrivileges()));
-				} else {
-					accessPrivleges.getDenied().addAll(Arrays.asList(ace.getPrivileges()));
-				}
-			}
-		}
-		
-		return accessMap;
-	}
-
-	private AccessControlEntry[] getDeclaredAccessControlEntries(Session session, String absPath) throws RepositoryException {
-		AccessControlManager accessControlManager = AccessControlUtil.getAccessControlManager(session);
-		AccessControlPolicy[] policies = accessControlManager.getPolicies(absPath);
-		for (AccessControlPolicy accessControlPolicy : policies) {
-			if (accessControlPolicy instanceof AccessControlList) {
-				AccessControlEntry[] accessControlEntries = ((AccessControlList)accessControlPolicy).getAccessControlEntries();
-				return accessControlEntries;
-			}
-		}
-		return new AccessControlEntry[0];
-	}
-
-	/**
-	 * Returns the declared access rights for the specified Node for the given
-	 * principalId.
-	 * 
-	 * @param node the JCR node to retrieve the access rights for
-	 * @param principalId the principalId to get the access rights for
-	 * @return access rights for the specified principal
-	 * @throws RepositoryException
-	 */
-	public AccessRights getDeclaredAccessRightsForPrincipal(Node node, String principalId) throws RepositoryException {
-		return getDeclaredAccessRightsForPrincipal(node.getSession(), node.getPath(), principalId);
-	}
-
-	/**
-	 * Returns the declared access rights for the resource at the specified path for the given
-	 * principalId.
-	 * 
-	 * @param session the current JCR session
-	 * @param absPath the path of the resource to retrieve the rights for
-	 * @param principalId the principalId to get the access rights for
-	 * @return access rights for the specified principal
-	 * @throws RepositoryException
-	 */
-	public AccessRights getDeclaredAccessRightsForPrincipal(Session session, String absPath, String principalId) throws RepositoryException {
-		AccessRights rights = new AccessRights();
-		if (principalId != null && principalId.length() > 0) {
-			AccessControlManager accessControlManager = AccessControlUtil.getAccessControlManager(session);
-			AccessControlPolicy[] policies = accessControlManager.getPolicies(absPath);
-			for (AccessControlPolicy accessControlPolicy : policies) {
-				if (accessControlPolicy instanceof AccessControlList) {
-					AccessControlEntry[] accessControlEntries = ((AccessControlList)accessControlPolicy).getAccessControlEntries();
-					for (AccessControlEntry ace : accessControlEntries) {
-						if (principalId.equals(ace.getPrincipal().getName())) {
-							boolean isAllow = AccessControlUtil.isAllow(ace);
-							if (isAllow) {
-								rights.getGranted().addAll(Arrays.asList(ace.getPrivileges()));
-							} else {
-								rights.getDenied().addAll(Arrays.asList(ace.getPrivileges()));
-							}
-						}
-					}
-				}
-			}
-		}
-		
-		return rights;
-	}
-	
-
-	
-	
-	/**
-	 * Returns the mapping of effective access rights that have been set for the resource at
-	 * the given path. 
-	 * 
-	 * @param node the node to get the access rights for
-	 * @return map of access rights.  Key is the user/group principal, value contains the granted/denied privileges
-	 * @throws RepositoryException
-	 */
-	public Map<Principal, AccessRights> getEffectiveAccessRights(Node node) throws RepositoryException {
-		Map<Principal, AccessRights> accessRights = getEffectiveAccessRights(node.getSession(), node.getPath());
-		return accessRights;
-	}
-	
-	/**
-	 * Returns the mapping of effective access rights that have been set for the resource at
-	 * the given path. 
-	 * 
-	 * @param session the current user session.
-	 * @param absPath the path of the resource to get the access rights for
-	 * @return map of access rights.  Key is the user/group principal, value contains the granted/denied privileges
-	 * @throws RepositoryException
-	 */
-	public Map<Principal, AccessRights> getEffectiveAccessRights(Session session, String absPath) throws RepositoryException {
-		Map<Principal, AccessRights> accessMap = new LinkedHashMap<Principal, AccessRights>();
-		AccessControlEntry[] entries = getEffectiveAccessControlEntries(session, absPath);
-		if (entries != null) {
-			for (AccessControlEntry ace : entries) {
-				Principal principal = ace.getPrincipal();
-				AccessRights accessPrivleges = accessMap.get(principal);
-				if (accessPrivleges == null) {
-					accessPrivleges = new AccessRights();
-					accessMap.put(principal, accessPrivleges);
-				}
-				boolean allow = AccessControlUtil.isAllow(ace);
-				if (allow) {
-					accessPrivleges.getGranted().addAll(Arrays.asList(ace.getPrivileges()));
-				} else {
-					accessPrivleges.getDenied().addAll(Arrays.asList(ace.getPrivileges()));
-				}
-			}
-		}
-		
-		return accessMap;
-	}
-	
-	private AccessControlEntry[] getEffectiveAccessControlEntries(Session session, String absPath) throws RepositoryException {
-		AccessControlManager accessControlManager = AccessControlUtil.getAccessControlManager(session);
-		AccessControlPolicy[] policies = accessControlManager.getEffectivePolicies(absPath);
-		for (AccessControlPolicy accessControlPolicy : policies) {
-			if (accessControlPolicy instanceof AccessControlList) {
-				AccessControlEntry[] accessControlEntries = ((AccessControlList)accessControlPolicy).getAccessControlEntries();
-				return accessControlEntries;
-			}
-		}
-		return new AccessControlEntry[0];
-	}
-
-	/**
-	 * Returns the effective access rights for the specified Node for the given
-	 * principalId.
-	 * 
-	 * @param node the JCR node to retrieve the access rights for
-	 * @param principalId the principalId to get the access rights for
-	 * @return access rights for the specified principal
-	 * @throws RepositoryException
-	 */
-	public AccessRights getEffectiveAccessRightsForPrincipal(Node node, String principalId) throws RepositoryException {
-		return getEffectiveAccessRightsForPrincipal(node.getSession(), node.getPath(), principalId);
-	}
-
-	/**
-	 * Returns the effective access rights for the resource at the specified path for the given
-	 * principalId.
-	 * 
-	 * @param session the current JCR session
-	 * @param absPath the path of the resource to retrieve the rights for
-	 * @param principalId the principalId to get the access rights for
-	 * @return access rights for the specified principal
-	 * @throws RepositoryException
-	 */
-	public AccessRights getEffectiveAccessRightsForPrincipal(Session session, String absPath, String principalId) throws RepositoryException {
-		AccessRights rights = new AccessRights();
-		if (principalId != null && principalId.length() > 0) {
-			AccessControlManager accessControlManager = AccessControlUtil.getAccessControlManager(session);
-			AccessControlPolicy[] policies = accessControlManager.getEffectivePolicies(absPath);
-			for (AccessControlPolicy accessControlPolicy : policies) {
-				if (accessControlPolicy instanceof AccessControlList) {
-					AccessControlEntry[] accessControlEntries = ((AccessControlList)accessControlPolicy).getAccessControlEntries();
-					for (AccessControlEntry ace : accessControlEntries) {
-						if (principalId.equals(ace.getPrincipal().getName())) {
-							boolean isAllow = AccessControlUtil.isAllow(ace);
-							if (isAllow) {
-								rights.getGranted().addAll(Arrays.asList(ace.getPrivileges()));
-							} else {
-								rights.getDenied().addAll(Arrays.asList(ace.getPrivileges()));
-							}
-						}
-					}
-				}
-			}
-		}
-		
-		return rights;
-	}
-	
-	
-	
-	/**
-	 * Checks whether the current user has been granted privileges
-	 * to add children to the specified node.
-	 *  
-	 * @param node the node to check
-	 * @return true if the current user has the privileges, false otherwise
-	 */
-	public boolean canAddChildren(Node node) {
-		try {
-			return canAddChildren(node.getSession(), node.getPath());
-		} catch (RepositoryException e) {
-			return false;
-		}
-	}
-	
-	/**
-	 * Checks whether the current user has been granted privileges
-	 * to add children to the specified path.
-	 *  
-	 * @param session the JCR session of the current user
-	 * @param absPath the path of the resource to check
-	 * @return true if the current user has the privileges, false otherwise
-	 */
-	public boolean canAddChildren(Session session, String absPath) {
-		try {
-			AccessControlManager accessControlManager = AccessControlUtil.getAccessControlManager(session);
-			return accessControlManager.hasPrivileges(absPath, new Privilege[] {
-							accessControlManager.privilegeFromName(Privilege.JCR_ADD_CHILD_NODES)
-						});
-		} catch (RepositoryException e) {
-			return false;
-		}
-	}
-	
-	/**
-	 * Checks whether the current user has been granted privileges
-	 * to delete children to the specified node.
-	 *  
-	 * @param node the node to check
-	 * @return true if the current user has the privileges, false otherwise
-	 */
-	public boolean canDeleteChildren(Node node) {
-		try {
-			return canDeleteChildren(node.getSession(), node.getPath());
-		} catch (RepositoryException e) {
-			return false;
-		}
-	}
-
-	/**
-	 * Checks whether the current user has been granted privileges
-	 * to delete children of the specified path.
-	 *  
-	 * @param session the JCR session of the current user
-	 * @param absPath the path of the resource to check
-	 * @return true if the current user has the privileges, false otherwise
-	 */
-	public boolean canDeleteChildren(Session session, String absPath) {
-		try {
-			AccessControlManager accessControlManager = AccessControlUtil.getAccessControlManager(session);
-			
-			return accessControlManager.hasPrivileges(absPath, new Privilege[] {
-							accessControlManager.privilegeFromName(Privilege.JCR_REMOVE_CHILD_NODES)
-						});
-		} catch (RepositoryException e) {
-			return false;
-		}
-	}
-	
-	/**
-	 * Checks whether the current user has been granted privileges
-	 * to delete the specified node.
-	 *  
-	 * @param node the node to check
-	 * @return true if the current user has the privileges, false otherwise
-	 */
-	public boolean canDelete(Node node) {
-		try {
-			return canDelete(node.getSession(), node.getPath());
-		} catch (RepositoryException e) {
-			return false;
-		}
-	}
-	
-	/**
-	 * Checks whether the current user has been granted privileges
-	 * to delete the specified path.
-	 *  
-	 * @param session the JCR session of the current user
-	 * @param absPath the path of the resource to check
-	 * @return true if the current user has the privileges, false otherwise
-	 */
-	public boolean canDelete(Session session, String absPath) {
-		try {
-			AccessControlManager accessControlManager = AccessControlUtil.getAccessControlManager(session);
-			
-			String parentPath = absPath.substring(0, absPath.lastIndexOf('/'));
-			boolean canDelete = accessControlManager.hasPrivileges(absPath, new Privilege[] {
-							accessControlManager.privilegeFromName(Privilege.JCR_REMOVE_NODE)
-						}) && canDeleteChildren(session, parentPath);
-			return canDelete;
-		} catch (RepositoryException e) {
-			return false;
-		}
-	}
-
-	/**
-	 * Checks whether the current user has been granted privileges
-	 * to modify properties of the specified node.
-	 *  
-	 * @param node the node to check
-	 * @return true if the current user has the privileges, false otherwise
-	 */
-	public boolean canModifyProperties(Node node) {
-		try {
-			return canModifyProperties(node.getSession(), node.getPath());
-		} catch (RepositoryException e) {
-			return false;
-		}
-	}
-	
-	/**
-	 * Checks whether the current user has been granted privileges
-	 * to modify properties of the specified path.
-	 *  
-	 * @param session the JCR session of the current user
-	 * @param absPath the path of the resource to check
-	 * @return true if the current user has the privileges, false otherwise
-	 */
-	public boolean canModifyProperties(Session session, String absPath) {
-		try {
-			AccessControlManager accessControlManager = AccessControlUtil.getAccessControlManager(session);
-			return accessControlManager.hasPrivileges(absPath, new Privilege[] {
-							accessControlManager.privilegeFromName(Privilege.JCR_MODIFY_PROPERTIES)
-						});
-		} catch (RepositoryException e) {
-			return false;
-		}
-	}
-	
-	/**
-	 * Checks whether the current user has been granted privileges
-	 * to read the access control of the specified node.
-	 *  
-	 * @param node the node to check
-	 * @return true if the current user has the privileges, false otherwise
-	 */
-	public boolean canReadAccessControl(Node node) {
-		try {
-			return canReadAccessControl(node.getSession(), node.getPath());
-		} catch (RepositoryException e) {
-			return false;
-		}
-	}
-	
-	/**
-	 * Checks whether the current user has been granted privileges
-	 * to read the access control of the specified path.
-	 *  
-	 * @param session the JCR session of the current user
-	 * @param absPath the path of the resource to check
-	 * @return true if the current user has the privileges, false otherwise
-	 */
-	public boolean canReadAccessControl(Session session, String absPath) {
-		try {
-			AccessControlManager accessControlManager = AccessControlUtil.getAccessControlManager(session);
-			return accessControlManager.hasPrivileges(absPath, new Privilege[] {
-							accessControlManager.privilegeFromName(Privilege.JCR_READ_ACCESS_CONTROL)
-						});
-		} catch (RepositoryException e) {
-			return false;
-		}
-	}
-	
-	/**
-	 * Checks whether the current user has been granted privileges
-	 * to modify the access control of the specified node.
-	 *  
-	 * @param node the node to check
-	 * @return true if the current user has the privileges, false otherwise
-	 */
-	public boolean canModifyAccessControl(Node node) {
-		try {
-			return canModifyAccessControl(node.getSession(), node.getPath());
-		} catch (RepositoryException e) {
-			return false;
-		}
-	}
-	
-	/**
-	 * Checks whether the current user has been granted privileges
-	 * to modify the access control of the specified path.
-	 *  
-	 * @param session the JCR session of the current user
-	 * @param absPath the path of the resource to check
-	 * @return true if the current user has the privileges, false otherwise
-	 */
-	public boolean canModifyAccessControl(Session session, String absPath) {
-		try {
-			AccessControlManager accessControlManager = AccessControlUtil.getAccessControlManager(session);
-			return accessControlManager.hasPrivileges(absPath, new Privilege[] {
-							accessControlManager.privilegeFromName(Privilege.JCR_MODIFY_ACCESS_CONTROL)
-						});
-		} catch (RepositoryException e) {
-			return false;
-		}
-	}
-
-
-	/**
-	 * Checks whether the current user has been granted privileges
-	 * to update the properties of the specified principal.
-	 *  
-	 * @param session the JCR session for the current user
-	 * @param principalID the id of the principal to check
-	 * @return true if the current user has the privileges, false otherwise
-	 */
-	public boolean canUpdateAuthorizable(Session session, String principalID) {
-		try {
-			PrincipalManager principalManager = AccessControlUtil.getPrincipalManager(session);
-			Principal principal = principalManager.getPrincipal(principalID);
-			if (principal == null) {
-				return false;
-			}
-
-			String path = getAuthorizableItemPath(principal);
-			return canModifyProperties(session, path);
-		} catch (Exception e) {
-			//just eat it.
-			return false;
-		}
-	}
-	private String getAuthorizableItemPath(Principal principal)
-			throws NoSuchMethodException, IllegalAccessException,
-			InvocationTargetException {
-		//should check if principal implements ItemBasedPrincipal, but it is not visible here so use reflection instead
-		Method method = principal.getClass().getMethod("getPath");
-		String path = (String)method.invoke(principal);
-		return path;
-	}
-	
-	/**
-	 * Checks whether the current user has been granted privileges
-	 * to delete the specified principal.
-	 *  
-	 * @param session the JCR session for the current user
-	 * @param principalID the id of the principal to check
-	 * @return true if the current user has the privileges, false otherwise
-	 */
-	public boolean canDeleteAuthorizable(Session session, String principalID) {
-		try {
-			PrincipalManager principalManager = AccessControlUtil.getPrincipalManager(session);
-			Principal principal = principalManager.getPrincipal(principalID);
-			if (principal == null) {
-				return false;
-			}
-			
-			//should check if principal implements ItemBasedPrincipal, but it is not visible here so use reflection instead
-			String path = getAuthorizableItemPath(principal);
-			return canDelete(session, path);
-		} catch (Exception e) {
-			//just eat it.
-			return false;
-		}
-	}
-}
+/*
+ * Licensed to the Apache Software Foundation (ASF) under one or more
+ * contributor license agreements.  See the NOTICE file distributed with
+ * this work for additional information regarding copyright ownership.
+ * The ASF licenses this file to You under the Apache License, Version 2.0
+ * (the "License"); you may not use this file except in compliance with
+ * the License.  You may obtain a copy of the License at
+ *
+ *      http://www.apache.org/licenses/LICENSE-2.0
+ *
+ * Unless required by applicable law or agreed to in writing, software
+ * distributed under the License is distributed on an "AS IS" BASIS,
+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+ * See the License for the specific language governing permissions and
+ * limitations under the License.
+ */
+package org.apache.sling.jcr.jackrabbit.accessmanager;
+
+import java.lang.reflect.InvocationTargetException;
+import java.lang.reflect.Method;
+import java.security.Principal;
+import java.util.Arrays;
+import java.util.HashSet;
+import java.util.Iterator;
+import java.util.LinkedHashMap;
+import java.util.Locale;
+import java.util.Map;
+import java.util.ResourceBundle;
+import java.util.Set;
+
+import javax.jcr.Node;
+import javax.jcr.RepositoryException;
+import javax.jcr.Session;
+
+import org.apache.jackrabbit.api.jsr283.security.AccessControlEntry;
+import org.apache.jackrabbit.api.jsr283.security.AccessControlList;
+import org.apache.jackrabbit.api.jsr283.security.AccessControlManager;
+import org.apache.jackrabbit.api.jsr283.security.AccessControlPolicy;
+import org.apache.jackrabbit.api.jsr283.security.Privilege;
+import org.apache.jackrabbit.api.security.principal.PrincipalManager;
+import org.apache.sling.jcr.base.util.AccessControlUtil;
+
+/**
+ * Helper class to assist in the usage of access control from scripts.
+ */
+public class PrivilegesInfo {
+	
+	/**
+	 * Return the supported Privileges for the specified node.
+	 * 
+	 * @param node the node to check
+	 * @return array of Privileges
+	 * @throws RepositoryException
+	 */
+	public Privilege [] getSupportedPrivileges(Node node) throws RepositoryException {
+		return getSupportedPrivileges(node.getSession(), node.getPath());
+	}
+	
+	/**
+	 * Returns the supported privileges for the specified path.
+	 * 
+	 * @param session the session for the current user
+	 * @param absPath the path to get the privileges for
+	 * @return array of Privileges
+	 * @throws RepositoryException
+	 */
+	public Privilege [] getSupportedPrivileges(Session session, String absPath) throws RepositoryException {
+		AccessControlManager accessControlManager = AccessControlUtil.getAccessControlManager(session);
+		Privilege[] supportedPrivileges = accessControlManager.getSupportedPrivileges(absPath);
+		return supportedPrivileges;
+	}
+	
+	/**
+	 * Wrapper class that holds the set of Privileges that are granted 
+	 * and/or denied for a specific principal.
+	 */
+	public static class AccessRights {
+		private Set<Privilege> granted = new HashSet<Privilege>();
+		private Set<Privilege> denied = new HashSet<Privilege>();
+
+		private transient static ResourceBundle resBundle = null; 
+		private ResourceBundle getResourceBundle(Locale locale) {
+			if (resBundle == null || !resBundle.getLocale().equals(locale)) {
+				resBundle = ResourceBundle.getBundle(getClass().getPackage().getName() + ".PrivilegesResources", locale);
+			}
+			return resBundle;
+		}
+		
+
+		public Set<Privilege> getGranted() {
+			return granted;
+		}
+		public Set<Privilege> getDenied() {
+			return denied;
+		}
+		
+		public String getPrivilegeSetDisplayName(Locale locale) {
+			if (denied != null && !denied.isEmpty()) {
+				//if there are any denied privileges, then this is a custom privilege set
+				return getResourceBundle(locale).getString("privilegeset.custom");
+			} else {
+				if (granted.isEmpty()) {
+					//appears to have an empty privilege set
+					return getResourceBundle(locale).getString("privilegeset.none");
+				}
+					
+				if (granted.size() == 1) {
+					//check if the single privilege is jcr:all or jcr:read
+					Iterator<Privilege> iterator = granted.iterator();
+					Privilege next = iterator.next();
+					if ("jcr:all".equals(next.getName())) {
+						//full control privilege set
+						return getResourceBundle(locale).getString("privilegeset.all");
+					} else if ("jcr:read".equals(next.getName())) {
+						//readonly privilege set
+						return getResourceBundle(locale).getString("privilegeset.readonly");
+					} 
+				} else if (granted.size() == 2) {
+					//check if the two privileges are jcr:read and jcr:write
+					Iterator<Privilege> iterator = granted.iterator();
+					Privilege next = iterator.next();
+					Privilege next2 = iterator.next();
+					if ( ("jcr:read".equals(next.getName()) && "jcr:write".equals(next2.getName())) ||
+							("jcr:read".equals(next2.getName()) && "jcr:write".equals(next.getName())) ) {
+						//read/write privileges
+						return getResourceBundle(locale).getString("privilegeset.readwrite");
+					}
+				}
+
+				//some other set of privileges
+				return getResourceBundle(locale).getString("privilegeset.custom");
+			}
+		}
+	}
+
+	/**
+	 * Returns the mapping of declared access rights that have been set for the resource at
+	 * the given path. 
+	 * 
+	 * @param node the node to get the access rights for
+	 * @return map of access rights.  Key is the user/group principal, value contains the granted/denied privileges
+	 * @throws RepositoryException
+	 */
+	public Map<Principal, AccessRights> getDeclaredAccessRights(Node node) throws RepositoryException {
+		Map<Principal, AccessRights> accessRights = getDeclaredAccessRights(node.getSession(), node.getPath());
+		return accessRights;
+	}
+	
+	/**
+	 * Returns the mapping of declared access rights that have been set for the resource at
+	 * the given path. 
+	 * 
+	 * @param session the current user session.
+	 * @param absPath the path of the resource to get the access rights for
+	 * @return map of access rights.  Key is the user/group principal, value contains the granted/denied privileges
+	 * @throws RepositoryException
+	 */
+	public Map<Principal, AccessRights> getDeclaredAccessRights(Session session, String absPath) throws RepositoryException {
+		Map<Principal, AccessRights> accessMap = new LinkedHashMap<Principal, AccessRights>();
+		AccessControlEntry[] entries = getDeclaredAccessControlEntries(session, absPath);
+		if (entries != null) {
+			for (AccessControlEntry ace : entries) {
+				Principal principal = ace.getPrincipal();
+				AccessRights accessPrivleges = accessMap.get(principal);
+				if (accessPrivleges == null) {
+					accessPrivleges = new AccessRights();
+					accessMap.put(principal, accessPrivleges);
+				}
+				boolean allow = AccessControlUtil.isAllow(ace);
+				if (allow) {
+					accessPrivleges.getGranted().addAll(Arrays.asList(ace.getPrivileges()));
+				} else {
+					accessPrivleges.getDenied().addAll(Arrays.asList(ace.getPrivileges()));
+				}
+			}
+		}
+		
+		return accessMap;
+	}
+
+	private AccessControlEntry[] getDeclaredAccessControlEntries(Session session, String absPath) throws RepositoryException {
+		AccessControlManager accessControlManager = AccessControlUtil.getAccessControlManager(session);
+		AccessControlPolicy[] policies = accessControlManager.getPolicies(absPath);
+		for (AccessControlPolicy accessControlPolicy : policies) {
+			if (accessControlPolicy instanceof AccessControlList) {
+				AccessControlEntry[] accessControlEntries = ((AccessControlList)accessControlPolicy).getAccessControlEntries();
+				return accessControlEntries;
+			}
+		}
+		return new AccessControlEntry[0];
+	}
+
+	/**
+	 * Returns the declared access rights for the specified Node for the given
+	 * principalId.
+	 * 
+	 * @param node the JCR node to retrieve the access rights for
+	 * @param principalId the principalId to get the access rights for
+	 * @return access rights for the specified principal
+	 * @throws RepositoryException
+	 */
+	public AccessRights getDeclaredAccessRightsForPrincipal(Node node, String principalId) throws RepositoryException {
+		return getDeclaredAccessRightsForPrincipal(node.getSession(), node.getPath(), principalId);
+	}
+
+	/**
+	 * Returns the declared access rights for the resource at the specified path for the given
+	 * principalId.
+	 * 
+	 * @param session the current JCR session
+	 * @param absPath the path of the resource to retrieve the rights for
+	 * @param principalId the principalId to get the access rights for
+	 * @return access rights for the specified principal
+	 * @throws RepositoryException
+	 */
+	public AccessRights getDeclaredAccessRightsForPrincipal(Session session, String absPath, String principalId) throws RepositoryException {
+		AccessRights rights = new AccessRights();
+		if (principalId != null && principalId.length() > 0) {
+			AccessControlManager accessControlManager = AccessControlUtil.getAccessControlManager(session);
+			AccessControlPolicy[] policies = accessControlManager.getPolicies(absPath);
+			for (AccessControlPolicy accessControlPolicy : policies) {
+				if (accessControlPolicy instanceof AccessControlList) {
+					AccessControlEntry[] accessControlEntries = ((AccessControlList)accessControlPolicy).getAccessControlEntries();
+					for (AccessControlEntry ace : accessControlEntries) {
+						if (principalId.equals(ace.getPrincipal().getName())) {
+							boolean isAllow = AccessControlUtil.isAllow(ace);
+							if (isAllow) {
+								rights.getGranted().addAll(Arrays.asList(ace.getPrivileges()));
+							} else {
+								rights.getDenied().addAll(Arrays.asList(ace.getPrivileges()));
+							}
+						}
+					}
+				}
+			}
+		}
+		
+		return rights;
+	}
+	
+
+	
+	
+	/**
+	 * Returns the mapping of effective access rights that have been set for the resource at
+	 * the given path. 
+	 * 
+	 * @param node the node to get the access rights for
+	 * @return map of access rights.  Key is the user/group principal, value contains the granted/denied privileges
+	 * @throws RepositoryException
+	 */
+	public Map<Principal, AccessRights> getEffectiveAccessRights(Node node) throws RepositoryException {
+		Map<Principal, AccessRights> accessRights = getEffectiveAccessRights(node.getSession(), node.getPath());
+		return accessRights;
+	}
+	
+	/**
+	 * Returns the mapping of effective access rights that have been set for the resource at
+	 * the given path. 
+	 * 
+	 * @param session the current user session.
+	 * @param absPath the path of the resource to get the access rights for
+	 * @return map of access rights.  Key is the user/group principal, value contains the granted/denied privileges
+	 * @throws RepositoryException
+	 */
+	public Map<Principal, AccessRights> getEffectiveAccessRights(Session session, String absPath) throws RepositoryException {
+		Map<Principal, AccessRights> accessMap = new LinkedHashMap<Principal, AccessRights>();
+		AccessControlEntry[] entries = getEffectiveAccessControlEntries(session, absPath);
+		if (entries != null) {
+			for (AccessControlEntry ace : entries) {
+				Principal principal = ace.getPrincipal();
+				AccessRights accessPrivleges = accessMap.get(principal);
+				if (accessPrivleges == null) {
+					accessPrivleges = new AccessRights();
+					accessMap.put(principal, accessPrivleges);
+				}
+				boolean allow = AccessControlUtil.isAllow(ace);
+				if (allow) {
+					accessPrivleges.getGranted().addAll(Arrays.asList(ace.getPrivileges()));
+				} else {
+					accessPrivleges.getDenied().addAll(Arrays.asList(ace.getPrivileges()));
+				}
+			}
+		}
+		
+		return accessMap;
+	}
+	
+	private AccessControlEntry[] getEffectiveAccessControlEntries(Session session, String absPath) throws RepositoryException {
+		AccessControlManager accessControlManager = AccessControlUtil.getAccessControlManager(session);
+		AccessControlPolicy[] policies = accessControlManager.getEffectivePolicies(absPath);
+		for (AccessControlPolicy accessControlPolicy : policies) {
+			if (accessControlPolicy instanceof AccessControlList) {
+				AccessControlEntry[] accessControlEntries = ((AccessControlList)accessControlPolicy).getAccessControlEntries();
+				return accessControlEntries;
+			}
+		}
+		return new AccessControlEntry[0];
+	}
+
+	/**
+	 * Returns the effective access rights for the specified Node for the given
+	 * principalId.
+	 * 
+	 * @param node the JCR node to retrieve the access rights for
+	 * @param principalId the principalId to get the access rights for
+	 * @return access rights for the specified principal
+	 * @throws RepositoryException
+	 */
+	public AccessRights getEffectiveAccessRightsForPrincipal(Node node, String principalId) throws RepositoryException {
+		return getEffectiveAccessRightsForPrincipal(node.getSession(), node.getPath(), principalId);
+	}
+
+	/**
+	 * Returns the effective access rights for the resource at the specified path for the given
+	 * principalId.
+	 * 
+	 * @param session the current JCR session
+	 * @param absPath the path of the resource to retrieve the rights for
+	 * @param principalId the principalId to get the access rights for
+	 * @return access rights for the specified principal
+	 * @throws RepositoryException
+	 */
+	public AccessRights getEffectiveAccessRightsForPrincipal(Session session, String absPath, String principalId) throws RepositoryException {
+		AccessRights rights = new AccessRights();
+		if (principalId != null && principalId.length() > 0) {
+			AccessControlManager accessControlManager = AccessControlUtil.getAccessControlManager(session);
+			AccessControlPolicy[] policies = accessControlManager.getEffectivePolicies(absPath);
+			for (AccessControlPolicy accessControlPolicy : policies) {
+				if (accessControlPolicy instanceof AccessControlList) {
+					AccessControlEntry[] accessControlEntries = ((AccessControlList)accessControlPolicy).getAccessControlEntries();
+					for (AccessControlEntry ace : accessControlEntries) {
+						if (principalId.equals(ace.getPrincipal().getName())) {
+							boolean isAllow = AccessControlUtil.isAllow(ace);
+							if (isAllow) {
+								rights.getGranted().addAll(Arrays.asList(ace.getPrivileges()));
+							} else {
+								rights.getDenied().addAll(Arrays.asList(ace.getPrivileges()));
+							}
+						}
+					}
+				}
+			}
+		}
+		
+		return rights;
+	}
+	
+	
+	
+	/**
+	 * Checks whether the current user has been granted privileges
+	 * to add children to the specified node.
+	 *  
+	 * @param node the node to check
+	 * @return true if the current user has the privileges, false otherwise
+	 */
+	public boolean canAddChildren(Node node) {
+		try {
+			return canAddChildren(node.getSession(), node.getPath());
+		} catch (RepositoryException e) {
+			return false;
+		}
+	}
+	
+	/**
+	 * Checks whether the current user has been granted privileges
+	 * to add children to the specified path.
+	 *  
+	 * @param session the JCR session of the current user
+	 * @param absPath the path of the resource to check
+	 * @return true if the current user has the privileges, false otherwise
+	 */
+	public boolean canAddChildren(Session session, String absPath) {
+		try {
+			AccessControlManager accessControlManager = AccessControlUtil.getAccessControlManager(session);
+			return accessControlManager.hasPrivileges(absPath, new Privilege[] {
+							accessControlManager.privilegeFromName(Privilege.JCR_ADD_CHILD_NODES)
+						});
+		} catch (RepositoryException e) {
+			return false;
+		}
+	}
+	
+	/**
+	 * Checks whether the current user has been granted privileges
+	 * to delete children to the specified node.
+	 *  
+	 * @param node the node to check
+	 * @return true if the current user has the privileges, false otherwise
+	 */
+	public boolean canDeleteChildren(Node node) {
+		try {
+			return canDeleteChildren(node.getSession(), node.getPath());
+		} catch (RepositoryException e) {
+			return false;
+		}
+	}
+
+	/**
+	 * Checks whether the current user has been granted privileges
+	 * to delete children of the specified path.
+	 *  
+	 * @param session the JCR session of the current user
+	 * @param absPath the path of the resource to check
+	 * @return true if the current user has the privileges, false otherwise
+	 */
+	public boolean canDeleteChildren(Session session, String absPath) {
+		try {
+			AccessControlManager accessControlManager = AccessControlUtil.getAccessControlManager(session);
+			
+			return accessControlManager.hasPrivileges(absPath, new Privilege[] {
+							accessControlManager.privilegeFromName(Privilege.JCR_REMOVE_CHILD_NODES)
+						});
+		} catch (RepositoryException e) {
+			return false;
+		}
+	}
+	
+	/**
+	 * Checks whether the current user has been granted privileges
+	 * to delete the specified node.
+	 *  
+	 * @param node the node to check
+	 * @return true if the current user has the privileges, false otherwise
+	 */
+	public boolean canDelete(Node node) {
+		try {
+			return canDelete(node.getSession(), node.getPath());
+		} catch (RepositoryException e) {
+			return false;
+		}
+	}
+	
+	/**
+	 * Checks whether the current user has been granted privileges
+	 * to delete the specified path.
+	 *  
+	 * @param session the JCR session of the current user
+	 * @param absPath the path of the resource to check
+	 * @return true if the current user has the privileges, false otherwise
+	 */
+	public boolean canDelete(Session session, String absPath) {
+		try {
+			AccessControlManager accessControlManager = AccessControlUtil.getAccessControlManager(session);
+			
+			String parentPath = absPath.substring(0, absPath.lastIndexOf('/'));
+			boolean canDelete = accessControlManager.hasPrivileges(absPath, new Privilege[] {
+							accessControlManager.privilegeFromName(Privilege.JCR_REMOVE_NODE)
+						}) && canDeleteChildren(session, parentPath);
+			return canDelete;
+		} catch (RepositoryException e) {
+			return false;
+		}
+	}
+
+	/**
+	 * Checks whether the current user has been granted privileges
+	 * to modify properties of the specified node.
+	 *  
+	 * @param node the node to check
+	 * @return true if the current user has the privileges, false otherwise
+	 */
+	public boolean canModifyProperties(Node node) {
+		try {
+			return canModifyProperties(node.getSession(), node.getPath());
+		} catch (RepositoryException e) {
+			return false;
+		}
+	}
+	
+	/**
+	 * Checks whether the current user has been granted privileges
+	 * to modify properties of the specified path.
+	 *  
+	 * @param session the JCR session of the current user
+	 * @param absPath the path of the resource to check
+	 * @return true if the current user has the privileges, false otherwise
+	 */
+	public boolean canModifyProperties(Session session, String absPath) {
+		try {
+			AccessControlManager accessControlManager = AccessControlUtil.getAccessControlManager(session);
+			return accessControlManager.hasPrivileges(absPath, new Privilege[] {
+							accessControlManager.privilegeFromName(Privilege.JCR_MODIFY_PROPERTIES)
+						});
+		} catch (RepositoryException e) {
+			return false;
+		}
+	}
+	
+	/**
+	 * Checks whether the current user has been granted privileges
+	 * to read the access control of the specified node.
+	 *  
+	 * @param node the node to check
+	 * @return true if the current user has the privileges, false otherwise
+	 */
+	public boolean canReadAccessControl(Node node) {
+		try {
+			return canReadAccessControl(node.getSession(), node.getPath());
+		} catch (RepositoryException e) {
+			return false;
+		}
+	}
+	
+	/**
+	 * Checks whether the current user has been granted privileges
+	 * to read the access control of the specified path.
+	 *  
+	 * @param session the JCR session of the current user
+	 * @param absPath the path of the resource to check
+	 * @return true if the current user has the privileges, false otherwise
+	 */
+	public boolean canReadAccessControl(Session session, String absPath) {
+		try {
+			AccessControlManager accessControlManager = AccessControlUtil.getAccessControlManager(session);
+			return accessControlManager.hasPrivileges(absPath, new Privilege[] {
+							accessControlManager.privilegeFromName(Privilege.JCR_READ_ACCESS_CONTROL)
+						});
+		} catch (RepositoryException e) {
+			return false;
+		}
+	}
+	
+	/**
+	 * Checks whether the current user has been granted privileges
+	 * to modify the access control of the specified node.
+	 *  
+	 * @param node the node to check
+	 * @return true if the current user has the privileges, false otherwise
+	 */
+	public boolean canModifyAccessControl(Node node) {
+		try {
+			return canModifyAccessControl(node.getSession(), node.getPath());
+		} catch (RepositoryException e) {
+			return false;
+		}
+	}
+	
+	/**
+	 * Checks whether the current user has been granted privileges
+	 * to modify the access control of the specified path.
+	 *  
+	 * @param session the JCR session of the current user
+	 * @param absPath the path of the resource to check
+	 * @return true if the current user has the privileges, false otherwise
+	 */
+	public boolean canModifyAccessControl(Session session, String absPath) {
+		try {
+			AccessControlManager accessControlManager = AccessControlUtil.getAccessControlManager(session);
+			return accessControlManager.hasPrivileges(absPath, new Privilege[] {
+							accessControlManager.privilegeFromName(Privilege.JCR_MODIFY_ACCESS_CONTROL)
+						});
+		} catch (RepositoryException e) {
+			return false;
+		}
+	}
+
+
+	/**
+	 * Checks whether the current user has been granted privileges
+	 * to update the properties of the specified principal.
+	 *  
+	 * @param session the JCR session for the current user
+	 * @param principalID the id of the principal to check
+	 * @return true if the current user has the privileges, false otherwise
+	 */
+	public boolean canUpdateAuthorizable(Session session, String principalID) {
+		try {
+			PrincipalManager principalManager = AccessControlUtil.getPrincipalManager(session);
+			Principal principal = principalManager.getPrincipal(principalID);
+			if (principal == null) {
+				return false;
+			}
+
+			String path = getAuthorizableItemPath(principal);
+			return canModifyProperties(session, path);
+		} catch (Exception e) {
+			//just eat it.
+			return false;
+		}
+	}
+	private String getAuthorizableItemPath(Principal principal)
+			throws NoSuchMethodException, IllegalAccessException,
+			InvocationTargetException {
+		//should check if principal implements ItemBasedPrincipal, but it is not visible here so use reflection instead
+		Method method = principal.getClass().getMethod("getPath");
+		String path = (String)method.invoke(principal);
+		return path;
+	}
+	
+	/**
+	 * Checks whether the current user has been granted privileges
+	 * to delete the specified principal.
+	 *  
+	 * @param session the JCR session for the current user
+	 * @param principalID the id of the principal to check
+	 * @return true if the current user has the privileges, false otherwise
+	 */
+	public boolean canDeleteAuthorizable(Session session, String principalID) {
+		try {
+			PrincipalManager principalManager = AccessControlUtil.getPrincipalManager(session);
+			Principal principal = principalManager.getPrincipal(principalID);
+			if (principal == null) {
+				return false;
+			}
+			
+			//should check if principal implements ItemBasedPrincipal, but it is not visible here so use reflection instead
+			String path = getAuthorizableItemPath(principal);
+			return canDelete(session, path);
+		} catch (Exception e) {
+			//just eat it.
+			return false;
+		}
+	}
+}
diff --git a/src/main/java/org/apache/sling/jcr/jackrabbit/accessmanager/post/AbstractAccessPostServlet.java b/src/main/java/org/apache/sling/jcr/jackrabbit/accessmanager/post/AbstractAccessPostServlet.java
index aa9cf4c..1d73c6a 100644
--- a/src/main/java/org/apache/sling/jcr/jackrabbit/accessmanager/post/AbstractAccessPostServlet.java
+++ b/src/main/java/org/apache/sling/jcr/jackrabbit/accessmanager/post/AbstractAccessPostServlet.java
@@ -1,254 +1,254 @@
-/*
- * Licensed to the Apache Software Foundation (ASF) under one or more
- * contributor license agreements.  See the NOTICE file distributed with
- * this work for additional information regarding copyright ownership.
- * The ASF licenses this file to You under the Apache License, Version 2.0
- * (the "License"); you may not use this file except in compliance with
- * the License.  You may obtain a copy of the License at
- *
- *      http://www.apache.org/licenses/LICENSE-2.0
- *
- * Unless required by applicable law or agreed to in writing, software
- * distributed under the License is distributed on an "AS IS" BASIS,
- * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
- * See the License for the specific language governing permissions and
- * limitations under the License.
- */
-package org.apache.sling.jcr.jackrabbit.accessmanager.post;
-
-import java.io.IOException;
-import java.util.ArrayList;
-import java.util.List;
-
-import javax.jcr.RepositoryException;
-import javax.jcr.Session;
-import javax.servlet.ServletException;
-import javax.servlet.http.HttpServletRequest;
-import javax.servlet.http.HttpServletResponse;
-
-import org.apache.sling.api.SlingHttpServletRequest;
-import org.apache.sling.api.SlingHttpServletResponse;
-import org.apache.sling.api.resource.ResourceNotFoundException;
-import org.apache.sling.api.resource.ResourceUtil;
-import org.apache.sling.api.servlets.HtmlResponse;
-import org.apache.sling.api.servlets.SlingAllMethodsServlet;
-import org.apache.sling.api.wrappers.SlingRequestPaths;
-import org.apache.sling.servlets.post.Modification;
-import org.apache.sling.servlets.post.SlingPostConstants;
-import org.slf4j.Logger;
-import org.slf4j.LoggerFactory;
-
-/**
- * Base class for all the POST servlets for the AccessManager operations 
- */
-public abstract class AbstractAccessPostServlet extends SlingAllMethodsServlet {
-	private static final long serialVersionUID = -5918670409789895333L;
-
-	/**
-     * default log
-     */
-    private final Logger log = LoggerFactory.getLogger(getClass());
-    
-	/* (non-Javadoc)
-	 * @see org.apache.sling.api.servlets.SlingAllMethodsServlet#doPost(org.apache.sling.api.SlingHttpServletRequest, org.apache.sling.api.SlingHttpServletResponse)
-	 */
-	@Override
-	protected void doPost(SlingHttpServletRequest request,
-			SlingHttpServletResponse httpResponse) throws ServletException,
-			IOException {
-        // prepare the response
-        HtmlResponse htmlResponse = new HtmlResponse();
-        htmlResponse.setReferer(request.getHeader("referer"));
-
-        // calculate the paths
-        String path = getItemPath(request);
-        htmlResponse.setPath(path);
-
-        // location
-        htmlResponse.setLocation(externalizePath(request, path));
-
-        // parent location
-        path = ResourceUtil.getParent(path);
-        if (path != null) {
-        	htmlResponse.setParentLocation(externalizePath(request, path));
-        }
-
-        Session session = request.getResourceResolver().adaptTo(Session.class);
-
-        final List<Modification> changes = new ArrayList<Modification>();
-        
-        try {
-            handleOperation(request, htmlResponse, changes);
-            
-            //TODO: maybe handle SlingAuthorizablePostProcessor handlers here
-            
-            // set changes on html response
-            for(Modification change : changes) {
-                switch ( change.getType() ) {
-                    case MODIFY : htmlResponse.onModified(change.getSource()); break;
-                    case DELETE : htmlResponse.onDeleted(change.getSource()); break;
-                    case MOVE :   htmlResponse.onMoved(change.getSource(), change.getDestination()); break;
-                    case COPY :   htmlResponse.onCopied(change.getSource(), change.getDestination()); break;
-                    case CREATE : htmlResponse.onCreated(change.getSource()); break;
-                    case ORDER : htmlResponse.onChange("ordered", change.getSource(), change.getDestination()); break;
-                }
-            }
-            
-            if (session.hasPendingChanges()) {
-                session.save();
-            }
-        } catch (ResourceNotFoundException rnfe) {
-            htmlResponse.setStatus(HttpServletResponse.SC_NOT_FOUND,
-                rnfe.getMessage());
-        } catch (Throwable throwable) {
-            log.debug("Exception while handling POST "
-                + request.getResource().getPath() + " with "
-                + getClass().getName(), throwable);
-            htmlResponse.setError(throwable);
-        } finally {
-            try {
-                if (session.hasPendingChanges()) {
-                    session.refresh(false);
-                }
-            } catch (RepositoryException e) {
-                log.warn("RepositoryException in finally block: {}",
-                    e.getMessage(), e);
-            }
-        }
-        
-        // check for redirect URL if processing succeeded
-        if (htmlResponse.isSuccessful()) {
-            String redirect = getRedirectUrl(request, htmlResponse);
-            if (redirect != null) {
-                httpResponse.sendRedirect(redirect);
-                return;
-            }
-        }
-
-        // create a html response and send if unsuccessful or no redirect
-        htmlResponse.send(httpResponse, isSetStatus(request));
-	}
-
-	/**
-	 * Extending Servlet should implement this operation to do the work
-	 * 
-	 * @param request the sling http request to process
-	 * @param htmlResponse the response 
-	 * @param changes 
-	 */
-	abstract protected void handleOperation(SlingHttpServletRequest request,
-			HtmlResponse htmlResponse, List<Modification> changes) throws RepositoryException;
-	
-	
-    /**
-     * compute redirect URL (SLING-126)
-     *
-     * @param ctx the post processor
-     * @return the redirect location or <code>null</code>
-     */
-    protected String getRedirectUrl(HttpServletRequest request, HtmlResponse ctx) {
-        // redirect param has priority (but see below, magic star)
-        String result = request.getParameter(SlingPostConstants.RP_REDIRECT_TO);
-        if (result != null && ctx.getPath() != null) {
-
-            // redirect to created/modified Resource
-            int star = result.indexOf('*');
-            if (star >= 0) {
-                StringBuffer buf = new StringBuffer();
-
-                // anything before the star
-                if (star > 0) {
-                    buf.append(result.substring(0, star));
-                }
-
-                // append the name of the manipulated node
-                buf.append(ResourceUtil.getName(ctx.getPath()));
-
-                // anything after the star
-                if (star < result.length() - 1) {
-                    buf.append(result.substring(star + 1));
-                }
-
-                // use the created path as the redirect result
-                result = buf.toString();
-
-            } else if (result.endsWith(SlingPostConstants.DEFAULT_CREATE_SUFFIX)) {
-                // if the redirect has a trailing slash, append modified node
-                // name
-                result = result.concat(ResourceUtil.getName(ctx.getPath()));
-            }
-
-            if (log.isDebugEnabled()) {
-                log.debug("Will redirect to " + result);
-            }
-        }
-        return result;
-    }
-
-    protected boolean isSetStatus(SlingHttpServletRequest request) {
-        String statusParam = request.getParameter(SlingPostConstants.RP_STATUS);
-        if (statusParam == null) {
-            log.debug(
-                "getStatusMode: Parameter {} not set, assuming standard status code",
-                SlingPostConstants.RP_STATUS);
-            return true;
-        }
-
-        if (SlingPostConstants.STATUS_VALUE_BROWSER.equals(statusParam)) {
-            log.debug(
-                "getStatusMode: Parameter {} asks for user-friendly status code",
-                SlingPostConstants.RP_STATUS);
-            return false;
-        }
-
-        if (SlingPostConstants.STATUS_VALUE_STANDARD.equals(statusParam)) {
-            log.debug(
-                "getStatusMode: Parameter {} asks for standard status code",
-                SlingPostConstants.RP_STATUS);
-            return true;
-        }
-
-        log.debug(
-            "getStatusMode: Parameter {} set to unknown value {}, assuming standard status code",
-            SlingPostConstants.RP_STATUS);
-        return true;
-    }
-	
-	// ------ These methods were copied from AbstractSlingPostOperation ------
-
-    /**
-     * Returns the path of the resource of the request as the item path.
-     * <p>
-     * This method may be overwritten by extension if the operation has
-     * different requirements on path processing.
-     */
-    protected String getItemPath(SlingHttpServletRequest request) {
-        return request.getResource().getPath();
-    }
-
-    /**
-     * Returns an external form of the given path prepending the context path
-     * and appending a display extension.
-     *
-     * @param path the path to externalize
-     * @return the url
-     */
-    protected final String externalizePath(SlingHttpServletRequest request,
-            String path) {
-        StringBuffer ret = new StringBuffer();
-        ret.append(SlingRequestPaths.getContextPath(request));
-        ret.append(request.getResourceResolver().map(path));
-
-        // append optional extension
-        String ext = request.getParameter(SlingPostConstants.RP_DISPLAY_EXTENSION);
-        if (ext != null && ext.length() > 0) {
-            if (ext.charAt(0) != '.') {
-                ret.append('.');
-            }
-            ret.append(ext);
-        }
-
-        return ret.toString();
-    }
-    
-}
+/*
+ * Licensed to the Apache Software Foundation (ASF) under one or more
+ * contributor license agreements.  See the NOTICE file distributed with
+ * this work for additional information regarding copyright ownership.
+ * The ASF licenses this file to You under the Apache License, Version 2.0
+ * (the "License"); you may not use this file except in compliance with
+ * the License.  You may obtain a copy of the License at
+ *
+ *      http://www.apache.org/licenses/LICENSE-2.0
+ *
+ * Unless required by applicable law or agreed to in writing, software
+ * distributed under the License is distributed on an "AS IS" BASIS,
+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+ * See the License for the specific language governing permissions and
+ * limitations under the License.
+ */
+package org.apache.sling.jcr.jackrabbit.accessmanager.post;
+
+import java.io.IOException;
+import java.util.ArrayList;
+import java.util.List;
+
+import javax.jcr.RepositoryException;
+import javax.jcr.Session;
+import javax.servlet.ServletException;
+import javax.servlet.http.HttpServletRequest;
+import javax.servlet.http.HttpServletResponse;
+
+import org.apache.sling.api.SlingHttpServletRequest;
+import org.apache.sling.api.SlingHttpServletResponse;
+import org.apache.sling.api.resource.ResourceNotFoundException;
+import org.apache.sling.api.resource.ResourceUtil;
+import org.apache.sling.api.servlets.HtmlResponse;
+import org.apache.sling.api.servlets.SlingAllMethodsServlet;
+import org.apache.sling.api.wrappers.SlingRequestPaths;
+import org.apache.sling.servlets.post.Modification;
+import org.apache.sling.servlets.post.SlingPostConstants;
+import org.slf4j.Logger;
+import org.slf4j.LoggerFactory;
+
+/**
+ * Base class for all the POST servlets for the AccessManager operations 
+ */
+public abstract class AbstractAccessPostServlet extends SlingAllMethodsServlet {
+	private static final long serialVersionUID = -5918670409789895333L;
+
+	/**
+     * default log
+     */
+    private final Logger log = LoggerFactory.getLogger(getClass());
+    
+	/* (non-Javadoc)
+	 * @see org.apache.sling.api.servlets.SlingAllMethodsServlet#doPost(org.apache.sling.api.SlingHttpServletRequest, org.apache.sling.api.SlingHttpServletResponse)
+	 */
+	@Override
+	protected void doPost(SlingHttpServletRequest request,
+			SlingHttpServletResponse httpResponse) throws ServletException,
+			IOException {
+        // prepare the response
+        HtmlResponse htmlResponse = new HtmlResponse();
+        htmlResponse.setReferer(request.getHeader("referer"));
+
+        // calculate the paths
+        String path = getItemPath(request);
+        htmlResponse.setPath(path);
+
+        // location
+        htmlResponse.setLocation(externalizePath(request, path));
+
+        // parent location
+        path = ResourceUtil.getParent(path);
+        if (path != null) {
+        	htmlResponse.setParentLocation(externalizePath(request, path));
+        }
+
+        Session session = request.getResourceResolver().adaptTo(Session.class);
+
+        final List<Modification> changes = new ArrayList<Modification>();
+        
+        try {
+            handleOperation(request, htmlResponse, changes);
+            
+            //TODO: maybe handle SlingAuthorizablePostProcessor handlers here
+            
+            // set changes on html response
+            for(Modification change : changes) {
+                switch ( change.getType() ) {
+                    case MODIFY : htmlResponse.onModified(change.getSource()); break;
+                    case DELETE : htmlResponse.onDeleted(change.getSource()); break;
+                    case MOVE :   htmlResponse.onMoved(change.getSource(), change.getDestination()); break;
+                    case COPY :   htmlResponse.onCopied(change.getSource(), change.getDestination()); break;
+                    case CREATE : htmlResponse.onCreated(change.getSource()); break;
+                    case ORDER : htmlResponse.onChange("ordered", change.getSource(), change.getDestination()); break;
+                }
+            }
+            
+            if (session.hasPendingChanges()) {
+                session.save();
+            }
+        } catch (ResourceNotFoundException rnfe) {
+            htmlResponse.setStatus(HttpServletResponse.SC_NOT_FOUND,
+                rnfe.getMessage());
+        } catch (Throwable throwable) {
+            log.debug("Exception while handling POST "
+                + request.getResource().getPath() + " with "
+                + getClass().getName(), throwable);
+            htmlResponse.setError(throwable);
+        } finally {
+            try {
+                if (session.hasPendingChanges()) {
+                    session.refresh(false);
+                }
+            } catch (RepositoryException e) {
+                log.warn("RepositoryException in finally block: {}",
+                    e.getMessage(), e);
+            }
+        }
+        
+        // check for redirect URL if processing succeeded
+        if (htmlResponse.isSuccessful()) {
+            String redirect = getRedirectUrl(request, htmlResponse);
+            if (redirect != null) {
+                httpResponse.sendRedirect(redirect);
+                return;
+            }
+        }
+
+        // create a html response and send if unsuccessful or no redirect
+        htmlResponse.send(httpResponse, isSetStatus(request));
+	}
+
+	/**
+	 * Extending Servlet should implement this operation to do the work
+	 * 
+	 * @param request the sling http request to process
+	 * @param htmlResponse the response 
+	 * @param changes 
+	 */
+	abstract protected void handleOperation(SlingHttpServletRequest request,
+			HtmlResponse htmlResponse, List<Modification> changes) throws RepositoryException;
+	
+	
+    /**
+     * compute redirect URL (SLING-126)
+     *
+     * @param ctx the post processor
+     * @return the redirect location or <code>null</code>
+     */
+    protected String getRedirectUrl(HttpServletRequest request, HtmlResponse ctx) {
+        // redirect param has priority (but see below, magic star)
+        String result = request.getParameter(SlingPostConstants.RP_REDIRECT_TO);
+        if (result != null && ctx.getPath() != null) {
+
+            // redirect to created/modified Resource
+            int star = result.indexOf('*');
+            if (star >= 0) {
+                StringBuffer buf = new StringBuffer();
+
+                // anything before the star
+                if (star > 0) {
+                    buf.append(result.substring(0, star));
+                }
+
+                // append the name of the manipulated node
+                buf.append(ResourceUtil.getName(ctx.getPath()));
+
+                // anything after the star
+                if (star < result.length() - 1) {
+                    buf.append(result.substring(star + 1));
+                }
+
+                // use the created path as the redirect result
+                result = buf.toString();
+
+            } else if (result.endsWith(SlingPostConstants.DEFAULT_CREATE_SUFFIX)) {
+                // if the redirect has a trailing slash, append modified node
+                // name
+                result = result.concat(ResourceUtil.getName(ctx.getPath()));
+            }
+
+            if (log.isDebugEnabled()) {
+                log.debug("Will redirect to " + result);
+            }
+        }
+        return result;
+    }
+
+    protected boolean isSetStatus(SlingHttpServletRequest request) {
+        String statusParam = request.getParameter(SlingPostConstants.RP_STATUS);
+        if (statusParam == null) {
+            log.debug(
+                "getStatusMode: Parameter {} not set, assuming standard status code",
+                SlingPostConstants.RP_STATUS);
+            return true;
+        }
+
+        if (SlingPostConstants.STATUS_VALUE_BROWSER.equals(statusParam)) {
+            log.debug(
+                "getStatusMode: Parameter {} asks for user-friendly status code",
+                SlingPostConstants.RP_STATUS);
+            return false;
+        }
+
+        if (SlingPostConstants.STATUS_VALUE_STANDARD.equals(statusParam)) {
+            log.debug(
+                "getStatusMode: Parameter {} asks for standard status code",
+                SlingPostConstants.RP_STATUS);
+            return true;
+        }
+
+        log.debug(
+            "getStatusMode: Parameter {} set to unknown value {}, assuming standard status code",
+            SlingPostConstants.RP_STATUS);
+        return true;
+    }
+	
+	// ------ These methods were copied from AbstractSlingPostOperation ------
+
+    /**
+     * Returns the path of the resource of the request as the item path.
+     * <p>
+     * This method may be overwritten by extension if the operation has
+     * different requirements on path processing.
+     */
+    protected String getItemPath(SlingHttpServletRequest request) {
+        return request.getResource().getPath();
+    }
+
+    /**
+     * Returns an external form of the given path prepending the context path
+     * and appending a display extension.
+     *
+     * @param path the path to externalize
+     * @return the url
+     */
+    protected final String externalizePath(SlingHttpServletRequest request,
+            String path) {
+        StringBuffer ret = new StringBuffer();
+        ret.append(SlingRequestPaths.getContextPath(request));
+        ret.append(request.getResourceResolver().map(path));
+
+        // append optional extension
+        String ext = request.getParameter(SlingPostConstants.RP_DISPLAY_EXTENSION);
+        if (ext != null && ext.length() > 0) {
+            if (ext.charAt(0) != '.') {
+                ret.append('.');
+            }
+            ret.append(ext);
+        }
+
+        return ret.toString();
+    }
+    
+}
diff --git a/src/main/java/org/apache/sling/jcr/jackrabbit/accessmanager/post/DeleteAcesServlet.java b/src/main/java/org/apache/sling/jcr/jackrabbit/accessmanager/post/DeleteAcesServlet.java
index bcb0a3e..3c5b28d 100644
--- a/src/main/java/org/apache/sling/jcr/jackrabbit/accessmanager/post/DeleteAcesServlet.java
+++ b/src/main/java/org/apache/sling/jcr/jackrabbit/accessmanager/post/DeleteAcesServlet.java
@@ -1,128 +1,128 @@
-/*
- * Licensed to the Apache Software Foundation (ASF) under one or more
- * contributor license agreements.  See the NOTICE file distributed with
- * this work for additional information regarding copyright ownership.
- * The ASF licenses this file to You under the Apache License, Version 2.0
- * (the "License"); you may not use this file except in compliance with
- * the License.  You may obtain a copy of the License at
- *
- *      http://www.apache.org/licenses/LICENSE-2.0
- *
- * Unless required by applicable law or agreed to in writing, software
- * distributed under the License is distributed on an "AS IS" BASIS,
- * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
- * See the License for the specific language governing permissions and
- * limitations under the License.
- */
-package org.apache.sling.jcr.jackrabbit.accessmanager.post;
-
-import java.util.ArrayList;
-import java.util.Arrays;
-import java.util.HashSet;
-import java.util.List;
-import java.util.Set;
-
-import javax.jcr.Item;
-import javax.jcr.RepositoryException;
-import javax.jcr.Session;
-
-import org.apache.jackrabbit.api.jsr283.security.AccessControlEntry;
-import org.apache.jackrabbit.api.jsr283.security.AccessControlList;
-import org.apache.jackrabbit.api.jsr283.security.AccessControlManager;
-import org.apache.jackrabbit.api.jsr283.security.AccessControlPolicy;
-import org.apache.jackrabbit.api.jsr283.security.AccessControlPolicyIterator;
-import org.apache.sling.api.SlingHttpServletRequest;
-import org.apache.sling.api.resource.Resource;
-import org.apache.sling.api.resource.ResourceNotFoundException;
-import org.apache.sling.api.servlets.HtmlResponse;
-import org.apache.sling.jcr.base.util.AccessControlUtil;
-import org.apache.sling.servlets.post.Modification;
-import org.apache.sling.servlets.post.SlingPostConstants;
-
-/**
- * Sling Post Servlet implementation for deleting the ACE for a set of principals on
- * a JCR resource.
- * 
- * @scr.component immediate="true" 
- * @scr.service interface="javax.servlet.Servlet"
- * @scr.property name="sling.servlet.resourceTypes" value="sling/servlet/default"
- * @scr.property name="sling.servlet.methods" value="POST" 
- * @scr.property name="sling.servlet.selectors" value="deleteAce" 
- */
-public class DeleteAcesServlet extends AbstractAccessPostServlet {
-	private static final long serialVersionUID = 3784866802938282971L;
-
-	/* (non-Javadoc)
-	 * @see org.apache.sling.jackrabbit.accessmanager.post.AbstractAccessPostServlet#handleOperation(org.apache.sling.api.SlingHttpServletRequest, org.apache.sling.api.servlets.HtmlResponse, java.util.List)
-	 */
-	@Override
-	protected void handleOperation(SlingHttpServletRequest request,
-			HtmlResponse htmlResponse, List<Modification> changes)
-			throws RepositoryException {
-		
-        String[] applyTo = request.getParameterValues(SlingPostConstants.RP_APPLY_TO);
-        if (applyTo == null) {
-			throw new RepositoryException("principalIds were not sumitted.");
-        } else {
-        	String resourcePath = null;
-        	Resource resource = request.getResource();
-        	if (resource == null) {
-    			throw new ResourceNotFoundException("Resource not found.");
-        	} else {
-        		Item item = resource.adaptTo(Item.class);
-        		if (item != null) {
-        			resourcePath = item.getPath();
-        		} else {
-        			throw new ResourceNotFoundException("Resource is not a JCR Node");
-        		}
-        	}
-        	
-    		Session session = request.getResourceResolver().adaptTo(Session.class);
-    		if (session == null) {
-    			throw new RepositoryException("JCR Session not found");
-    		}
-        	
-    		//load the principalIds array into a set for quick lookup below
-			Set<String> pidSet = new HashSet<String>();
-			pidSet.addAll(Arrays.asList(applyTo));
-			
-			try {
-				AccessControlManager accessControlManager = AccessControlUtil.getAccessControlManager(session);
-				AccessControlList updatedAcl = null;
-				AccessControlPolicyIterator applicablePolicies = accessControlManager.getApplicablePolicies(resourcePath);
-				while (applicablePolicies.hasNext()) {
-					AccessControlPolicy policy = applicablePolicies.nextAccessControlPolicy();
-					if (policy instanceof AccessControlList) {
-						updatedAcl = (AccessControlList)policy;
-						break;
-					}
-				}
-				if (updatedAcl == null) {
-					throw new RepositoryException("Unable to find an access control policy to update.");
-				}
-				
-				//keep track of the existing Aces for the target principal
-				AccessControlEntry[] accessControlEntries = updatedAcl.getAccessControlEntries();
-				List<AccessControlEntry> oldAces = new ArrayList<AccessControlEntry>();
-				for (AccessControlEntry ace : accessControlEntries) {
-					if (pidSet.contains(ace.getPrincipal().getName())) {
-						oldAces.add(ace);
-					}
-				}
-
-				//remove the old aces
-				if (!oldAces.isEmpty()) {
-					for (AccessControlEntry ace : oldAces) {
-						updatedAcl.removeAccessControlEntry(ace);
-					}
-				}
-				
-				//apply the changed policy
-				accessControlManager.setPolicy(resourcePath, updatedAcl);
-			} catch (RepositoryException re) {
-				throw new RepositoryException("Failed to delete access control.", re);
-			}
-        }
-	}
-
-}
+/*
+ * Licensed to the Apache Software Foundation (ASF) under one or more
+ * contributor license agreements.  See the NOTICE file distributed with
+ * this work for additional information regarding copyright ownership.
+ * The ASF licenses this file to You under the Apache License, Version 2.0
+ * (the "License"); you may not use this file except in compliance with
+ * the License.  You may obtain a copy of the License at
+ *
+ *      http://www.apache.org/licenses/LICENSE-2.0
+ *
+ * Unless required by applicable law or agreed to in writing, software
+ * distributed under the License is distributed on an "AS IS" BASIS,
+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+ * See the License for the specific language governing permissions and
+ * limitations under the License.
+ */
+package org.apache.sling.jcr.jackrabbit.accessmanager.post;
+
+import java.util.ArrayList;
+import java.util.Arrays;
+import java.util.HashSet;
+import java.util.List;
+import java.util.Set;
+
+import javax.jcr.Item;
+import javax.jcr.RepositoryException;
+import javax.jcr.Session;
+
+import org.apache.jackrabbit.api.jsr283.security.AccessControlEntry;
+import org.apache.jackrabbit.api.jsr283.security.AccessControlList;
+import org.apache.jackrabbit.api.jsr283.security.AccessControlManager;
+import org.apache.jackrabbit.api.jsr283.security.AccessControlPolicy;
+import org.apache.jackrabbit.api.jsr283.security.AccessControlPolicyIterator;
+import org.apache.sling.api.SlingHttpServletRequest;
+import org.apache.sling.api.resource.Resource;
+import org.apache.sling.api.resource.ResourceNotFoundException;
+import org.apache.sling.api.servlets.HtmlResponse;
+import org.apache.sling.jcr.base.util.AccessControlUtil;
+import org.apache.sling.servlets.post.Modification;
+import org.apache.sling.servlets.post.SlingPostConstants;
+
+/**
+ * Sling Post Servlet implementation for deleting the ACE for a set of principals on
+ * a JCR resource.
+ * 
+ * @scr.component immediate="true" 
+ * @scr.service interface="javax.servlet.Servlet"
+ * @scr.property name="sling.servlet.resourceTypes" value="sling/servlet/default"
+ * @scr.property name="sling.servlet.methods" value="POST" 
+ * @scr.property name="sling.servlet.selectors" value="deleteAce" 
+ */
+public class DeleteAcesServlet extends AbstractAccessPostServlet {
+	private static final long serialVersionUID = 3784866802938282971L;
+
+	/* (non-Javadoc)
+	 * @see org.apache.sling.jackrabbit.accessmanager.post.AbstractAccessPostServlet#handleOperation(org.apache.sling.api.SlingHttpServletRequest, org.apache.sling.api.servlets.HtmlResponse, java.util.List)
+	 */
+	@Override
+	protected void handleOperation(SlingHttpServletRequest request,
+			HtmlResponse htmlResponse, List<Modification> changes)
+			throws RepositoryException {
+		
+        String[] applyTo = request.getParameterValues(SlingPostConstants.RP_APPLY_TO);
+        if (applyTo == null) {
+			throw new RepositoryException("principalIds were not sumitted.");
+        } else {
+        	String resourcePath = null;
+        	Resource resource = request.getResource();
+        	if (resource == null) {
+    			throw new ResourceNotFoundException("Resource not found.");
+        	} else {
+        		Item item = resource.adaptTo(Item.class);
+        		if (item != null) {
+        			resourcePath = item.getPath();
+        		} else {
+        			throw new ResourceNotFoundException("Resource is not a JCR Node");
+        		}
+        	}
+        	
+    		Session session = request.getResourceResolver().adaptTo(Session.class);
+    		if (session == null) {
+    			throw new RepositoryException("JCR Session not found");
+    		}
+        	
+    		//load the principalIds array into a set for quick lookup below
+			Set<String> pidSet = new HashSet<String>();
+			pidSet.addAll(Arrays.asList(applyTo));
+			
+			try {
+				AccessControlManager accessControlManager = AccessControlUtil.getAccessControlManager(session);
+				AccessControlList updatedAcl = null;
+				AccessControlPolicyIterator applicablePolicies = accessControlManager.getApplicablePolicies(resourcePath);
+				while (applicablePolicies.hasNext()) {
+					AccessControlPolicy policy = applicablePolicies.nextAccessControlPolicy();
+					if (policy instanceof AccessControlList) {
+						updatedAcl = (AccessControlList)policy;
+						break;
+					}
+				}
+				if (updatedAcl == null) {
+					throw new RepositoryException("Unable to find an access control policy to update.");
+				}
+				
+				//keep track of the existing Aces for the target principal
+				AccessControlEntry[] accessControlEntries = updatedAcl.getAccessControlEntries();
+				List<AccessControlEntry> oldAces = new ArrayList<AccessControlEntry>();
+				for (AccessControlEntry ace : accessControlEntries) {
+					if (pidSet.contains(ace.getPrincipal().getName())) {
+						oldAces.add(ace);
+					}
+				}
+
+				//remove the old aces
+				if (!oldAces.isEmpty()) {
+					for (AccessControlEntry ace : oldAces) {
+						updatedAcl.removeAccessControlEntry(ace);
+					}
+				}
+				
+				//apply the changed policy
+				accessControlManager.setPolicy(resourcePath, updatedAcl);
+			} catch (RepositoryException re) {
+				throw new RepositoryException("Failed to delete access control.", re);
+			}
+        }
+	}
+
+}
diff --git a/src/main/java/org/apache/sling/jcr/jackrabbit/accessmanager/post/GetAclServlet.java b/src/main/java/org/apache/sling/jcr/jackrabbit/accessmanager/post/GetAclServlet.java
index 1104e24..586ec57 100644
--- a/src/main/java/org/apache/sling/jcr/jackrabbit/accessmanager/post/GetAclServlet.java
+++ b/src/main/java/org/apache/sling/jcr/jackrabbit/accessmanager/post/GetAclServlet.java
@@ -1,180 +1,180 @@
-/*
- * Licensed to the Apache Software Foundation (ASF) under one or more
- * contributor license agreements.  See the NOTICE file distributed with
- * this work for additional information regarding copyright ownership.
- * The ASF licenses this file to You under the Apache License, Version 2.0
- * (the "License"); you may not use this file except in compliance with
- * the License.  You may obtain a copy of the License at
- *
- *      http://www.apache.org/licenses/LICENSE-2.0
- *
- * Unless required by applicable law or agreed to in writing, software
- * distributed under the License is distributed on an "AS IS" BASIS,
- * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
- * See the License for the specific language governing permissions and
- * limitations under the License.
- */
-package org.apache.sling.jcr.jackrabbit.accessmanager.post;
-
-import java.io.IOException;
-import java.security.Principal;
-import java.util.LinkedHashMap;
-import java.util.LinkedHashSet;
-import java.util.Map;
-import java.util.Set;
-import java.util.Map.Entry;
-
-import javax.jcr.AccessDeniedException;
-import javax.jcr.Item;
-import javax.jcr.RepositoryException;
-import javax.jcr.Session;
-import javax.servlet.ServletException;
-import javax.servlet.http.HttpServletResponse;
-
-import org.apache.jackrabbit.api.jsr283.security.AccessControlEntry;
-import org.apache.jackrabbit.api.jsr283.security.AccessControlList;
-import org.apache.jackrabbit.api.jsr283.security.AccessControlManager;
-import org.apache.jackrabbit.api.jsr283.security.AccessControlPolicy;
-import org.apache.jackrabbit.api.jsr283.security.Privilege;
-import org.apache.sling.api.SlingHttpServletRequest;
-import org.apache.sling.api.SlingHttpServletResponse;
-import org.apache.sling.api.resource.Resource;
-import org.apache.sling.api.resource.ResourceNotFoundException;
-import org.apache.sling.api.servlets.SlingAllMethodsServlet;
-import org.apache.sling.commons.json.JSONObject;
-import org.apache.sling.jcr.base.util.AccessControlUtil;
-import org.slf4j.Logger;
-import org.slf4j.LoggerFactory;
-
-/**
- * Sling GET servlet implementation for dumping the declared ACL of a resource
- * to JSON.
- * 
- * @scr.component immediate="true" 
- * @scr.service interface="javax.servlet.Servlet"
- * @scr.property name="sling.servlet.resourceTypes" value="sling/servlet/default"
- * @scr.property name="sling.servlet.methods" value="GET" 
- * @scr.property name="sling.servlet.selectors" value="acl" 
- * @scr.property name="sling.servlet.extensions " value="json" 
- */
-public class GetAclServlet extends SlingAllMethodsServlet {
-	private static final long serialVersionUID = 3391376559396223184L;
-
-	/**
-     * default log
-     */
-    private final Logger log = LoggerFactory.getLogger(getClass());
-
-	/* (non-Javadoc)
-	 * @see org.apache.sling.api.servlets.SlingSafeMethodsServlet#doGet(org.apache.sling.api.SlingHttpServletRequest, org.apache.sling.api.SlingHttpServletResponse)
-	 */
-	@Override
-	protected void doGet(SlingHttpServletRequest request,
-			SlingHttpServletResponse response) throws ServletException,
-			IOException {
-		
-        try {
-    		Session session = request.getResourceResolver().adaptTo(Session.class);
-    		if (session == null) {
-    			throw new RepositoryException("JCR Session not found");
-    		}
-    		
-        	String resourcePath = null;
-        	Resource resource = request.getResource();
-        	if (resource == null) {
-    			throw new ResourceNotFoundException("Resource not found.");
-        	} else {
-        		Item item = resource.adaptTo(Item.class);
-        		if (item != null) {
-        			resourcePath = item.getPath();
-        		} else {
-        			throw new ResourceNotFoundException("Resource is not a JCR Node");
-        		}
-        	}
-
-        	AccessControlEntry[] declaredAccessControlEntries = getDeclaredAccessControlEntries(session, resourcePath);
-        	Map<String, Map<String, Set<String>>> aclMap = new LinkedHashMap<String, Map<String,Set<String>>>();
-        	for (AccessControlEntry ace : declaredAccessControlEntries) {
-    			Principal principal = ace.getPrincipal();
-    			Map<String, Set<String>> map = aclMap.get(principal.getName());
-    			if (map == null) {
-    				map = new LinkedHashMap<String, Set<String>>();
-    				aclMap.put(principal.getName(), map);
-    			}
-
-    			boolean allow = AccessControlUtil.isAllow(ace);
-    			if (allow) {
-    				Set<String> grantedSet = map.get("granted");
-    				if (grantedSet == null) {
-    					grantedSet = new LinkedHashSet<String>();
-    					map.put("granted", grantedSet);
-    				}
-    				Privilege[] privileges = ace.getPrivileges();
-    				for (Privilege privilege : privileges) {
-    					grantedSet.add(privilege.getName());
-    				}
-    			} else {
-    				Set<String> deniedSet = map.get("denied");
-    				if (deniedSet == null) {
-    					deniedSet = new LinkedHashSet<String>();
-    					map.put("denied", deniedSet);
-    				}
-    				Privilege[] privileges = ace.getPrivileges();
-    				for (Privilege privilege : privileges) {
-    					deniedSet.add(privilege.getName());
-    				}
-    			}
-    		}
-        	
-
-        	response.setContentType("application/json");
-        	response.setCharacterEncoding("UTF-8");
-
-        	JSONObject jsonObj = new JSONObject();
-        	Set<Entry<String, Map<String, Set<String>>>> entrySet = aclMap.entrySet();
-        	for (Entry<String, Map<String, Set<String>>> entry : entrySet) {
-        		String principalName = entry.getKey();
-        		Map<String, Set<String>> value = entry.getValue();
-        		
-        		JSONObject aceObject = new JSONObject();
-        		Set<String> grantedSet = value.get("granted");
-        		if (grantedSet != null) {
-            		aceObject.put("granted", grantedSet);
-        		}
-        		
-        		Set<String> deniedSet = value.get("denied");
-        		if (deniedSet != null) {
-        			aceObject.put("denied", deniedSet);
-        		}
-
-        		jsonObj.put(principalName, aceObject);
-			}
-        	
-
-            // do the dump
-        	jsonObj.write(response.getWriter());
-        } catch (AccessDeniedException ade) {
-        	response.sendError(HttpServletResponse.SC_NOT_FOUND);
-        } catch (ResourceNotFoundException rnfe) {
-        	response.sendError(HttpServletResponse.SC_NOT_FOUND, rnfe.getMessage());
-        } catch (Throwable throwable) {
-            log.debug("Exception while handling GET "
-                + request.getResource().getPath() + " with "
-                + getClass().getName(), throwable);
-            throw new ServletException(throwable);
-        }
-	}
-
-	private AccessControlEntry[] getDeclaredAccessControlEntries(Session session, String absPath) throws RepositoryException {
-		AccessControlManager accessControlManager = AccessControlUtil.getAccessControlManager(session);
-		AccessControlPolicy[] policies = accessControlManager.getPolicies(absPath);
-		for (AccessControlPolicy accessControlPolicy : policies) {
-			if (accessControlPolicy instanceof AccessControlList) {
-				AccessControlEntry[] accessControlEntries = ((AccessControlList)accessControlPolicy).getAccessControlEntries();
-				return accessControlEntries;
-			}
-		}
-		return new AccessControlEntry[0];
-	}
-	
-}
+/*
+ * Licensed to the Apache Software Foundation (ASF) under one or more
+ * contributor license agreements.  See the NOTICE file distributed with
+ * this work for additional information regarding copyright ownership.
+ * The ASF licenses this file to You under the Apache License, Version 2.0
+ * (the "License"); you may not use this file except in compliance with
+ * the License.  You may obtain a copy of the License at
+ *
+ *      http://www.apache.org/licenses/LICENSE-2.0
+ *
+ * Unless required by applicable law or agreed to in writing, software
+ * distributed under the License is distributed on an "AS IS" BASIS,
+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+ * See the License for the specific language governing permissions and
+ * limitations under the License.
+ */
+package org.apache.sling.jcr.jackrabbit.accessmanager.post;
+
+import java.io.IOException;
+import java.security.Principal;
+import java.util.LinkedHashMap;
+import java.util.LinkedHashSet;
+import java.util.Map;
+import java.util.Set;
+import java.util.Map.Entry;
+
+import javax.jcr.AccessDeniedException;
+import javax.jcr.Item;
+import javax.jcr.RepositoryException;
+import javax.jcr.Session;
+import javax.servlet.ServletException;
+import javax.servlet.http.HttpServletResponse;
+
+import org.apache.jackrabbit.api.jsr283.security.AccessControlEntry;
+import org.apache.jackrabbit.api.jsr283.security.AccessControlList;
+import org.apache.jackrabbit.api.jsr283.security.AccessControlManager;
+import org.apache.jackrabbit.api.jsr283.security.AccessControlPolicy;
+import org.apache.jackrabbit.api.jsr283.security.Privilege;
+import org.apache.sling.api.SlingHttpServletRequest;
+import org.apache.sling.api.SlingHttpServletResponse;
+import org.apache.sling.api.resource.Resource;
+import org.apache.sling.api.resource.ResourceNotFoundException;
+import org.apache.sling.api.servlets.SlingAllMethodsServlet;
+import org.apache.sling.commons.json.JSONObject;
+import org.apache.sling.jcr.base.util.AccessControlUtil;
+import org.slf4j.Logger;
+import org.slf4j.LoggerFactory;
+
+/**
+ * Sling GET servlet implementation for dumping the declared ACL of a resource
+ * to JSON.
+ * 
+ * @scr.component immediate="true" 
+ * @scr.service interface="javax.servlet.Servlet"
+ * @scr.property name="sling.servlet.resourceTypes" value="sling/servlet/default"
+ * @scr.property name="sling.servlet.methods" value="GET" 
+ * @scr.property name="sling.servlet.selectors" value="acl" 
+ * @scr.property name="sling.servlet.extensions " value="json" 
+ */
+public class GetAclServlet extends SlingAllMethodsServlet {
+	private static final long serialVersionUID = 3391376559396223184L;
+
+	/**
+     * default log
+     */
+    private final Logger log = LoggerFactory.getLogger(getClass());
+
+	/* (non-Javadoc)
+	 * @see org.apache.sling.api.servlets.SlingSafeMethodsServlet#doGet(org.apache.sling.api.SlingHttpServletRequest, org.apache.sling.api.SlingHttpServletResponse)
+	 */
+	@Override
+	protected void doGet(SlingHttpServletRequest request,
+			SlingHttpServletResponse response) throws ServletException,
+			IOException {
+		
+        try {
+    		Session session = request.getResourceResolver().adaptTo(Session.class);
+    		if (session == null) {
+    			throw new RepositoryException("JCR Session not found");
+    		}
+    		
+        	String resourcePath = null;
+        	Resource resource = request.getResource();
+        	if (resource == null) {
+    			throw new ResourceNotFoundException("Resource not found.");
+        	} else {
+        		Item item = resource.adaptTo(Item.class);
+        		if (item != null) {
+        			resourcePath = item.getPath();
+        		} else {
+        			throw new ResourceNotFoundException("Resource is not a JCR Node");
+        		}
+        	}
+
+        	AccessControlEntry[] declaredAccessControlEntries = getDeclaredAccessControlEntries(session, resourcePath);
+        	Map<String, Map<String, Set<String>>> aclMap = new LinkedHashMap<String, Map<String,Set<String>>>();
+        	for (AccessControlEntry ace : declaredAccessControlEntries) {
+    			Principal principal = ace.getPrincipal();
+    			Map<String, Set<String>> map = aclMap.get(principal.getName());
+    			if (map == null) {
+    				map = new LinkedHashMap<String, Set<String>>();
+    				aclMap.put(principal.getName(), map);
+    			}
+
+    			boolean allow = AccessControlUtil.isAllow(ace);
+    			if (allow) {
+    				Set<String> grantedSet = map.get("granted");
+    				if (grantedSet == null) {
+    					grantedSet = new LinkedHashSet<String>();
+    					map.put("granted", grantedSet);
+    				}
+    				Privilege[] privileges = ace.getPrivileges();
+    				for (Privilege privilege : privileges) {
+    					grantedSet.add(privilege.getName());
+    				}
+    			} else {
+    				Set<String> deniedSet = map.get("denied");
+    				if (deniedSet == null) {
+    					deniedSet = new LinkedHashSet<String>();
+    					map.put("denied", deniedSet);
+    				}
+    				Privilege[] privileges = ace.getPrivileges();
+    				for (Privilege privilege : privileges) {
+    					deniedSet.add(privilege.getName());
+    				}
+    			}
+    		}
+        	
+
+        	response.setContentType("application/json");
+        	response.setCharacterEncoding("UTF-8");
+
+        	JSONObject jsonObj = new JSONObject();
+        	Set<Entry<String, Map<String, Set<String>>>> entrySet = aclMap.entrySet();
+        	for (Entry<String, Map<String, Set<String>>> entry : entrySet) {
+        		String principalName = entry.getKey();
+        		Map<String, Set<String>> value = entry.getValue();
+        		
+        		JSONObject aceObject = new JSONObject();
+        		Set<String> grantedSet = value.get("granted");
+        		if (grantedSet != null) {
+            		aceObject.put("granted", grantedSet);
+        		}
+        		
+        		Set<String> deniedSet = value.get("denied");
+        		if (deniedSet != null) {
+        			aceObject.put("denied", deniedSet);
+        		}
+
+        		jsonObj.put(principalName, aceObject);
+			}
+        	
+
+            // do the dump
+        	jsonObj.write(response.getWriter());
+        } catch (AccessDeniedException ade) {
+        	response.sendError(HttpServletResponse.SC_NOT_FOUND);
+        } catch (ResourceNotFoundException rnfe) {
+        	response.sendError(HttpServletResponse.SC_NOT_FOUND, rnfe.getMessage());
+        } catch (Throwable throwable) {
+            log.debug("Exception while handling GET "
+                + request.getResource().getPath() + " with "
+                + getClass().getName(), throwable);
+            throw new ServletException(throwable);
+        }
+	}
+
+	private AccessControlEntry[] getDeclaredAccessControlEntries(Session session, String absPath) throws RepositoryException {
+		AccessControlManager accessControlManager = AccessControlUtil.getAccessControlManager(session);
+		AccessControlPolicy[] policies = accessControlManager.getPolicies(absPath);
+		for (AccessControlPolicy accessControlPolicy : policies) {
+			if (accessControlPolicy instanceof AccessControlList) {
+				AccessControlEntry[] accessControlEntries = ((AccessControlList)accessControlPolicy).getAccessControlEntries();
+				return accessControlEntries;
+			}
+		}
+		return new AccessControlEntry[0];
+	}
+	
+}
diff --git a/src/main/java/org/apache/sling/jcr/jackrabbit/accessmanager/post/ModifyAceServlet.java b/src/main/java/org/apache/sling/jcr/jackrabbit/accessmanager/post/ModifyAceServlet.java
index b98f7ac..b6ed930 100644
--- a/src/main/java/org/apache/sling/jcr/jackrabbit/accessmanager/post/ModifyAceServlet.java
+++ b/src/main/java/org/apache/sling/jcr/jackrabbit/accessmanager/post/ModifyAceServlet.java
@@ -1,241 +1,241 @@
-/*
- * Licensed to the Apache Software Foundation (ASF) under one or more
- * contributor license agreements.  See the NOTICE file distributed with
- * this work for additional information regarding copyright ownership.
- * The ASF licenses this file to You under the Apache License, Version 2.0
- * (the "License"); you may not use this file except in compliance with
- * the License.  You may obtain a copy of the License at
- *
- *      http://www.apache.org/licenses/LICENSE-2.0
- *
- * Unless required by applicable law or agreed to in writing, software
- * distributed under the License is distributed on an "AS IS" BASIS,
- * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
- * See the License for the specific language governing permissions and
- * limitations under the License.
- */
-package org.apache.sling.jcr.jackrabbit.accessmanager.post;
-
-import java.security.Principal;
-import java.util.ArrayList;
-import java.util.Enumeration;
-import java.util.List;
-
-import javax.jcr.Item;
-import javax.jcr.RepositoryException;
-import javax.jcr.Session;
-
-import org.apache.jackrabbit.api.jsr283.security.AccessControlEntry;
-import org.apache.jackrabbit.api.jsr283.security.AccessControlList;
-import org.apache.jackrabbit.api.jsr283.security.AccessControlManager;
-import org.apache.jackrabbit.api.jsr283.security.AccessControlPolicy;
-import org.apache.jackrabbit.api.jsr283.security.AccessControlPolicyIterator;
-import org.apache.jackrabbit.api.jsr283.security.Privilege;
-import org.apache.jackrabbit.api.security.user.Authorizable;
-import org.apache.jackrabbit.api.security.user.UserManager;
-import org.apache.sling.api.SlingHttpServletRequest;
-import org.apache.sling.api.resource.Resource;
-import org.apache.sling.api.resource.ResourceNotFoundException;
-import org.apache.sling.api.servlets.HtmlResponse;
-import org.apache.sling.jcr.base.util.AccessControlUtil;
-import org.apache.sling.servlets.post.Modification;
-import org.slf4j.Logger;
-import org.slf4j.LoggerFactory;
-
-/**
- * Sling Post Servlet implementation for modifying the ACE for a principal on
- * a JCR resource.
- * 
- * @scr.component immediate="true" 
- * @scr.service interface="javax.servlet.Servlet"
- * @scr.property name="sling.servlet.resourceTypes" value="sling/servlet/default"
- * @scr.property name="sling.servlet.methods" value="POST" 
- * @scr.property name="sling.servlet.selectors" value="modifyAce" 
- */
-public class ModifyAceServlet extends AbstractAccessPostServlet {
-	private static final long serialVersionUID = -9182485466670280437L;
-
-	/**
-     * default log
-     */
-    private final Logger log = LoggerFactory.getLogger(getClass());
-
-	/* (non-Javadoc)
-	 * @see org.apache.sling.jackrabbit.accessmanager.post.AbstractAccessPostServlet#handleOperation(org.apache.sling.api.SlingHttpServletRequest, org.apache.sling.api.servlets.HtmlResponse, java.util.List)
-	 */
-	@SuppressWarnings("unchecked")
-	@Override
-	protected void handleOperation(SlingHttpServletRequest request,
-			HtmlResponse htmlResponse, List<Modification> changes)
-			throws RepositoryException {
-		Session session = request.getResourceResolver().adaptTo(Session.class);
-		if (session == null) {
-			throw new RepositoryException("JCR Session not found");
-		}
-
-		String principalId = request.getParameter("principalId");
-		if (principalId == null) {
-			throw new RepositoryException("principalId was not submitted.");
-		}
-		UserManager userManager = AccessControlUtil.getUserManager(session);
-		Authorizable authorizable = userManager.getAuthorizable(principalId);
-		if (authorizable == null) {
-			throw new RepositoryException("No principal found for id: " + principalId);
-		}
-
-    	String resourcePath = null;
-    	Resource resource = request.getResource();
-    	if (resource == null) {
-			throw new ResourceNotFoundException("Resource not found.");
-    	} else {
-    		Item item = resource.adaptTo(Item.class);
-    		if (item != null) {
-    			resourcePath = item.getPath();
-    		} else {
-    			throw new ResourceNotFoundException("Resource is not a JCR Node");
-    		}
-    	}
-		
-		
-		List<String> grantedPrivilegeNames = new ArrayList<String>();
-		List<String> deniedPrivilegeNames = new ArrayList<String>();
-		Enumeration parameterNames = request.getParameterNames();
-		while (parameterNames.hasMoreElements()) {
-			Object nextElement = parameterNames.nextElement();
-			if (nextElement instanceof String) {
-				String paramName = (String)nextElement;
-				if (paramName.startsWith("privilege@")) {
-					String parameterValue = request.getParameter(paramName);
-					if (parameterValue != null && parameterValue.length() > 0) {
-						if ("granted".equals(parameterValue)) {
-							String privilegeName = paramName.substring(10);
-							grantedPrivilegeNames.add(privilegeName);
-						} else if ("denied".equals(parameterValue)) {
-							String privilegeName = paramName.substring(10);
-							deniedPrivilegeNames.add(privilegeName);
-						}
-					}
-				}
-			}
-		}
-
-		try {
-			AccessControlManager accessControlManager = AccessControlUtil.getAccessControlManager(session);
-			AccessControlList updatedAcl = null;
-			AccessControlPolicyIterator applicablePolicies = accessControlManager.getApplicablePolicies(resourcePath);
-			while (applicablePolicies.hasNext()) {
-				AccessControlPolicy policy = applicablePolicies.nextAccessControlPolicy();
-				if (policy instanceof AccessControlList) {
-					updatedAcl = (AccessControlList)policy;
-					break;
-				}
-			}
-			if (updatedAcl == null) {
-				throw new RepositoryException("Unable to find an access conrol policy to update.");
-			}
-
-			StringBuilder oldPrivileges = null;
-			StringBuilder newPrivileges = null;
-			if (log.isDebugEnabled()) {
-				oldPrivileges = new StringBuilder();
-				newPrivileges = new StringBuilder();
-			}
-
-			//keep track of the existing Aces for the target principal
-			AccessControlEntry[] accessControlEntries = updatedAcl.getAccessControlEntries();
-			List<AccessControlEntry> oldAces = new ArrayList<AccessControlEntry>();
-			for (AccessControlEntry ace : accessControlEntries) {
-				if (principalId.equals(ace.getPrincipal().getName())) {
-					if (log.isDebugEnabled()) {
-						log.debug("Found Existing ACE for principal {0} on resource: ", new Object[] {principalId, resourcePath});
-					}
-					oldAces.add(ace);
-					
-					if (log.isDebugEnabled()) {
-						//collect the information for debug logging
-						boolean isAllow = AccessControlUtil.isAllow(ace);
-						Privilege[] privileges = ace.getPrivileges();
-						for (Privilege privilege : privileges) {
-							if (oldPrivileges.length() > 0) {
-								oldPrivileges.append(", "); //separate entries by commas
-							}
-							if (isAllow) {
-								oldPrivileges.append("granted=");
-							} else {
-								oldPrivileges.append("denied=");
-							}
-							oldPrivileges.append(privilege.getName());
-						}
-					}
-				}
-			}
-
-			//remove the old aces
-			if (!oldAces.isEmpty()) {
-				for (AccessControlEntry ace : oldAces) {
-					updatedAcl.removeAccessControlEntry(ace);
-				}
-			}
-			
-			//add a fresh ACE with the granted privileges
-			List<Privilege> grantedPrivilegeList = new ArrayList<Privilege>();
-			for (String name : grantedPrivilegeNames) {
-				if (name.length() == 0) {
-					continue; //empty, skip it.
-				}
-				Privilege privilege = accessControlManager.privilegeFromName(name);
-				grantedPrivilegeList.add(privilege);
-					
-				if (log.isDebugEnabled()) {
-					if (newPrivileges.length() > 0) {
-						newPrivileges.append(", "); //separate entries by commas
-					}
-					newPrivileges.append("granted=");
-					newPrivileges.append(privilege.getName());
-				}
-			}
-			if (grantedPrivilegeList.size() > 0) {
-				Principal principal = authorizable.getPrincipal();
-				updatedAcl.addAccessControlEntry(principal, grantedPrivilegeList.toArray(new Privilege[grantedPrivilegeList.size()]));
-			}
-
-			//if the authorizable is a user (not a group) process any denied privileges
-			if (!authorizable.isGroup()) {
-				//add a fresh ACE with the denied privileges
-				List<Privilege> deniedPrivilegeList = new ArrayList<Privilege>();
-				for (String name : deniedPrivilegeNames) {
-					if (name.length() == 0) {
-						continue; //empty, skip it.
-					}
-					Privilege privilege = accessControlManager.privilegeFromName(name);
-					deniedPrivilegeList.add(privilege);
-
-					if (log.isDebugEnabled()) {
-						if (newPrivileges.length() > 0) {
-							newPrivileges.append(", "); //separate entries by commas
-						}
-						newPrivileges.append("denied=");
-						newPrivileges.append(privilege.getName());
-					}
-				}
-				if (deniedPrivilegeList.size() > 0) {
-					Principal principal = authorizable.getPrincipal();
-					AccessControlUtil.addEntry(updatedAcl, principal, deniedPrivilegeList.toArray(new Privilege[deniedPrivilegeList.size()]), false);
-				}
-			}
-
-			accessControlManager.setPolicy(resourcePath, updatedAcl);
-			if (session.hasPendingChanges()) {
-				session.save();
-			}
-
-			if (log.isDebugEnabled()) {
-				log.debug("Updated ACE for principalId {0} for resource {1) from {2} to {3}", new Object [] {
-						authorizable.getID(), resourcePath, oldPrivileges.toString(), newPrivileges.toString()
-				});
-			}
-		} catch (RepositoryException re) {
-			throw new RepositoryException("Failed to create ace.", re);
-		}
-	}
-}
+/*
+ * Licensed to the Apache Software Foundation (ASF) under one or more
+ * contributor license agreements.  See the NOTICE file distributed with
+ * this work for additional information regarding copyright ownership.
+ * The ASF licenses this file to You under the Apache License, Version 2.0
+ * (the "License"); you may not use this file except in compliance with
+ * the License.  You may obtain a copy of the License at
+ *
+ *      http://www.apache.org/licenses/LICENSE-2.0
+ *
+ * Unless required by applicable law or agreed to in writing, software
+ * distributed under the License is distributed on an "AS IS" BASIS,
+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+ * See the License for the specific language governing permissions and
+ * limitations under the License.
+ */
+package org.apache.sling.jcr.jackrabbit.accessmanager.post;
+
+import java.security.Principal;
+import java.util.ArrayList;
+import java.util.Enumeration;
+import java.util.List;
+
+import javax.jcr.Item;
+import javax.jcr.RepositoryException;
+import javax.jcr.Session;
+
+import org.apache.jackrabbit.api.jsr283.security.AccessControlEntry;
+import org.apache.jackrabbit.api.jsr283.security.AccessControlList;
+import org.apache.jackrabbit.api.jsr283.security.AccessControlManager;
+import org.apache.jackrabbit.api.jsr283.security.AccessControlPolicy;
+import org.apache.jackrabbit.api.jsr283.security.AccessControlPolicyIterator;
+import org.apache.jackrabbit.api.jsr283.security.Privilege;
+import org.apache.jackrabbit.api.security.user.Authorizable;
+import org.apache.jackrabbit.api.security.user.UserManager;
+import org.apache.sling.api.SlingHttpServletRequest;
+import org.apache.sling.api.resource.Resource;
+import org.apache.sling.api.resource.ResourceNotFoundException;
+import org.apache.sling.api.servlets.HtmlResponse;
+import org.apache.sling.jcr.base.util.AccessControlUtil;
+import org.apache.sling.servlets.post.Modification;
+import org.slf4j.Logger;
+import org.slf4j.LoggerFactory;
+
+/**
+ * Sling Post Servlet implementation for modifying the ACE for a principal on
+ * a JCR resource.
+ * 
+ * @scr.component immediate="true" 
+ * @scr.service interface="javax.servlet.Servlet"
+ * @scr.property name="sling.servlet.resourceTypes" value="sling/servlet/default"
+ * @scr.property name="sling.servlet.methods" value="POST" 
+ * @scr.property name="sling.servlet.selectors" value="modifyAce" 
+ */
+public class ModifyAceServlet extends AbstractAccessPostServlet {
+	private static final long serialVersionUID = -9182485466670280437L;
+
+	/**
+     * default log
+     */
+    private final Logger log = LoggerFactory.getLogger(getClass());
+
+	/* (non-Javadoc)
+	 * @see org.apache.sling.jackrabbit.accessmanager.post.AbstractAccessPostServlet#handleOperation(org.apache.sling.api.SlingHttpServletRequest, org.apache.sling.api.servlets.HtmlResponse, java.util.List)
+	 */
+	@SuppressWarnings("unchecked")
+	@Override
+	protected void handleOperation(SlingHttpServletRequest request,
+			HtmlResponse htmlResponse, List<Modification> changes)
+			throws RepositoryException {
+		Session session = request.getResourceResolver().adaptTo(Session.class);
+		if (session == null) {
+			throw new RepositoryException("JCR Session not found");
+		}
+
+		String principalId = request.getParameter("principalId");
+		if (principalId == null) {
+			throw new RepositoryException("principalId was not submitted.");
+		}
+		UserManager userManager = AccessControlUtil.getUserManager(session);
+		Authorizable authorizable = userManager.getAuthorizable(principalId);
+		if (authorizable == null) {
+			throw new RepositoryException("No principal found for id: " + principalId);
+		}
+
+    	String resourcePath = null;
+    	Resource resource = request.getResource();
+    	if (resource == null) {
+			throw new ResourceNotFoundException("Resource not found.");
+    	} else {
+    		Item item = resource.adaptTo(Item.class);
+    		if (item != null) {
+    			resourcePath = item.getPath();
+    		} else {
+    			throw new ResourceNotFoundException("Resource is not a JCR Node");
+    		}
+    	}
+		
+		
+		List<String> grantedPrivilegeNames = new ArrayList<String>();
+		List<String> deniedPrivilegeNames = new ArrayList<String>();
+		Enumeration parameterNames = request.getParameterNames();
+		while (parameterNames.hasMoreElements()) {
+			Object nextElement = parameterNames.nextElement();
+			if (nextElement instanceof String) {
+				String paramName = (String)nextElement;
+				if (paramName.startsWith("privilege@")) {
+					String parameterValue = request.getParameter(paramName);
+					if (parameterValue != null && parameterValue.length() > 0) {
+						if ("granted".equals(parameterValue)) {
+							String privilegeName = paramName.substring(10);
+							grantedPrivilegeNames.add(privilegeName);
+						} else if ("denied".equals(parameterValue)) {
+							String privilegeName = paramName.substring(10);
+							deniedPrivilegeNames.add(privilegeName);
+						}
+					}
+				}
+			}
+		}
+
+		try {
+			AccessControlManager accessControlManager = AccessControlUtil.getAccessControlManager(session);
+			AccessControlList updatedAcl = null;
+			AccessControlPolicyIterator applicablePolicies = accessControlManager.getApplicablePolicies(resourcePath);
+			while (applicablePolicies.hasNext()) {
+				AccessControlPolicy policy = applicablePolicies.nextAccessControlPolicy();
+				if (policy instanceof AccessControlList) {
+					updatedAcl = (AccessControlList)policy;
+					break;
+				}
+			}
+			if (updatedAcl == null) {
+				throw new RepositoryException("Unable to find an access conrol policy to update.");
+			}
+
+			StringBuilder oldPrivileges = null;
+			StringBuilder newPrivileges = null;
+			if (log.isDebugEnabled()) {
+				oldPrivileges = new StringBuilder();
+				newPrivileges = new StringBuilder();
+			}
+
+			//keep track of the existing Aces for the target principal
+			AccessControlEntry[] accessControlEntries = updatedAcl.getAccessControlEntries();
+			List<AccessControlEntry> oldAces = new ArrayList<AccessControlEntry>();
+			for (AccessControlEntry ace : accessControlEntries) {
+				if (principalId.equals(ace.getPrincipal().getName())) {
+					if (log.isDebugEnabled()) {
+						log.debug("Found Existing ACE for principal {0} on resource: ", new Object[] {principalId, resourcePath});
+					}
+					oldAces.add(ace);
+					
+					if (log.isDebugEnabled()) {
+						//collect the information for debug logging
+						boolean isAllow = AccessControlUtil.isAllow(ace);
+						Privilege[] privileges = ace.getPrivileges();
+						for (Privilege privilege : privileges) {
+							if (oldPrivileges.length() > 0) {
+								oldPrivileges.append(", "); //separate entries by commas
+							}
+							if (isAllow) {
+								oldPrivileges.append("granted=");
+							} else {
+								oldPrivileges.append("denied=");
+							}
+							oldPrivileges.append(privilege.getName());
+						}
+					}
+				}
+			}
+
+			//remove the old aces
+			if (!oldAces.isEmpty()) {
+				for (AccessControlEntry ace : oldAces) {
+					updatedAcl.removeAccessControlEntry(ace);
+				}
+			}
+			
+			//add a fresh ACE with the granted privileges
+			List<Privilege> grantedPrivilegeList = new ArrayList<Privilege>();
+			for (String name : grantedPrivilegeNames) {
+				if (name.length() == 0) {
+					continue; //empty, skip it.
+				}
+				Privilege privilege = accessControlManager.privilegeFromName(name);
+				grantedPrivilegeList.add(privilege);
+					
+				if (log.isDebugEnabled()) {
+					if (newPrivileges.length() > 0) {
+						newPrivileges.append(", "); //separate entries by commas
+					}
+					newPrivileges.append("granted=");
+					newPrivileges.append(privilege.getName());
+				}
+			}
+			if (grantedPrivilegeList.size() > 0) {
+				Principal principal = authorizable.getPrincipal();
+				updatedAcl.addAccessControlEntry(principal, grantedPrivilegeList.toArray(new Privilege[grantedPrivilegeList.size()]));
+			}
+
+			//if the authorizable is a user (not a group) process any denied privileges
+			if (!authorizable.isGroup()) {
+				//add a fresh ACE with the denied privileges
+				List<Privilege> deniedPrivilegeList = new ArrayList<Privilege>();
+				for (String name : deniedPrivilegeNames) {
+					if (name.length() == 0) {
+						continue; //empty, skip it.
+					}
+					Privilege privilege = accessControlManager.privilegeFromName(name);
+					deniedPrivilegeList.add(privilege);
+
+					if (log.isDebugEnabled()) {
+						if (newPrivileges.length() > 0) {
+							newPrivileges.append(", "); //separate entries by commas
+						}
+						newPrivileges.append("denied=");
+						newPrivileges.append(privilege.getName());
+					}
+				}
+				if (deniedPrivilegeList.size() > 0) {
+					Principal principal = authorizable.getPrincipal();
+					AccessControlUtil.addEntry(updatedAcl, principal, deniedPrivilegeList.toArray(new Privilege[deniedPrivilegeList.size()]), false);
+				}
+			}
+
+			accessControlManager.setPolicy(resourcePath, updatedAcl);
+			if (session.hasPendingChanges()) {
+				session.save();
+			}
+
+			if (log.isDebugEnabled()) {
+				log.debug("Updated ACE for principalId {0} for resource {1) from {2} to {3}", new Object [] {
+						authorizable.getID(), resourcePath, oldPrivileges.toString(), newPrivileges.toString()
+				});
+			}
+		} catch (RepositoryException re) {
+			throw new RepositoryException("Failed to create ace.", re);
+		}
+	}
+}
diff --git a/src/main/resources/org/apache/sling/jcr/jackrabbit/accessmanager/PrivilegesResources.properties b/src/main/resources/org/apache/sling/jcr/jackrabbit/accessmanager/PrivilegesResources.properties
index a7d1083..9c0112e 100644
--- a/src/main/resources/org/apache/sling/jcr/jackrabbit/accessmanager/PrivilegesResources.properties
+++ b/src/main/resources/org/apache/sling/jcr/jackrabbit/accessmanager/PrivilegesResources.properties
@@ -1,23 +1,23 @@
-#
-#  Licensed to the Apache Software Foundation (ASF) under one
-#  or more contributor license agreements.  See the NOTICE file
-#  distributed with this work for additional information
-#  regarding copyright ownership.  The ASF licenses this file
-#  to you under the Apache License, Version 2.0 (the
-#  "License"); you may not use this file except in compliance
-#  with the License.  You may obtain a copy of the License at
-#
-#   http://www.apache.org/licenses/LICENSE-2.0
-#
-#  Unless required by applicable law or agreed to in writing,
-#  software distributed under the License is distributed on an
-#  "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY
-#  KIND, either express or implied.  See the License for the
-#  specific language governing permissions and limitations
-#  under the License.
-
-privilegeset.all=Full Control
-privilegeset.readonly=Read Only
-privilegeset.readwrite=Read/Write
-privilegeset.none=None
+#
+#  Licensed to the Apache Software Foundation (ASF) under one
+#  or more contributor license agreements.  See the NOTICE file
+#  distributed with this work for additional information
+#  regarding copyright ownership.  The ASF licenses this file
+#  to you under the Apache License, Version 2.0 (the
+#  "License"); you may not use this file except in compliance
+#  with the License.  You may obtain a copy of the License at
+#
+#   http://www.apache.org/licenses/LICENSE-2.0
+#
+#  Unless required by applicable law or agreed to in writing,
+#  software distributed under the License is distributed on an
+#  "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY
+#  KIND, either express or implied.  See the License for the
+#  specific language governing permissions and limitations
+#  under the License.
+
+privilegeset.all=Full Control
+privilegeset.readonly=Read Only
+privilegeset.readwrite=Read/Write
+privilegeset.none=None
 privilegeset.custom=Custom
\ No newline at end of file

-- 
To stop receiving notification emails like this one, please contact
"commits@sling.apache.org" <co...@sling.apache.org>.

[sling-org-apache-sling-jcr-jackrabbit-accessmanager] 15/16: Move Sling to new TLP location

Posted by ro...@apache.org.
This is an automated email from the ASF dual-hosted git repository.

rombert pushed a commit to annotated tag org.apache.sling.jcr.jackrabbit.accessmanager-2.0.2-incubator
in repository https://gitbox.apache.org/repos/asf/sling-org-apache-sling-jcr-jackrabbit-accessmanager.git

commit dc2cc3ea8b4434d884a3f14d349dd3315d961d63
Author: Felix Meschberger <fm...@apache.org>
AuthorDate: Thu Jun 18 09:21:02 2009 +0000

    Move Sling to new TLP location
    
    git-svn-id: https://svn.eu.apache.org/repos/asf/sling/tags/org.apache.sling.jcr.jackrabbit.accessmanager-2.0.2-incubator@785979 13f79535-47bb-0310-9956-ffa450edef68
---
 LICENSE                                            | 202 +++++++
 NOTICE                                             |   8 +
 README.txt                                         |  37 ++
 pom.xml                                            | 136 +++++
 .../jackrabbit/accessmanager/PrivilegesInfo.java   | 616 +++++++++++++++++++++
 .../post/AbstractAccessPostServlet.java            | 254 +++++++++
 .../accessmanager/post/DeleteAcesServlet.java      | 128 +++++
 .../accessmanager/post/GetAclServlet.java          | 180 ++++++
 .../accessmanager/post/ModifyAceServlet.java       | 241 ++++++++
 src/main/resources/META-INF/DISCLAIMER             |   7 +
 src/main/resources/META-INF/LICENSE                | 202 +++++++
 src/main/resources/META-INF/NOTICE                 |   8 +
 .../OSGI-INF/metatype/metatype.properties          |  25 +
 .../accessmanager/PrivilegesResources.properties   |  23 +
 14 files changed, 2067 insertions(+)

diff --git a/LICENSE b/LICENSE
new file mode 100644
index 0000000..75b5248
--- /dev/null
+++ b/LICENSE
@@ -0,0 +1,202 @@
+
+                                 Apache License
+                           Version 2.0, January 2004
+                        http://www.apache.org/licenses/
+
+   TERMS AND CONDITIONS FOR USE, REPRODUCTION, AND DISTRIBUTION
+
+   1. Definitions.
+
+      "License" shall mean the terms and conditions for use, reproduction,
+      and distribution as defined by Sections 1 through 9 of this document.
+
+      "Licensor" shall mean the copyright owner or entity authorized by
+      the copyright owner that is granting the License.
+
+      "Legal Entity" shall mean the union of the acting entity and all
+      other entities that control, are controlled by, or are under common
+      control with that entity. For the purposes of this definition,
+      "control" means (i) the power, direct or indirect, to cause the
+      direction or management of such entity, whether by contract or
+      otherwise, or (ii) ownership of fifty percent (50%) or more of the
+      outstanding shares, or (iii) beneficial ownership of such entity.
+
+      "You" (or "Your") shall mean an individual or Legal Entity
+      exercising permissions granted by this License.
+
+      "Source" form shall mean the preferred form for making modifications,
+      including but not limited to software source code, documentation
+      source, and configuration files.
+
+      "Object" form shall mean any form resulting from mechanical
+      transformation or translation of a Source form, including but
+      not limited to compiled object code, generated documentation,
+      and conversions to other media types.
+
+      "Work" shall mean the work of authorship, whether in Source or
+      Object form, made available under the License, as indicated by a
+      copyright notice that is included in or attached to the work
+      (an example is provided in the Appendix below).
+
+      "Derivative Works" shall mean any work, whether in Source or Object
+      form, that is based on (or derived from) the Work and for which the
+      editorial revisions, annotations, elaborations, or other modifications
+      represent, as a whole, an original work of authorship. For the purposes
+      of this License, Derivative Works shall not include works that remain
+      separable from, or merely link (or bind by name) to the interfaces of,
+      the Work and Derivative Works thereof.
+
+      "Contribution" shall mean any work of authorship, including
+      the original version of the Work and any modifications or additions
+      to that Work or Derivative Works thereof, that is intentionally
+      submitted to Licensor for inclusion in the Work by the copyright owner
+      or by an individual or Legal Entity authorized to submit on behalf of
+      the copyright owner. For the purposes of this definition, "submitted"
+      means any form of electronic, verbal, or written communication sent
+      to the Licensor or its representatives, including but not limited to
+      communication on electronic mailing lists, source code control systems,
+      and issue tracking systems that are managed by, or on behalf of, the
+      Licensor for the purpose of discussing and improving the Work, but
+      excluding communication that is conspicuously marked or otherwise
+      designated in writing by the copyright owner as "Not a Contribution."
+
+      "Contributor" shall mean Licensor and any individual or Legal Entity
+      on behalf of whom a Contribution has been received by Licensor and
+      subsequently incorporated within the Work.
+
+   2. Grant of Copyright License. Subject to the terms and conditions of
+      this License, each Contributor hereby grants to You a perpetual,
+      worldwide, non-exclusive, no-charge, royalty-free, irrevocable
+      copyright license to reproduce, prepare Derivative Works of,
+      publicly display, publicly perform, sublicense, and distribute the
+      Work and such Derivative Works in Source or Object form.
+
+   3. Grant of Patent License. Subject to the terms and conditions of
+      this License, each Contributor hereby grants to You a perpetual,
+      worldwide, non-exclusive, no-charge, royalty-free, irrevocable
+      (except as stated in this section) patent license to make, have made,
+      use, offer to sell, sell, import, and otherwise transfer the Work,
+      where such license applies only to those patent claims licensable
+      by such Contributor that are necessarily infringed by their
+      Contribution(s) alone or by combination of their Contribution(s)
+      with the Work to which such Contribution(s) was submitted. If You
+      institute patent litigation against any entity (including a
+      cross-claim or counterclaim in a lawsuit) alleging that the Work
+      or a Contribution incorporated within the Work constitutes direct
+      or contributory patent infringement, then any patent licenses
+      granted to You under this License for that Work shall terminate
+      as of the date such litigation is filed.
+
+   4. Redistribution. You may reproduce and distribute copies of the
+      Work or Derivative Works thereof in any medium, with or without
+      modifications, and in Source or Object form, provided that You
+      meet the following conditions:
+
+      (a) You must give any other recipients of the Work or
+          Derivative Works a copy of this License; and
+
+      (b) You must cause any modified files to carry prominent notices
+          stating that You changed the files; and
+
+      (c) You must retain, in the Source form of any Derivative Works
+          that You distribute, all copyright, patent, trademark, and
+          attribution notices from the Source form of the Work,
+          excluding those notices that do not pertain to any part of
+          the Derivative Works; and
+
+      (d) If the Work includes a "NOTICE" text file as part of its
+          distribution, then any Derivative Works that You distribute must
+          include a readable copy of the attribution notices contained
+          within such NOTICE file, excluding those notices that do not
+          pertain to any part of the Derivative Works, in at least one
+          of the following places: within a NOTICE text file distributed
+          as part of the Derivative Works; within the Source form or
+          documentation, if provided along with the Derivative Works; or,
+          within a display generated by the Derivative Works, if and
+          wherever such third-party notices normally appear. The contents
+          of the NOTICE file are for informational purposes only and
+          do not modify the License. You may add Your own attribution
+          notices within Derivative Works that You distribute, alongside
+          or as an addendum to the NOTICE text from the Work, provided
+          that such additional attribution notices cannot be construed
+          as modifying the License.
+
+      You may add Your own copyright statement to Your modifications and
+      may provide additional or different license terms and conditions
+      for use, reproduction, or distribution of Your modifications, or
+      for any such Derivative Works as a whole, provided Your use,
+      reproduction, and distribution of the Work otherwise complies with
+      the conditions stated in this License.
+
+   5. Submission of Contributions. Unless You explicitly state otherwise,
+      any Contribution intentionally submitted for inclusion in the Work
+      by You to the Licensor shall be under the terms and conditions of
+      this License, without any additional terms or conditions.
+      Notwithstanding the above, nothing herein shall supersede or modify
+      the terms of any separate license agreement you may have executed
+      with Licensor regarding such Contributions.
+
+   6. Trademarks. This License does not grant permission to use the trade
+      names, trademarks, service marks, or product names of the Licensor,
+      except as required for reasonable and customary use in describing the
+      origin of the Work and reproducing the content of the NOTICE file.
+
+   7. Disclaimer of Warranty. Unless required by applicable law or
+      agreed to in writing, Licensor provides the Work (and each
+      Contributor provides its Contributions) on an "AS IS" BASIS,
+      WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or
+      implied, including, without limitation, any warranties or conditions
+      of TITLE, NON-INFRINGEMENT, MERCHANTABILITY, or FITNESS FOR A
+      PARTICULAR PURPOSE. You are solely responsible for determining the
+      appropriateness of using or redistributing the Work and assume any
+      risks associated with Your exercise of permissions under this License.
+
+   8. Limitation of Liability. In no event and under no legal theory,
+      whether in tort (including negligence), contract, or otherwise,
+      unless required by applicable law (such as deliberate and grossly
+      negligent acts) or agreed to in writing, shall any Contributor be
+      liable to You for damages, including any direct, indirect, special,
+      incidental, or consequential damages of any character arising as a
+      result of this License or out of the use or inability to use the
+      Work (including but not limited to damages for loss of goodwill,
+      work stoppage, computer failure or malfunction, or any and all
+      other commercial damages or losses), even if such Contributor
+      has been advised of the possibility of such damages.
+
+   9. Accepting Warranty or Additional Liability. While redistributing
+      the Work or Derivative Works thereof, You may choose to offer,
+      and charge a fee for, acceptance of support, warranty, indemnity,
+      or other liability obligations and/or rights consistent with this
+      License. However, in accepting such obligations, You may act only
+      on Your own behalf and on Your sole responsibility, not on behalf
+      of any other Contributor, and only if You agree to indemnify,
+      defend, and hold each Contributor harmless for any liability
+      incurred by, or claims asserted against, such Contributor by reason
+      of your accepting any such warranty or additional liability.
+
+   END OF TERMS AND CONDITIONS
+
+   APPENDIX: How to apply the Apache License to your work.
+
+      To apply the Apache License to your work, attach the following
+      boilerplate notice, with the fields enclosed by brackets "[]"
+      replaced with your own identifying information. (Don't include
+      the brackets!)  The text should be enclosed in the appropriate
+      comment syntax for the file format. We also recommend that a
+      file or class name and description of purpose be included on the
+      same "printed page" as the copyright notice for easier
+      identification within third-party archives.
+
+   Copyright [yyyy] [name of copyright owner]
+
+   Licensed under the Apache License, Version 2.0 (the "License");
+   you may not use this file except in compliance with the License.
+   You may obtain a copy of the License at
+
+       http://www.apache.org/licenses/LICENSE-2.0
+
+   Unless required by applicable law or agreed to in writing, software
+   distributed under the License is distributed on an "AS IS" BASIS,
+   WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+   See the License for the specific language governing permissions and
+   limitations under the License.
diff --git a/NOTICE b/NOTICE
new file mode 100644
index 0000000..ca3686b
--- /dev/null
+++ b/NOTICE
@@ -0,0 +1,8 @@
+Apache Sling Jackrabbit JSR-283 Access Control Manager Support
+Copyright 2008-2009 The Apache Software Foundation
+
+Apache Sling is based on source code originally developed 
+by Day Software (http://www.day.com/).
+
+This product includes software developed at
+The Apache Software Foundation (http://www.apache.org/).
diff --git a/README.txt b/README.txt
new file mode 100644
index 0000000..c6a8b37
--- /dev/null
+++ b/README.txt
@@ -0,0 +1,37 @@
+Apache Sling Jackrabbit JSR-283 Access Control Manager Support
+
+Provides actions for the JSR-283 Access Control Manager.
+
+Disclaimer
+==========
+Apache Sling is an effort undergoing incubation at The Apache Software Foundation (ASF),
+sponsored by the Apache Jackrabbit PMC. Incubation is required of all newly accepted
+projects until a further review indicates that the infrastructure, communications,
+and decision making process have stabilized in a manner consistent with other
+successful ASF projects. While incubation status is not necessarily a reflection of
+the completeness or stability of the code, it does indicate that the project has yet
+to be fully endorsed by the ASF.
+
+Getting Started
+===============
+
+This component uses a Maven 2 (http://maven.apache.org/) build
+environment. It requires a Java 5 JDK (or higher) and Maven (http://maven.apache.org/)
+2.0.7 or later. We recommend to use the latest Maven version.
+
+If you have Maven 2 installed, you can compile and
+package the jar using the following command:
+
+    mvn package
+
+See the Maven 2 documentation for other build features.
+
+The latest source code for this component is available in the
+Subversion (http://subversion.tigris.org/) source repository of
+the Apache Software Foundation. If you have Subversion installed,
+you can checkout the latest source using the following command:
+
+    svn checkout http://svn.apache.org/repos/asf/incubator/sling/trunk/servlets/post
+
+See the Subversion documentation for other source control features.
+
diff --git a/pom.xml b/pom.xml
new file mode 100644
index 0000000..513a7fe
--- /dev/null
+++ b/pom.xml
@@ -0,0 +1,136 @@
+<?xml version="1.0" encoding="ISO-8859-1"?>
+<!--
+    Licensed to the Apache Software Foundation (ASF) under one
+    or more contributor license agreements.  See the NOTICE file
+    distributed with this work for additional information
+    regarding copyright ownership.  The ASF licenses this file
+    to you under the Apache License, Version 2.0 (the
+    "License"); you may not use this file except in compliance
+    with the License.  You may obtain a copy of the License at
+                                     
+    http://www.apache.org/licenses/LICENSE-2.0
+        
+    Unless required by applicable law or agreed to in writing,
+    software distributed under the License is distributed on an
+    "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY
+    KIND, either express or implied.  See the License for the
+    specific language governing permissions and limitations
+    under the License.
+-->
+<project xmlns="http://maven.apache.org/POM/4.0.0" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://maven.apache.org/POM/4.0.0 http://maven.apache.org/maven-v4_0_0.xsd">
+	
+	<modelVersion>4.0.0</modelVersion>
+	<parent>
+		<groupId>org.apache.sling</groupId>
+		<artifactId>sling</artifactId>
+        <version>5-incubator</version>
+		<relativePath>../../../parent/pom.xml</relativePath>
+	</parent>
+
+	<artifactId>org.apache.sling.jcr.jackrabbit.accessmanager</artifactId>
+	<packaging>bundle</packaging>
+	<version>2.0.2-incubator</version>
+	<name>Apache Sling Jackrabbit JSR-283 Access Control Manager Support</name>
+	<description>
+		Provides SlingPostOperations for the Jackrabbit JSR-283 Access Control Manager.
+	</description>
+
+	<scm>
+		<connection>
+			scm:svn:http://svn.apache.org/repos/asf/incubator/sling/tags/org.apache.sling.jcr.jackrabbit.accessmanager-2.0.2-incubator
+		</connection>
+		<developerConnection>
+			scm:svn:https://svn.apache.org/repos/asf/incubator/sling/tags/org.apache.sling.jcr.jackrabbit.accessmanager-2.0.2-incubator
+		</developerConnection>
+		<url>
+			http://svn.apache.org/viewvc/incubator/sling/tags/org.apache.sling.jcr.jackrabbit.accessmanager-2.0.2-incubator
+		</url>
+	</scm>
+
+	<build>
+		<plugins>
+			<plugin>
+				<groupId>org.apache.felix</groupId>
+				<artifactId>maven-scr-plugin</artifactId>
+			</plugin>
+			<plugin>
+				<groupId>org.apache.felix</groupId>
+				<artifactId>maven-bundle-plugin</artifactId>
+				<extensions>true</extensions>
+				<configuration>
+					<instructions>
+						<Private-Package>
+						</Private-Package>
+						<Export-Package>
+                     org.apache.sling.jcr.jackrabbit.accessmanager;version=${pom.version},
+                     org.apache.sling.jcr.jackrabbit.accessmanager.post;version=${pom.version}                   
+						</Export-Package>
+						<Sling-Initial-Content />
+						<Sling-Nodetypes />
+					</instructions>
+				</configuration>
+			</plugin>
+		</plugins>
+	</build>
+
+	<reporting>
+		<plugins>
+			<plugin>
+				<groupId>org.apache.maven.plugins</groupId>
+				<artifactId>maven-javadoc-plugin</artifactId>
+				<configuration>
+					<!-- No javadocs -->
+					<excludePackageNames>
+					</excludePackageNames>
+				</configuration>
+			</plugin>
+		</plugins>
+	</reporting>
+
+	<dependencies>
+		<dependency>
+			<groupId>javax.servlet</groupId>
+			<artifactId>servlet-api</artifactId>
+		</dependency>
+		
+      <dependency>
+         <groupId>org.apache.sling</groupId>
+         <artifactId>org.apache.sling.commons.json</artifactId>
+         <version>2.0.4-incubator</version>
+      </dependency>
+		
+		<dependency>
+			<groupId>org.apache.sling</groupId>
+			<artifactId>org.apache.sling.api</artifactId>
+			<version>2.0.4-incubator</version>
+		</dependency>
+		<dependency>
+			<groupId>org.apache.sling</groupId>
+			<artifactId>org.apache.sling.servlets.post</artifactId>
+			<version>2.0.4-incubator</version>
+		</dependency>
+        <dependency>
+            <groupId>org.apache.jackrabbit</groupId>
+            <artifactId>jackrabbit-api</artifactId>
+            <version>1.5.0</version>
+        </dependency>
+		<dependency>
+			<groupId>org.apache.sling</groupId>
+			<artifactId>org.apache.sling.jcr.base</artifactId>
+			<version>2.0.4-incubator</version>
+		</dependency>
+		<dependency>
+			<groupId>org.apache.jackrabbit</groupId>
+			<artifactId>jackrabbit-api</artifactId>
+			<version>1.5.0</version>
+		</dependency>
+		<dependency>
+			<groupId>org.apache.felix</groupId>
+			<artifactId>org.osgi.core</artifactId>
+		</dependency>
+		<dependency>
+			<groupId>org.apache.felix</groupId>
+			<artifactId>org.osgi.compendium</artifactId>
+		</dependency>
+	</dependencies>
+</project>
diff --git a/src/main/java/org/apache/sling/jcr/jackrabbit/accessmanager/PrivilegesInfo.java b/src/main/java/org/apache/sling/jcr/jackrabbit/accessmanager/PrivilegesInfo.java
new file mode 100644
index 0000000..3143650
--- /dev/null
+++ b/src/main/java/org/apache/sling/jcr/jackrabbit/accessmanager/PrivilegesInfo.java
@@ -0,0 +1,616 @@
+/*
+ * Licensed to the Apache Software Foundation (ASF) under one or more
+ * contributor license agreements.  See the NOTICE file distributed with
+ * this work for additional information regarding copyright ownership.
+ * The ASF licenses this file to You under the Apache License, Version 2.0
+ * (the "License"); you may not use this file except in compliance with
+ * the License.  You may obtain a copy of the License at
+ *
+ *      http://www.apache.org/licenses/LICENSE-2.0
+ *
+ * Unless required by applicable law or agreed to in writing, software
+ * distributed under the License is distributed on an "AS IS" BASIS,
+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+ * See the License for the specific language governing permissions and
+ * limitations under the License.
+ */
+package org.apache.sling.jcr.jackrabbit.accessmanager;
+
+import java.lang.reflect.InvocationTargetException;
+import java.lang.reflect.Method;
+import java.security.Principal;
+import java.util.Arrays;
+import java.util.HashSet;
+import java.util.Iterator;
+import java.util.LinkedHashMap;
+import java.util.Locale;
+import java.util.Map;
+import java.util.ResourceBundle;
+import java.util.Set;
+
+import javax.jcr.Node;
+import javax.jcr.RepositoryException;
+import javax.jcr.Session;
+
+import org.apache.jackrabbit.api.jsr283.security.AccessControlEntry;
+import org.apache.jackrabbit.api.jsr283.security.AccessControlList;
+import org.apache.jackrabbit.api.jsr283.security.AccessControlManager;
+import org.apache.jackrabbit.api.jsr283.security.AccessControlPolicy;
+import org.apache.jackrabbit.api.jsr283.security.Privilege;
+import org.apache.jackrabbit.api.security.principal.PrincipalManager;
+import org.apache.sling.jcr.base.util.AccessControlUtil;
+
+/**
+ * Helper class to assist in the usage of access control from scripts.
+ */
+public class PrivilegesInfo {
+	
+	/**
+	 * Return the supported Privileges for the specified node.
+	 * 
+	 * @param node the node to check
+	 * @return array of Privileges
+	 * @throws RepositoryException
+	 */
+	public Privilege [] getSupportedPrivileges(Node node) throws RepositoryException {
+		return getSupportedPrivileges(node.getSession(), node.getPath());
+	}
+	
+	/**
+	 * Returns the supported privileges for the specified path.
+	 * 
+	 * @param session the session for the current user
+	 * @param absPath the path to get the privileges for
+	 * @return array of Privileges
+	 * @throws RepositoryException
+	 */
+	public Privilege [] getSupportedPrivileges(Session session, String absPath) throws RepositoryException {
+		AccessControlManager accessControlManager = AccessControlUtil.getAccessControlManager(session);
+		Privilege[] supportedPrivileges = accessControlManager.getSupportedPrivileges(absPath);
+		return supportedPrivileges;
+	}
+	
+	/**
+	 * Wrapper class that holds the set of Privileges that are granted 
+	 * and/or denied for a specific principal.
+	 */
+	public static class AccessRights {
+		private Set<Privilege> granted = new HashSet<Privilege>();
+		private Set<Privilege> denied = new HashSet<Privilege>();
+
+		private transient static ResourceBundle resBundle = null; 
+		private ResourceBundle getResourceBundle(Locale locale) {
+			if (resBundle == null || !resBundle.getLocale().equals(locale)) {
+				resBundle = ResourceBundle.getBundle(getClass().getPackage().getName() + ".PrivilegesResources", locale);
+			}
+			return resBundle;
+		}
+		
+
+		public Set<Privilege> getGranted() {
+			return granted;
+		}
+		public Set<Privilege> getDenied() {
+			return denied;
+		}
+		
+		public String getPrivilegeSetDisplayName(Locale locale) {
+			if (denied != null && !denied.isEmpty()) {
+				//if there are any denied privileges, then this is a custom privilege set
+				return getResourceBundle(locale).getString("privilegeset.custom");
+			} else {
+				if (granted.isEmpty()) {
+					//appears to have an empty privilege set
+					return getResourceBundle(locale).getString("privilegeset.none");
+				}
+					
+				if (granted.size() == 1) {
+					//check if the single privilege is jcr:all or jcr:read
+					Iterator<Privilege> iterator = granted.iterator();
+					Privilege next = iterator.next();
+					if ("jcr:all".equals(next.getName())) {
+						//full control privilege set
+						return getResourceBundle(locale).getString("privilegeset.all");
+					} else if ("jcr:read".equals(next.getName())) {
+						//readonly privilege set
+						return getResourceBundle(locale).getString("privilegeset.readonly");
+					} 
+				} else if (granted.size() == 2) {
+					//check if the two privileges are jcr:read and jcr:write
+					Iterator<Privilege> iterator = granted.iterator();
+					Privilege next = iterator.next();
+					Privilege next2 = iterator.next();
+					if ( ("jcr:read".equals(next.getName()) && "jcr:write".equals(next2.getName())) ||
+							("jcr:read".equals(next2.getName()) && "jcr:write".equals(next.getName())) ) {
+						//read/write privileges
+						return getResourceBundle(locale).getString("privilegeset.readwrite");
+					}
+				}
+
+				//some other set of privileges
+				return getResourceBundle(locale).getString("privilegeset.custom");
+			}
+		}
+	}
+
+	/**
+	 * Returns the mapping of declared access rights that have been set for the resource at
+	 * the given path. 
+	 * 
+	 * @param node the node to get the access rights for
+	 * @return map of access rights.  Key is the user/group principal, value contains the granted/denied privileges
+	 * @throws RepositoryException
+	 */
+	public Map<Principal, AccessRights> getDeclaredAccessRights(Node node) throws RepositoryException {
+		Map<Principal, AccessRights> accessRights = getDeclaredAccessRights(node.getSession(), node.getPath());
+		return accessRights;
+	}
+	
+	/**
+	 * Returns the mapping of declared access rights that have been set for the resource at
+	 * the given path. 
+	 * 
+	 * @param session the current user session.
+	 * @param absPath the path of the resource to get the access rights for
+	 * @return map of access rights.  Key is the user/group principal, value contains the granted/denied privileges
+	 * @throws RepositoryException
+	 */
+	public Map<Principal, AccessRights> getDeclaredAccessRights(Session session, String absPath) throws RepositoryException {
+		Map<Principal, AccessRights> accessMap = new LinkedHashMap<Principal, AccessRights>();
+		AccessControlEntry[] entries = getDeclaredAccessControlEntries(session, absPath);
+		if (entries != null) {
+			for (AccessControlEntry ace : entries) {
+				Principal principal = ace.getPrincipal();
+				AccessRights accessPrivleges = accessMap.get(principal);
+				if (accessPrivleges == null) {
+					accessPrivleges = new AccessRights();
+					accessMap.put(principal, accessPrivleges);
+				}
+				boolean allow = AccessControlUtil.isAllow(ace);
+				if (allow) {
+					accessPrivleges.getGranted().addAll(Arrays.asList(ace.getPrivileges()));
+				} else {
+					accessPrivleges.getDenied().addAll(Arrays.asList(ace.getPrivileges()));
+				}
+			}
+		}
+		
+		return accessMap;
+	}
+
+	private AccessControlEntry[] getDeclaredAccessControlEntries(Session session, String absPath) throws RepositoryException {
+		AccessControlManager accessControlManager = AccessControlUtil.getAccessControlManager(session);
+		AccessControlPolicy[] policies = accessControlManager.getPolicies(absPath);
+		for (AccessControlPolicy accessControlPolicy : policies) {
+			if (accessControlPolicy instanceof AccessControlList) {
+				AccessControlEntry[] accessControlEntries = ((AccessControlList)accessControlPolicy).getAccessControlEntries();
+				return accessControlEntries;
+			}
+		}
+		return new AccessControlEntry[0];
+	}
+
+	/**
+	 * Returns the declared access rights for the specified Node for the given
+	 * principalId.
+	 * 
+	 * @param node the JCR node to retrieve the access rights for
+	 * @param principalId the principalId to get the access rights for
+	 * @return access rights for the specified principal
+	 * @throws RepositoryException
+	 */
+	public AccessRights getDeclaredAccessRightsForPrincipal(Node node, String principalId) throws RepositoryException {
+		return getDeclaredAccessRightsForPrincipal(node.getSession(), node.getPath(), principalId);
+	}
+
+	/**
+	 * Returns the declared access rights for the resource at the specified path for the given
+	 * principalId.
+	 * 
+	 * @param session the current JCR session
+	 * @param absPath the path of the resource to retrieve the rights for
+	 * @param principalId the principalId to get the access rights for
+	 * @return access rights for the specified principal
+	 * @throws RepositoryException
+	 */
+	public AccessRights getDeclaredAccessRightsForPrincipal(Session session, String absPath, String principalId) throws RepositoryException {
+		AccessRights rights = new AccessRights();
+		if (principalId != null && principalId.length() > 0) {
+			AccessControlManager accessControlManager = AccessControlUtil.getAccessControlManager(session);
+			AccessControlPolicy[] policies = accessControlManager.getPolicies(absPath);
+			for (AccessControlPolicy accessControlPolicy : policies) {
+				if (accessControlPolicy instanceof AccessControlList) {
+					AccessControlEntry[] accessControlEntries = ((AccessControlList)accessControlPolicy).getAccessControlEntries();
+					for (AccessControlEntry ace : accessControlEntries) {
+						if (principalId.equals(ace.getPrincipal().getName())) {
+							boolean isAllow = AccessControlUtil.isAllow(ace);
+							if (isAllow) {
+								rights.getGranted().addAll(Arrays.asList(ace.getPrivileges()));
+							} else {
+								rights.getDenied().addAll(Arrays.asList(ace.getPrivileges()));
+							}
+						}
+					}
+				}
+			}
+		}
+		
+		return rights;
+	}
+	
+
+	
+	
+	/**
+	 * Returns the mapping of effective access rights that have been set for the resource at
+	 * the given path. 
+	 * 
+	 * @param node the node to get the access rights for
+	 * @return map of access rights.  Key is the user/group principal, value contains the granted/denied privileges
+	 * @throws RepositoryException
+	 */
+	public Map<Principal, AccessRights> getEffectiveAccessRights(Node node) throws RepositoryException {
+		Map<Principal, AccessRights> accessRights = getEffectiveAccessRights(node.getSession(), node.getPath());
+		return accessRights;
+	}
+	
+	/**
+	 * Returns the mapping of effective access rights that have been set for the resource at
+	 * the given path. 
+	 * 
+	 * @param session the current user session.
+	 * @param absPath the path of the resource to get the access rights for
+	 * @return map of access rights.  Key is the user/group principal, value contains the granted/denied privileges
+	 * @throws RepositoryException
+	 */
+	public Map<Principal, AccessRights> getEffectiveAccessRights(Session session, String absPath) throws RepositoryException {
+		Map<Principal, AccessRights> accessMap = new LinkedHashMap<Principal, AccessRights>();
+		AccessControlEntry[] entries = getEffectiveAccessControlEntries(session, absPath);
+		if (entries != null) {
+			for (AccessControlEntry ace : entries) {
+				Principal principal = ace.getPrincipal();
+				AccessRights accessPrivleges = accessMap.get(principal);
+				if (accessPrivleges == null) {
+					accessPrivleges = new AccessRights();
+					accessMap.put(principal, accessPrivleges);
+				}
+				boolean allow = AccessControlUtil.isAllow(ace);
+				if (allow) {
+					accessPrivleges.getGranted().addAll(Arrays.asList(ace.getPrivileges()));
+				} else {
+					accessPrivleges.getDenied().addAll(Arrays.asList(ace.getPrivileges()));
+				}
+			}
+		}
+		
+		return accessMap;
+	}
+	
+	private AccessControlEntry[] getEffectiveAccessControlEntries(Session session, String absPath) throws RepositoryException {
+		AccessControlManager accessControlManager = AccessControlUtil.getAccessControlManager(session);
+		AccessControlPolicy[] policies = accessControlManager.getEffectivePolicies(absPath);
+		for (AccessControlPolicy accessControlPolicy : policies) {
+			if (accessControlPolicy instanceof AccessControlList) {
+				AccessControlEntry[] accessControlEntries = ((AccessControlList)accessControlPolicy).getAccessControlEntries();
+				return accessControlEntries;
+			}
+		}
+		return new AccessControlEntry[0];
+	}
+
+	/**
+	 * Returns the effective access rights for the specified Node for the given
+	 * principalId.
+	 * 
+	 * @param node the JCR node to retrieve the access rights for
+	 * @param principalId the principalId to get the access rights for
+	 * @return access rights for the specified principal
+	 * @throws RepositoryException
+	 */
+	public AccessRights getEffectiveAccessRightsForPrincipal(Node node, String principalId) throws RepositoryException {
+		return getEffectiveAccessRightsForPrincipal(node.getSession(), node.getPath(), principalId);
+	}
+
+	/**
+	 * Returns the effective access rights for the resource at the specified path for the given
+	 * principalId.
+	 * 
+	 * @param session the current JCR session
+	 * @param absPath the path of the resource to retrieve the rights for
+	 * @param principalId the principalId to get the access rights for
+	 * @return access rights for the specified principal
+	 * @throws RepositoryException
+	 */
+	public AccessRights getEffectiveAccessRightsForPrincipal(Session session, String absPath, String principalId) throws RepositoryException {
+		AccessRights rights = new AccessRights();
+		if (principalId != null && principalId.length() > 0) {
+			AccessControlManager accessControlManager = AccessControlUtil.getAccessControlManager(session);
+			AccessControlPolicy[] policies = accessControlManager.getEffectivePolicies(absPath);
+			for (AccessControlPolicy accessControlPolicy : policies) {
+				if (accessControlPolicy instanceof AccessControlList) {
+					AccessControlEntry[] accessControlEntries = ((AccessControlList)accessControlPolicy).getAccessControlEntries();
+					for (AccessControlEntry ace : accessControlEntries) {
+						if (principalId.equals(ace.getPrincipal().getName())) {
+							boolean isAllow = AccessControlUtil.isAllow(ace);
+							if (isAllow) {
+								rights.getGranted().addAll(Arrays.asList(ace.getPrivileges()));
+							} else {
+								rights.getDenied().addAll(Arrays.asList(ace.getPrivileges()));
+							}
+						}
+					}
+				}
+			}
+		}
+		
+		return rights;
+	}
+	
+	
+	
+	/**
+	 * Checks whether the current user has been granted privileges
+	 * to add children to the specified node.
+	 *  
+	 * @param node the node to check
+	 * @return true if the current user has the privileges, false otherwise
+	 */
+	public boolean canAddChildren(Node node) {
+		try {
+			return canAddChildren(node.getSession(), node.getPath());
+		} catch (RepositoryException e) {
+			return false;
+		}
+	}
+	
+	/**
+	 * Checks whether the current user has been granted privileges
+	 * to add children to the specified path.
+	 *  
+	 * @param session the JCR session of the current user
+	 * @param absPath the path of the resource to check
+	 * @return true if the current user has the privileges, false otherwise
+	 */
+	public boolean canAddChildren(Session session, String absPath) {
+		try {
+			AccessControlManager accessControlManager = AccessControlUtil.getAccessControlManager(session);
+			return accessControlManager.hasPrivileges(absPath, new Privilege[] {
+							accessControlManager.privilegeFromName(Privilege.JCR_ADD_CHILD_NODES)
+						});
+		} catch (RepositoryException e) {
+			return false;
+		}
+	}
+	
+	/**
+	 * Checks whether the current user has been granted privileges
+	 * to delete children to the specified node.
+	 *  
+	 * @param node the node to check
+	 * @return true if the current user has the privileges, false otherwise
+	 */
+	public boolean canDeleteChildren(Node node) {
+		try {
+			return canDeleteChildren(node.getSession(), node.getPath());
+		} catch (RepositoryException e) {
+			return false;
+		}
+	}
+
+	/**
+	 * Checks whether the current user has been granted privileges
+	 * to delete children of the specified path.
+	 *  
+	 * @param session the JCR session of the current user
+	 * @param absPath the path of the resource to check
+	 * @return true if the current user has the privileges, false otherwise
+	 */
+	public boolean canDeleteChildren(Session session, String absPath) {
+		try {
+			AccessControlManager accessControlManager = AccessControlUtil.getAccessControlManager(session);
+			
+			return accessControlManager.hasPrivileges(absPath, new Privilege[] {
+							accessControlManager.privilegeFromName(Privilege.JCR_REMOVE_CHILD_NODES)
+						});
+		} catch (RepositoryException e) {
+			return false;
+		}
+	}
+	
+	/**
+	 * Checks whether the current user has been granted privileges
+	 * to delete the specified node.
+	 *  
+	 * @param node the node to check
+	 * @return true if the current user has the privileges, false otherwise
+	 */
+	public boolean canDelete(Node node) {
+		try {
+			return canDelete(node.getSession(), node.getPath());
+		} catch (RepositoryException e) {
+			return false;
+		}
+	}
+	
+	/**
+	 * Checks whether the current user has been granted privileges
+	 * to delete the specified path.
+	 *  
+	 * @param session the JCR session of the current user
+	 * @param absPath the path of the resource to check
+	 * @return true if the current user has the privileges, false otherwise
+	 */
+	public boolean canDelete(Session session, String absPath) {
+		try {
+			AccessControlManager accessControlManager = AccessControlUtil.getAccessControlManager(session);
+			
+			String parentPath = absPath.substring(0, absPath.lastIndexOf('/'));
+			boolean canDelete = accessControlManager.hasPrivileges(absPath, new Privilege[] {
+							accessControlManager.privilegeFromName(Privilege.JCR_REMOVE_NODE)
+						}) && canDeleteChildren(session, parentPath);
+			return canDelete;
+		} catch (RepositoryException e) {
+			return false;
+		}
+	}
+
+	/**
+	 * Checks whether the current user has been granted privileges
+	 * to modify properties of the specified node.
+	 *  
+	 * @param node the node to check
+	 * @return true if the current user has the privileges, false otherwise
+	 */
+	public boolean canModifyProperties(Node node) {
+		try {
+			return canModifyProperties(node.getSession(), node.getPath());
+		} catch (RepositoryException e) {
+			return false;
+		}
+	}
+	
+	/**
+	 * Checks whether the current user has been granted privileges
+	 * to modify properties of the specified path.
+	 *  
+	 * @param session the JCR session of the current user
+	 * @param absPath the path of the resource to check
+	 * @return true if the current user has the privileges, false otherwise
+	 */
+	public boolean canModifyProperties(Session session, String absPath) {
+		try {
+			AccessControlManager accessControlManager = AccessControlUtil.getAccessControlManager(session);
+			return accessControlManager.hasPrivileges(absPath, new Privilege[] {
+							accessControlManager.privilegeFromName(Privilege.JCR_MODIFY_PROPERTIES)
+						});
+		} catch (RepositoryException e) {
+			return false;
+		}
+	}
+	
+	/**
+	 * Checks whether the current user has been granted privileges
+	 * to read the access control of the specified node.
+	 *  
+	 * @param node the node to check
+	 * @return true if the current user has the privileges, false otherwise
+	 */
+	public boolean canReadAccessControl(Node node) {
+		try {
+			return canReadAccessControl(node.getSession(), node.getPath());
+		} catch (RepositoryException e) {
+			return false;
+		}
+	}
+	
+	/**
+	 * Checks whether the current user has been granted privileges
+	 * to read the access control of the specified path.
+	 *  
+	 * @param session the JCR session of the current user
+	 * @param absPath the path of the resource to check
+	 * @return true if the current user has the privileges, false otherwise
+	 */
+	public boolean canReadAccessControl(Session session, String absPath) {
+		try {
+			AccessControlManager accessControlManager = AccessControlUtil.getAccessControlManager(session);
+			return accessControlManager.hasPrivileges(absPath, new Privilege[] {
+							accessControlManager.privilegeFromName(Privilege.JCR_READ_ACCESS_CONTROL)
+						});
+		} catch (RepositoryException e) {
+			return false;
+		}
+	}
+	
+	/**
+	 * Checks whether the current user has been granted privileges
+	 * to modify the access control of the specified node.
+	 *  
+	 * @param node the node to check
+	 * @return true if the current user has the privileges, false otherwise
+	 */
+	public boolean canModifyAccessControl(Node node) {
+		try {
+			return canModifyAccessControl(node.getSession(), node.getPath());
+		} catch (RepositoryException e) {
+			return false;
+		}
+	}
+	
+	/**
+	 * Checks whether the current user has been granted privileges
+	 * to modify the access control of the specified path.
+	 *  
+	 * @param session the JCR session of the current user
+	 * @param absPath the path of the resource to check
+	 * @return true if the current user has the privileges, false otherwise
+	 */
+	public boolean canModifyAccessControl(Session session, String absPath) {
+		try {
+			AccessControlManager accessControlManager = AccessControlUtil.getAccessControlManager(session);
+			return accessControlManager.hasPrivileges(absPath, new Privilege[] {
+							accessControlManager.privilegeFromName(Privilege.JCR_MODIFY_ACCESS_CONTROL)
+						});
+		} catch (RepositoryException e) {
+			return false;
+		}
+	}
+
+
+	/**
+	 * Checks whether the current user has been granted privileges
+	 * to update the properties of the specified principal.
+	 *  
+	 * @param session the JCR session for the current user
+	 * @param principalID the id of the principal to check
+	 * @return true if the current user has the privileges, false otherwise
+	 */
+	public boolean canUpdateAuthorizable(Session session, String principalID) {
+		try {
+			PrincipalManager principalManager = AccessControlUtil.getPrincipalManager(session);
+			Principal principal = principalManager.getPrincipal(principalID);
+			if (principal == null) {
+				return false;
+			}
+
+			String path = getAuthorizableItemPath(principal);
+			return canModifyProperties(session, path);
+		} catch (Exception e) {
+			//just eat it.
+			return false;
+		}
+	}
+	private String getAuthorizableItemPath(Principal principal)
+			throws NoSuchMethodException, IllegalAccessException,
+			InvocationTargetException {
+		//should check if principal implements ItemBasedPrincipal, but it is not visible here so use reflection instead
+		Method method = principal.getClass().getMethod("getPath");
+		String path = (String)method.invoke(principal);
+		return path;
+	}
+	
+	/**
+	 * Checks whether the current user has been granted privileges
+	 * to delete the specified principal.
+	 *  
+	 * @param session the JCR session for the current user
+	 * @param principalID the id of the principal to check
+	 * @return true if the current user has the privileges, false otherwise
+	 */
+	public boolean canDeleteAuthorizable(Session session, String principalID) {
+		try {
+			PrincipalManager principalManager = AccessControlUtil.getPrincipalManager(session);
+			Principal principal = principalManager.getPrincipal(principalID);
+			if (principal == null) {
+				return false;
+			}
+			
+			//should check if principal implements ItemBasedPrincipal, but it is not visible here so use reflection instead
+			String path = getAuthorizableItemPath(principal);
+			return canDelete(session, path);
+		} catch (Exception e) {
+			//just eat it.
+			return false;
+		}
+	}
+}
diff --git a/src/main/java/org/apache/sling/jcr/jackrabbit/accessmanager/post/AbstractAccessPostServlet.java b/src/main/java/org/apache/sling/jcr/jackrabbit/accessmanager/post/AbstractAccessPostServlet.java
new file mode 100644
index 0000000..1d73c6a
--- /dev/null
+++ b/src/main/java/org/apache/sling/jcr/jackrabbit/accessmanager/post/AbstractAccessPostServlet.java
@@ -0,0 +1,254 @@
+/*
+ * Licensed to the Apache Software Foundation (ASF) under one or more
+ * contributor license agreements.  See the NOTICE file distributed with
+ * this work for additional information regarding copyright ownership.
+ * The ASF licenses this file to You under the Apache License, Version 2.0
+ * (the "License"); you may not use this file except in compliance with
+ * the License.  You may obtain a copy of the License at
+ *
+ *      http://www.apache.org/licenses/LICENSE-2.0
+ *
+ * Unless required by applicable law or agreed to in writing, software
+ * distributed under the License is distributed on an "AS IS" BASIS,
+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+ * See the License for the specific language governing permissions and
+ * limitations under the License.
+ */
+package org.apache.sling.jcr.jackrabbit.accessmanager.post;
+
+import java.io.IOException;
+import java.util.ArrayList;
+import java.util.List;
+
+import javax.jcr.RepositoryException;
+import javax.jcr.Session;
+import javax.servlet.ServletException;
+import javax.servlet.http.HttpServletRequest;
+import javax.servlet.http.HttpServletResponse;
+
+import org.apache.sling.api.SlingHttpServletRequest;
+import org.apache.sling.api.SlingHttpServletResponse;
+import org.apache.sling.api.resource.ResourceNotFoundException;
+import org.apache.sling.api.resource.ResourceUtil;
+import org.apache.sling.api.servlets.HtmlResponse;
+import org.apache.sling.api.servlets.SlingAllMethodsServlet;
+import org.apache.sling.api.wrappers.SlingRequestPaths;
+import org.apache.sling.servlets.post.Modification;
+import org.apache.sling.servlets.post.SlingPostConstants;
+import org.slf4j.Logger;
+import org.slf4j.LoggerFactory;
+
+/**
+ * Base class for all the POST servlets for the AccessManager operations 
+ */
+public abstract class AbstractAccessPostServlet extends SlingAllMethodsServlet {
+	private static final long serialVersionUID = -5918670409789895333L;
+
+	/**
+     * default log
+     */
+    private final Logger log = LoggerFactory.getLogger(getClass());
+    
+	/* (non-Javadoc)
+	 * @see org.apache.sling.api.servlets.SlingAllMethodsServlet#doPost(org.apache.sling.api.SlingHttpServletRequest, org.apache.sling.api.SlingHttpServletResponse)
+	 */
+	@Override
+	protected void doPost(SlingHttpServletRequest request,
+			SlingHttpServletResponse httpResponse) throws ServletException,
+			IOException {
+        // prepare the response
+        HtmlResponse htmlResponse = new HtmlResponse();
+        htmlResponse.setReferer(request.getHeader("referer"));
+
+        // calculate the paths
+        String path = getItemPath(request);
+        htmlResponse.setPath(path);
+
+        // location
+        htmlResponse.setLocation(externalizePath(request, path));
+
+        // parent location
+        path = ResourceUtil.getParent(path);
+        if (path != null) {
+        	htmlResponse.setParentLocation(externalizePath(request, path));
+        }
+
+        Session session = request.getResourceResolver().adaptTo(Session.class);
+
+        final List<Modification> changes = new ArrayList<Modification>();
+        
+        try {
+            handleOperation(request, htmlResponse, changes);
+            
+            //TODO: maybe handle SlingAuthorizablePostProcessor handlers here
+            
+            // set changes on html response
+            for(Modification change : changes) {
+                switch ( change.getType() ) {
+                    case MODIFY : htmlResponse.onModified(change.getSource()); break;
+                    case DELETE : htmlResponse.onDeleted(change.getSource()); break;
+                    case MOVE :   htmlResponse.onMoved(change.getSource(), change.getDestination()); break;
+                    case COPY :   htmlResponse.onCopied(change.getSource(), change.getDestination()); break;
+                    case CREATE : htmlResponse.onCreated(change.getSource()); break;
+                    case ORDER : htmlResponse.onChange("ordered", change.getSource(), change.getDestination()); break;
+                }
+            }
+            
+            if (session.hasPendingChanges()) {
+                session.save();
+            }
+        } catch (ResourceNotFoundException rnfe) {
+            htmlResponse.setStatus(HttpServletResponse.SC_NOT_FOUND,
+                rnfe.getMessage());
+        } catch (Throwable throwable) {
+            log.debug("Exception while handling POST "
+                + request.getResource().getPath() + " with "
+                + getClass().getName(), throwable);
+            htmlResponse.setError(throwable);
+        } finally {
+            try {
+                if (session.hasPendingChanges()) {
+                    session.refresh(false);
+                }
+            } catch (RepositoryException e) {
+                log.warn("RepositoryException in finally block: {}",
+                    e.getMessage(), e);
+            }
+        }
+        
+        // check for redirect URL if processing succeeded
+        if (htmlResponse.isSuccessful()) {
+            String redirect = getRedirectUrl(request, htmlResponse);
+            if (redirect != null) {
+                httpResponse.sendRedirect(redirect);
+                return;
+            }
+        }
+
+        // create a html response and send if unsuccessful or no redirect
+        htmlResponse.send(httpResponse, isSetStatus(request));
+	}
+
+	/**
+	 * Extending Servlet should implement this operation to do the work
+	 * 
+	 * @param request the sling http request to process
+	 * @param htmlResponse the response 
+	 * @param changes 
+	 */
+	abstract protected void handleOperation(SlingHttpServletRequest request,
+			HtmlResponse htmlResponse, List<Modification> changes) throws RepositoryException;
+	
+	
+    /**
+     * compute redirect URL (SLING-126)
+     *
+     * @param ctx the post processor
+     * @return the redirect location or <code>null</code>
+     */
+    protected String getRedirectUrl(HttpServletRequest request, HtmlResponse ctx) {
+        // redirect param has priority (but see below, magic star)
+        String result = request.getParameter(SlingPostConstants.RP_REDIRECT_TO);
+        if (result != null && ctx.getPath() != null) {
+
+            // redirect to created/modified Resource
+            int star = result.indexOf('*');
+            if (star >= 0) {
+                StringBuffer buf = new StringBuffer();
+
+                // anything before the star
+                if (star > 0) {
+                    buf.append(result.substring(0, star));
+                }
+
+                // append the name of the manipulated node
+                buf.append(ResourceUtil.getName(ctx.getPath()));
+
+                // anything after the star
+                if (star < result.length() - 1) {
+                    buf.append(result.substring(star + 1));
+                }
+
+                // use the created path as the redirect result
+                result = buf.toString();
+
+            } else if (result.endsWith(SlingPostConstants.DEFAULT_CREATE_SUFFIX)) {
+                // if the redirect has a trailing slash, append modified node
+                // name
+                result = result.concat(ResourceUtil.getName(ctx.getPath()));
+            }
+
+            if (log.isDebugEnabled()) {
+                log.debug("Will redirect to " + result);
+            }
+        }
+        return result;
+    }
+
+    protected boolean isSetStatus(SlingHttpServletRequest request) {
+        String statusParam = request.getParameter(SlingPostConstants.RP_STATUS);
+        if (statusParam == null) {
+            log.debug(
+                "getStatusMode: Parameter {} not set, assuming standard status code",
+                SlingPostConstants.RP_STATUS);
+            return true;
+        }
+
+        if (SlingPostConstants.STATUS_VALUE_BROWSER.equals(statusParam)) {
+            log.debug(
+                "getStatusMode: Parameter {} asks for user-friendly status code",
+                SlingPostConstants.RP_STATUS);
+            return false;
+        }
+
+        if (SlingPostConstants.STATUS_VALUE_STANDARD.equals(statusParam)) {
+            log.debug(
+                "getStatusMode: Parameter {} asks for standard status code",
+                SlingPostConstants.RP_STATUS);
+            return true;
+        }
+
+        log.debug(
+            "getStatusMode: Parameter {} set to unknown value {}, assuming standard status code",
+            SlingPostConstants.RP_STATUS);
+        return true;
+    }
+	
+	// ------ These methods were copied from AbstractSlingPostOperation ------
+
+    /**
+     * Returns the path of the resource of the request as the item path.
+     * <p>
+     * This method may be overwritten by extension if the operation has
+     * different requirements on path processing.
+     */
+    protected String getItemPath(SlingHttpServletRequest request) {
+        return request.getResource().getPath();
+    }
+
+    /**
+     * Returns an external form of the given path prepending the context path
+     * and appending a display extension.
+     *
+     * @param path the path to externalize
+     * @return the url
+     */
+    protected final String externalizePath(SlingHttpServletRequest request,
+            String path) {
+        StringBuffer ret = new StringBuffer();
+        ret.append(SlingRequestPaths.getContextPath(request));
+        ret.append(request.getResourceResolver().map(path));
+
+        // append optional extension
+        String ext = request.getParameter(SlingPostConstants.RP_DISPLAY_EXTENSION);
+        if (ext != null && ext.length() > 0) {
+            if (ext.charAt(0) != '.') {
+                ret.append('.');
+            }
+            ret.append(ext);
+        }
+
+        return ret.toString();
+    }
+    
+}
diff --git a/src/main/java/org/apache/sling/jcr/jackrabbit/accessmanager/post/DeleteAcesServlet.java b/src/main/java/org/apache/sling/jcr/jackrabbit/accessmanager/post/DeleteAcesServlet.java
new file mode 100644
index 0000000..3c5b28d
--- /dev/null
+++ b/src/main/java/org/apache/sling/jcr/jackrabbit/accessmanager/post/DeleteAcesServlet.java
@@ -0,0 +1,128 @@
+/*
+ * Licensed to the Apache Software Foundation (ASF) under one or more
+ * contributor license agreements.  See the NOTICE file distributed with
+ * this work for additional information regarding copyright ownership.
+ * The ASF licenses this file to You under the Apache License, Version 2.0
+ * (the "License"); you may not use this file except in compliance with
+ * the License.  You may obtain a copy of the License at
+ *
+ *      http://www.apache.org/licenses/LICENSE-2.0
+ *
+ * Unless required by applicable law or agreed to in writing, software
+ * distributed under the License is distributed on an "AS IS" BASIS,
+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+ * See the License for the specific language governing permissions and
+ * limitations under the License.
+ */
+package org.apache.sling.jcr.jackrabbit.accessmanager.post;
+
+import java.util.ArrayList;
+import java.util.Arrays;
+import java.util.HashSet;
+import java.util.List;
+import java.util.Set;
+
+import javax.jcr.Item;
+import javax.jcr.RepositoryException;
+import javax.jcr.Session;
+
+import org.apache.jackrabbit.api.jsr283.security.AccessControlEntry;
+import org.apache.jackrabbit.api.jsr283.security.AccessControlList;
+import org.apache.jackrabbit.api.jsr283.security.AccessControlManager;
+import org.apache.jackrabbit.api.jsr283.security.AccessControlPolicy;
+import org.apache.jackrabbit.api.jsr283.security.AccessControlPolicyIterator;
+import org.apache.sling.api.SlingHttpServletRequest;
+import org.apache.sling.api.resource.Resource;
+import org.apache.sling.api.resource.ResourceNotFoundException;
+import org.apache.sling.api.servlets.HtmlResponse;
+import org.apache.sling.jcr.base.util.AccessControlUtil;
+import org.apache.sling.servlets.post.Modification;
+import org.apache.sling.servlets.post.SlingPostConstants;
+
+/**
+ * Sling Post Servlet implementation for deleting the ACE for a set of principals on
+ * a JCR resource.
+ * 
+ * @scr.component immediate="true" 
+ * @scr.service interface="javax.servlet.Servlet"
+ * @scr.property name="sling.servlet.resourceTypes" value="sling/servlet/default"
+ * @scr.property name="sling.servlet.methods" value="POST" 
+ * @scr.property name="sling.servlet.selectors" value="deleteAce" 
+ */
+public class DeleteAcesServlet extends AbstractAccessPostServlet {
+	private static final long serialVersionUID = 3784866802938282971L;
+
+	/* (non-Javadoc)
+	 * @see org.apache.sling.jackrabbit.accessmanager.post.AbstractAccessPostServlet#handleOperation(org.apache.sling.api.SlingHttpServletRequest, org.apache.sling.api.servlets.HtmlResponse, java.util.List)
+	 */
+	@Override
+	protected void handleOperation(SlingHttpServletRequest request,
+			HtmlResponse htmlResponse, List<Modification> changes)
+			throws RepositoryException {
+		
+        String[] applyTo = request.getParameterValues(SlingPostConstants.RP_APPLY_TO);
+        if (applyTo == null) {
+			throw new RepositoryException("principalIds were not sumitted.");
+        } else {
+        	String resourcePath = null;
+        	Resource resource = request.getResource();
+        	if (resource == null) {
+    			throw new ResourceNotFoundException("Resource not found.");
+        	} else {
+        		Item item = resource.adaptTo(Item.class);
+        		if (item != null) {
+        			resourcePath = item.getPath();
+        		} else {
+        			throw new ResourceNotFoundException("Resource is not a JCR Node");
+        		}
+        	}
+        	
+    		Session session = request.getResourceResolver().adaptTo(Session.class);
+    		if (session == null) {
+    			throw new RepositoryException("JCR Session not found");
+    		}
+        	
+    		//load the principalIds array into a set for quick lookup below
+			Set<String> pidSet = new HashSet<String>();
+			pidSet.addAll(Arrays.asList(applyTo));
+			
+			try {
+				AccessControlManager accessControlManager = AccessControlUtil.getAccessControlManager(session);
+				AccessControlList updatedAcl = null;
+				AccessControlPolicyIterator applicablePolicies = accessControlManager.getApplicablePolicies(resourcePath);
+				while (applicablePolicies.hasNext()) {
+					AccessControlPolicy policy = applicablePolicies.nextAccessControlPolicy();
+					if (policy instanceof AccessControlList) {
+						updatedAcl = (AccessControlList)policy;
+						break;
+					}
+				}
+				if (updatedAcl == null) {
+					throw new RepositoryException("Unable to find an access control policy to update.");
+				}
+				
+				//keep track of the existing Aces for the target principal
+				AccessControlEntry[] accessControlEntries = updatedAcl.getAccessControlEntries();
+				List<AccessControlEntry> oldAces = new ArrayList<AccessControlEntry>();
+				for (AccessControlEntry ace : accessControlEntries) {
+					if (pidSet.contains(ace.getPrincipal().getName())) {
+						oldAces.add(ace);
+					}
+				}
+
+				//remove the old aces
+				if (!oldAces.isEmpty()) {
+					for (AccessControlEntry ace : oldAces) {
+						updatedAcl.removeAccessControlEntry(ace);
+					}
+				}
+				
+				//apply the changed policy
+				accessControlManager.setPolicy(resourcePath, updatedAcl);
+			} catch (RepositoryException re) {
+				throw new RepositoryException("Failed to delete access control.", re);
+			}
+        }
+	}
+
+}
diff --git a/src/main/java/org/apache/sling/jcr/jackrabbit/accessmanager/post/GetAclServlet.java b/src/main/java/org/apache/sling/jcr/jackrabbit/accessmanager/post/GetAclServlet.java
new file mode 100644
index 0000000..586ec57
--- /dev/null
+++ b/src/main/java/org/apache/sling/jcr/jackrabbit/accessmanager/post/GetAclServlet.java
@@ -0,0 +1,180 @@
+/*
+ * Licensed to the Apache Software Foundation (ASF) under one or more
+ * contributor license agreements.  See the NOTICE file distributed with
+ * this work for additional information regarding copyright ownership.
+ * The ASF licenses this file to You under the Apache License, Version 2.0
+ * (the "License"); you may not use this file except in compliance with
+ * the License.  You may obtain a copy of the License at
+ *
+ *      http://www.apache.org/licenses/LICENSE-2.0
+ *
+ * Unless required by applicable law or agreed to in writing, software
+ * distributed under the License is distributed on an "AS IS" BASIS,
+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+ * See the License for the specific language governing permissions and
+ * limitations under the License.
+ */
+package org.apache.sling.jcr.jackrabbit.accessmanager.post;
+
+import java.io.IOException;
+import java.security.Principal;
+import java.util.LinkedHashMap;
+import java.util.LinkedHashSet;
+import java.util.Map;
+import java.util.Set;
+import java.util.Map.Entry;
+
+import javax.jcr.AccessDeniedException;
+import javax.jcr.Item;
+import javax.jcr.RepositoryException;
+import javax.jcr.Session;
+import javax.servlet.ServletException;
+import javax.servlet.http.HttpServletResponse;
+
+import org.apache.jackrabbit.api.jsr283.security.AccessControlEntry;
+import org.apache.jackrabbit.api.jsr283.security.AccessControlList;
+import org.apache.jackrabbit.api.jsr283.security.AccessControlManager;
+import org.apache.jackrabbit.api.jsr283.security.AccessControlPolicy;
+import org.apache.jackrabbit.api.jsr283.security.Privilege;
+import org.apache.sling.api.SlingHttpServletRequest;
+import org.apache.sling.api.SlingHttpServletResponse;
+import org.apache.sling.api.resource.Resource;
+import org.apache.sling.api.resource.ResourceNotFoundException;
+import org.apache.sling.api.servlets.SlingAllMethodsServlet;
+import org.apache.sling.commons.json.JSONObject;
+import org.apache.sling.jcr.base.util.AccessControlUtil;
+import org.slf4j.Logger;
+import org.slf4j.LoggerFactory;
+
+/**
+ * Sling GET servlet implementation for dumping the declared ACL of a resource
+ * to JSON.
+ * 
+ * @scr.component immediate="true" 
+ * @scr.service interface="javax.servlet.Servlet"
+ * @scr.property name="sling.servlet.resourceTypes" value="sling/servlet/default"
+ * @scr.property name="sling.servlet.methods" value="GET" 
+ * @scr.property name="sling.servlet.selectors" value="acl" 
+ * @scr.property name="sling.servlet.extensions " value="json" 
+ */
+public class GetAclServlet extends SlingAllMethodsServlet {
+	private static final long serialVersionUID = 3391376559396223184L;
+
+	/**
+     * default log
+     */
+    private final Logger log = LoggerFactory.getLogger(getClass());
+
+	/* (non-Javadoc)
+	 * @see org.apache.sling.api.servlets.SlingSafeMethodsServlet#doGet(org.apache.sling.api.SlingHttpServletRequest, org.apache.sling.api.SlingHttpServletResponse)
+	 */
+	@Override
+	protected void doGet(SlingHttpServletRequest request,
+			SlingHttpServletResponse response) throws ServletException,
+			IOException {
+		
+        try {
+    		Session session = request.getResourceResolver().adaptTo(Session.class);
+    		if (session == null) {
+    			throw new RepositoryException("JCR Session not found");
+    		}
+    		
+        	String resourcePath = null;
+        	Resource resource = request.getResource();
+        	if (resource == null) {
+    			throw new ResourceNotFoundException("Resource not found.");
+        	} else {
+        		Item item = resource.adaptTo(Item.class);
+        		if (item != null) {
+        			resourcePath = item.getPath();
+        		} else {
+        			throw new ResourceNotFoundException("Resource is not a JCR Node");
+        		}
+        	}
+
+        	AccessControlEntry[] declaredAccessControlEntries = getDeclaredAccessControlEntries(session, resourcePath);
+        	Map<String, Map<String, Set<String>>> aclMap = new LinkedHashMap<String, Map<String,Set<String>>>();
+        	for (AccessControlEntry ace : declaredAccessControlEntries) {
+    			Principal principal = ace.getPrincipal();
+    			Map<String, Set<String>> map = aclMap.get(principal.getName());
+    			if (map == null) {
+    				map = new LinkedHashMap<String, Set<String>>();
+    				aclMap.put(principal.getName(), map);
+    			}
+
+    			boolean allow = AccessControlUtil.isAllow(ace);
+    			if (allow) {
+    				Set<String> grantedSet = map.get("granted");
+    				if (grantedSet == null) {
+    					grantedSet = new LinkedHashSet<String>();
+    					map.put("granted", grantedSet);
+    				}
+    				Privilege[] privileges = ace.getPrivileges();
+    				for (Privilege privilege : privileges) {
+    					grantedSet.add(privilege.getName());
+    				}
+    			} else {
+    				Set<String> deniedSet = map.get("denied");
+    				if (deniedSet == null) {
+    					deniedSet = new LinkedHashSet<String>();
+    					map.put("denied", deniedSet);
+    				}
+    				Privilege[] privileges = ace.getPrivileges();
+    				for (Privilege privilege : privileges) {
+    					deniedSet.add(privilege.getName());
+    				}
+    			}
+    		}
+        	
+
+        	response.setContentType("application/json");
+        	response.setCharacterEncoding("UTF-8");
+
+        	JSONObject jsonObj = new JSONObject();
+        	Set<Entry<String, Map<String, Set<String>>>> entrySet = aclMap.entrySet();
+        	for (Entry<String, Map<String, Set<String>>> entry : entrySet) {
+        		String principalName = entry.getKey();
+        		Map<String, Set<String>> value = entry.getValue();
+        		
+        		JSONObject aceObject = new JSONObject();
+        		Set<String> grantedSet = value.get("granted");
+        		if (grantedSet != null) {
+            		aceObject.put("granted", grantedSet);
+        		}
+        		
+        		Set<String> deniedSet = value.get("denied");
+        		if (deniedSet != null) {
+        			aceObject.put("denied", deniedSet);
+        		}
+
+        		jsonObj.put(principalName, aceObject);
+			}
+        	
+
+            // do the dump
+        	jsonObj.write(response.getWriter());
+        } catch (AccessDeniedException ade) {
+        	response.sendError(HttpServletResponse.SC_NOT_FOUND);
+        } catch (ResourceNotFoundException rnfe) {
+        	response.sendError(HttpServletResponse.SC_NOT_FOUND, rnfe.getMessage());
+        } catch (Throwable throwable) {
+            log.debug("Exception while handling GET "
+                + request.getResource().getPath() + " with "
+                + getClass().getName(), throwable);
+            throw new ServletException(throwable);
+        }
+	}
+
+	private AccessControlEntry[] getDeclaredAccessControlEntries(Session session, String absPath) throws RepositoryException {
+		AccessControlManager accessControlManager = AccessControlUtil.getAccessControlManager(session);
+		AccessControlPolicy[] policies = accessControlManager.getPolicies(absPath);
+		for (AccessControlPolicy accessControlPolicy : policies) {
+			if (accessControlPolicy instanceof AccessControlList) {
+				AccessControlEntry[] accessControlEntries = ((AccessControlList)accessControlPolicy).getAccessControlEntries();
+				return accessControlEntries;
+			}
+		}
+		return new AccessControlEntry[0];
+	}
+	
+}
diff --git a/src/main/java/org/apache/sling/jcr/jackrabbit/accessmanager/post/ModifyAceServlet.java b/src/main/java/org/apache/sling/jcr/jackrabbit/accessmanager/post/ModifyAceServlet.java
new file mode 100644
index 0000000..b6ed930
--- /dev/null
+++ b/src/main/java/org/apache/sling/jcr/jackrabbit/accessmanager/post/ModifyAceServlet.java
@@ -0,0 +1,241 @@
+/*
+ * Licensed to the Apache Software Foundation (ASF) under one or more
+ * contributor license agreements.  See the NOTICE file distributed with
+ * this work for additional information regarding copyright ownership.
+ * The ASF licenses this file to You under the Apache License, Version 2.0
+ * (the "License"); you may not use this file except in compliance with
+ * the License.  You may obtain a copy of the License at
+ *
+ *      http://www.apache.org/licenses/LICENSE-2.0
+ *
+ * Unless required by applicable law or agreed to in writing, software
+ * distributed under the License is distributed on an "AS IS" BASIS,
+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+ * See the License for the specific language governing permissions and
+ * limitations under the License.
+ */
+package org.apache.sling.jcr.jackrabbit.accessmanager.post;
+
+import java.security.Principal;
+import java.util.ArrayList;
+import java.util.Enumeration;
+import java.util.List;
+
+import javax.jcr.Item;
+import javax.jcr.RepositoryException;
+import javax.jcr.Session;
+
+import org.apache.jackrabbit.api.jsr283.security.AccessControlEntry;
+import org.apache.jackrabbit.api.jsr283.security.AccessControlList;
+import org.apache.jackrabbit.api.jsr283.security.AccessControlManager;
+import org.apache.jackrabbit.api.jsr283.security.AccessControlPolicy;
+import org.apache.jackrabbit.api.jsr283.security.AccessControlPolicyIterator;
+import org.apache.jackrabbit.api.jsr283.security.Privilege;
+import org.apache.jackrabbit.api.security.user.Authorizable;
+import org.apache.jackrabbit.api.security.user.UserManager;
+import org.apache.sling.api.SlingHttpServletRequest;
+import org.apache.sling.api.resource.Resource;
+import org.apache.sling.api.resource.ResourceNotFoundException;
+import org.apache.sling.api.servlets.HtmlResponse;
+import org.apache.sling.jcr.base.util.AccessControlUtil;
+import org.apache.sling.servlets.post.Modification;
+import org.slf4j.Logger;
+import org.slf4j.LoggerFactory;
+
+/**
+ * Sling Post Servlet implementation for modifying the ACE for a principal on
+ * a JCR resource.
+ * 
+ * @scr.component immediate="true" 
+ * @scr.service interface="javax.servlet.Servlet"
+ * @scr.property name="sling.servlet.resourceTypes" value="sling/servlet/default"
+ * @scr.property name="sling.servlet.methods" value="POST" 
+ * @scr.property name="sling.servlet.selectors" value="modifyAce" 
+ */
+public class ModifyAceServlet extends AbstractAccessPostServlet {
+	private static final long serialVersionUID = -9182485466670280437L;
+
+	/**
+     * default log
+     */
+    private final Logger log = LoggerFactory.getLogger(getClass());
+
+	/* (non-Javadoc)
+	 * @see org.apache.sling.jackrabbit.accessmanager.post.AbstractAccessPostServlet#handleOperation(org.apache.sling.api.SlingHttpServletRequest, org.apache.sling.api.servlets.HtmlResponse, java.util.List)
+	 */
+	@SuppressWarnings("unchecked")
+	@Override
+	protected void handleOperation(SlingHttpServletRequest request,
+			HtmlResponse htmlResponse, List<Modification> changes)
+			throws RepositoryException {
+		Session session = request.getResourceResolver().adaptTo(Session.class);
+		if (session == null) {
+			throw new RepositoryException("JCR Session not found");
+		}
+
+		String principalId = request.getParameter("principalId");
+		if (principalId == null) {
+			throw new RepositoryException("principalId was not submitted.");
+		}
+		UserManager userManager = AccessControlUtil.getUserManager(session);
+		Authorizable authorizable = userManager.getAuthorizable(principalId);
+		if (authorizable == null) {
+			throw new RepositoryException("No principal found for id: " + principalId);
+		}
+
+    	String resourcePath = null;
+    	Resource resource = request.getResource();
+    	if (resource == null) {
+			throw new ResourceNotFoundException("Resource not found.");
+    	} else {
+    		Item item = resource.adaptTo(Item.class);
+    		if (item != null) {
+    			resourcePath = item.getPath();
+    		} else {
+    			throw new ResourceNotFoundException("Resource is not a JCR Node");
+    		}
+    	}
+		
+		
+		List<String> grantedPrivilegeNames = new ArrayList<String>();
+		List<String> deniedPrivilegeNames = new ArrayList<String>();
+		Enumeration parameterNames = request.getParameterNames();
+		while (parameterNames.hasMoreElements()) {
+			Object nextElement = parameterNames.nextElement();
+			if (nextElement instanceof String) {
+				String paramName = (String)nextElement;
+				if (paramName.startsWith("privilege@")) {
+					String parameterValue = request.getParameter(paramName);
+					if (parameterValue != null && parameterValue.length() > 0) {
+						if ("granted".equals(parameterValue)) {
+							String privilegeName = paramName.substring(10);
+							grantedPrivilegeNames.add(privilegeName);
+						} else if ("denied".equals(parameterValue)) {
+							String privilegeName = paramName.substring(10);
+							deniedPrivilegeNames.add(privilegeName);
+						}
+					}
+				}
+			}
+		}
+
+		try {
+			AccessControlManager accessControlManager = AccessControlUtil.getAccessControlManager(session);
+			AccessControlList updatedAcl = null;
+			AccessControlPolicyIterator applicablePolicies = accessControlManager.getApplicablePolicies(resourcePath);
+			while (applicablePolicies.hasNext()) {
+				AccessControlPolicy policy = applicablePolicies.nextAccessControlPolicy();
+				if (policy instanceof AccessControlList) {
+					updatedAcl = (AccessControlList)policy;
+					break;
+				}
+			}
+			if (updatedAcl == null) {
+				throw new RepositoryException("Unable to find an access conrol policy to update.");
+			}
+
+			StringBuilder oldPrivileges = null;
+			StringBuilder newPrivileges = null;
+			if (log.isDebugEnabled()) {
+				oldPrivileges = new StringBuilder();
+				newPrivileges = new StringBuilder();
+			}
+
+			//keep track of the existing Aces for the target principal
+			AccessControlEntry[] accessControlEntries = updatedAcl.getAccessControlEntries();
+			List<AccessControlEntry> oldAces = new ArrayList<AccessControlEntry>();
+			for (AccessControlEntry ace : accessControlEntries) {
+				if (principalId.equals(ace.getPrincipal().getName())) {
+					if (log.isDebugEnabled()) {
+						log.debug("Found Existing ACE for principal {0} on resource: ", new Object[] {principalId, resourcePath});
+					}
+					oldAces.add(ace);
+					
+					if (log.isDebugEnabled()) {
+						//collect the information for debug logging
+						boolean isAllow = AccessControlUtil.isAllow(ace);
+						Privilege[] privileges = ace.getPrivileges();
+						for (Privilege privilege : privileges) {
+							if (oldPrivileges.length() > 0) {
+								oldPrivileges.append(", "); //separate entries by commas
+							}
+							if (isAllow) {
+								oldPrivileges.append("granted=");
+							} else {
+								oldPrivileges.append("denied=");
+							}
+							oldPrivileges.append(privilege.getName());
+						}
+					}
+				}
+			}
+
+			//remove the old aces
+			if (!oldAces.isEmpty()) {
+				for (AccessControlEntry ace : oldAces) {
+					updatedAcl.removeAccessControlEntry(ace);
+				}
+			}
+			
+			//add a fresh ACE with the granted privileges
+			List<Privilege> grantedPrivilegeList = new ArrayList<Privilege>();
+			for (String name : grantedPrivilegeNames) {
+				if (name.length() == 0) {
+					continue; //empty, skip it.
+				}
+				Privilege privilege = accessControlManager.privilegeFromName(name);
+				grantedPrivilegeList.add(privilege);
+					
+				if (log.isDebugEnabled()) {
+					if (newPrivileges.length() > 0) {
+						newPrivileges.append(", "); //separate entries by commas
+					}
+					newPrivileges.append("granted=");
+					newPrivileges.append(privilege.getName());
+				}
+			}
+			if (grantedPrivilegeList.size() > 0) {
+				Principal principal = authorizable.getPrincipal();
+				updatedAcl.addAccessControlEntry(principal, grantedPrivilegeList.toArray(new Privilege[grantedPrivilegeList.size()]));
+			}
+
+			//if the authorizable is a user (not a group) process any denied privileges
+			if (!authorizable.isGroup()) {
+				//add a fresh ACE with the denied privileges
+				List<Privilege> deniedPrivilegeList = new ArrayList<Privilege>();
+				for (String name : deniedPrivilegeNames) {
+					if (name.length() == 0) {
+						continue; //empty, skip it.
+					}
+					Privilege privilege = accessControlManager.privilegeFromName(name);
+					deniedPrivilegeList.add(privilege);
+
+					if (log.isDebugEnabled()) {
+						if (newPrivileges.length() > 0) {
+							newPrivileges.append(", "); //separate entries by commas
+						}
+						newPrivileges.append("denied=");
+						newPrivileges.append(privilege.getName());
+					}
+				}
+				if (deniedPrivilegeList.size() > 0) {
+					Principal principal = authorizable.getPrincipal();
+					AccessControlUtil.addEntry(updatedAcl, principal, deniedPrivilegeList.toArray(new Privilege[deniedPrivilegeList.size()]), false);
+				}
+			}
+
+			accessControlManager.setPolicy(resourcePath, updatedAcl);
+			if (session.hasPendingChanges()) {
+				session.save();
+			}
+
+			if (log.isDebugEnabled()) {
+				log.debug("Updated ACE for principalId {0} for resource {1) from {2} to {3}", new Object [] {
+						authorizable.getID(), resourcePath, oldPrivileges.toString(), newPrivileges.toString()
+				});
+			}
+		} catch (RepositoryException re) {
+			throw new RepositoryException("Failed to create ace.", re);
+		}
+	}
+}
diff --git a/src/main/resources/META-INF/DISCLAIMER b/src/main/resources/META-INF/DISCLAIMER
new file mode 100644
index 0000000..90850c2
--- /dev/null
+++ b/src/main/resources/META-INF/DISCLAIMER
@@ -0,0 +1,7 @@
+Apache Sling is an effort undergoing incubation at The Apache Software Foundation (ASF),
+sponsored by the Apache Jackrabbit PMC. Incubation is required of all newly accepted
+projects until a further review indicates that the infrastructure, communications,
+and decision making process have stabilized in a manner consistent with other
+successful ASF projects. While incubation status is not necessarily a reflection of
+the completeness or stability of the code, it does indicate that the project has yet
+to be fully endorsed by the ASF.
\ No newline at end of file
diff --git a/src/main/resources/META-INF/LICENSE b/src/main/resources/META-INF/LICENSE
new file mode 100644
index 0000000..d645695
--- /dev/null
+++ b/src/main/resources/META-INF/LICENSE
@@ -0,0 +1,202 @@
+
+                                 Apache License
+                           Version 2.0, January 2004
+                        http://www.apache.org/licenses/
+
+   TERMS AND CONDITIONS FOR USE, REPRODUCTION, AND DISTRIBUTION
+
+   1. Definitions.
+
+      "License" shall mean the terms and conditions for use, reproduction,
+      and distribution as defined by Sections 1 through 9 of this document.
+
+      "Licensor" shall mean the copyright owner or entity authorized by
+      the copyright owner that is granting the License.
+
+      "Legal Entity" shall mean the union of the acting entity and all
+      other entities that control, are controlled by, or are under common
+      control with that entity. For the purposes of this definition,
+      "control" means (i) the power, direct or indirect, to cause the
+      direction or management of such entity, whether by contract or
+      otherwise, or (ii) ownership of fifty percent (50%) or more of the
+      outstanding shares, or (iii) beneficial ownership of such entity.
+
+      "You" (or "Your") shall mean an individual or Legal Entity
+      exercising permissions granted by this License.
+
+      "Source" form shall mean the preferred form for making modifications,
+      including but not limited to software source code, documentation
+      source, and configuration files.
+
+      "Object" form shall mean any form resulting from mechanical
+      transformation or translation of a Source form, including but
+      not limited to compiled object code, generated documentation,
+      and conversions to other media types.
+
+      "Work" shall mean the work of authorship, whether in Source or
+      Object form, made available under the License, as indicated by a
+      copyright notice that is included in or attached to the work
+      (an example is provided in the Appendix below).
+
+      "Derivative Works" shall mean any work, whether in Source or Object
+      form, that is based on (or derived from) the Work and for which the
+      editorial revisions, annotations, elaborations, or other modifications
+      represent, as a whole, an original work of authorship. For the purposes
+      of this License, Derivative Works shall not include works that remain
+      separable from, or merely link (or bind by name) to the interfaces of,
+      the Work and Derivative Works thereof.
+
+      "Contribution" shall mean any work of authorship, including
+      the original version of the Work and any modifications or additions
+      to that Work or Derivative Works thereof, that is intentionally
+      submitted to Licensor for inclusion in the Work by the copyright owner
+      or by an individual or Legal Entity authorized to submit on behalf of
+      the copyright owner. For the purposes of this definition, "submitted"
+      means any form of electronic, verbal, or written communication sent
+      to the Licensor or its representatives, including but not limited to
+      communication on electronic mailing lists, source code control systems,
+      and issue tracking systems that are managed by, or on behalf of, the
+      Licensor for the purpose of discussing and improving the Work, but
+      excluding communication that is conspicuously marked or otherwise
+      designated in writing by the copyright owner as "Not a Contribution."
+
+      "Contributor" shall mean Licensor and any individual or Legal Entity
+      on behalf of whom a Contribution has been received by Licensor and
+      subsequently incorporated within the Work.
+
+   2. Grant of Copyright License. Subject to the terms and conditions of
+      this License, each Contributor hereby grants to You a perpetual,
+      worldwide, non-exclusive, no-charge, royalty-free, irrevocable
+      copyright license to reproduce, prepare Derivative Works of,
+      publicly display, publicly perform, sublicense, and distribute the
+      Work and such Derivative Works in Source or Object form.
+
+   3. Grant of Patent License. Subject to the terms and conditions of
+      this License, each Contributor hereby grants to You a perpetual,
+      worldwide, non-exclusive, no-charge, royalty-free, irrevocable
+      (except as stated in this section) patent license to make, have made,
+      use, offer to sell, sell, import, and otherwise transfer the Work,
+      where such license applies only to those patent claims licensable
+      by such Contributor that are necessarily infringed by their
+      Contribution(s) alone or by combination of their Contribution(s)
+      with the Work to which such Contribution(s) was submitted. If You
+      institute patent litigation against any entity (including a
+      cross-claim or counterclaim in a lawsuit) alleging that the Work
+      or a Contribution incorporated within the Work constitutes direct
+      or contributory patent infringement, then any patent licenses
+      granted to You under this License for that Work shall terminate
+      as of the date such litigation is filed.
+
+   4. Redistribution. You may reproduce and distribute copies of the
+      Work or Derivative Works thereof in any medium, with or without
+      modifications, and in Source or Object form, provided that You
+      meet the following conditions:
+
+      (a) You must give any other recipients of the Work or
+          Derivative Works a copy of this License; and
+
+      (b) You must cause any modified files to carry prominent notices
+          stating that You changed the files; and
+
+      (c) You must retain, in the Source form of any Derivative Works
+          that You distribute, all copyright, patent, trademark, and
+          attribution notices from the Source form of the Work,
+          excluding those notices that do not pertain to any part of
+          the Derivative Works; and
+
+      (d) If the Work includes a "NOTICE" text file as part of its
+          distribution, then any Derivative Works that You distribute must
+          include a readable copy of the attribution notices contained
+          within such NOTICE file, excluding those notices that do not
+          pertain to any part of the Derivative Works, in at least one
+          of the following places: within a NOTICE text file distributed
+          as part of the Derivative Works; within the Source form or
+          documentation, if provided along with the Derivative Works; or,
+          within a display generated by the Derivative Works, if and
+          wherever such third-party notices normally appear. The contents
+          of the NOTICE file are for informational purposes only and
+          do not modify the License. You may add Your own attribution
+          notices within Derivative Works that You distribute, alongside
+          or as an addendum to the NOTICE text from the Work, provided
+          that such additional attribution notices cannot be construed
+          as modifying the License.
+
+      You may add Your own copyright statement to Your modifications and
+      may provide additional or different license terms and conditions
+      for use, reproduction, or distribution of Your modifications, or
+      for any such Derivative Works as a whole, provided Your use,
+      reproduction, and distribution of the Work otherwise complies with
+      the conditions stated in this License.
+
+   5. Submission of Contributions. Unless You explicitly state otherwise,
+      any Contribution intentionally submitted for inclusion in the Work
+      by You to the Licensor shall be under the terms and conditions of
+      this License, without any additional terms or conditions.
+      Notwithstanding the above, nothing herein shall supersede or modify
+      the terms of any separate license agreement you may have executed
+      with Licensor regarding such Contributions.
+
+   6. Trademarks. This License does not grant permission to use the trade
+      names, trademarks, service marks, or product names of the Licensor,
+      except as required for reasonable and customary use in describing the
+      origin of the Work and reproducing the content of the NOTICE file.
+
+   7. Disclaimer of Warranty. Unless required by applicable law or
+      agreed to in writing, Licensor provides the Work (and each
+      Contributor provides its Contributions) on an "AS IS" BASIS,
+      WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or
+      implied, including, without limitation, any warranties or conditions
+      of TITLE, NON-INFRINGEMENT, MERCHANTABILITY, or FITNESS FOR A
+      PARTICULAR PURPOSE. You are solely responsible for determining the
+      appropriateness of using or redistributing the Work and assume any
+      risks associated with Your exercise of permissions under this License.
+
+   8. Limitation of Liability. In no event and under no legal theory,
+      whether in tort (including negligence), contract, or otherwise,
+      unless required by applicable law (such as deliberate and grossly
+      negligent acts) or agreed to in writing, shall any Contributor be
+      liable to You for damages, including any direct, indirect, special,
+      incidental, or consequential damages of any character arising as a
+      result of this License or out of the use or inability to use the
+      Work (including but not limited to damages for loss of goodwill,
+      work stoppage, computer failure or malfunction, or any and all
+      other commercial damages or losses), even if such Contributor
+      has been advised of the possibility of such damages.
+
+   9. Accepting Warranty or Additional Liability. While redistributing
+      the Work or Derivative Works thereof, You may choose to offer,
+      and charge a fee for, acceptance of support, warranty, indemnity,
+      or other liability obligations and/or rights consistent with this
+      License. However, in accepting such obligations, You may act only
+      on Your own behalf and on Your sole responsibility, not on behalf
+      of any other Contributor, and only if You agree to indemnify,
+      defend, and hold each Contributor harmless for any liability
+      incurred by, or claims asserted against, such Contributor by reason
+      of your accepting any such warranty or additional liability.
+
+   END OF TERMS AND CONDITIONS
+
+   APPENDIX: How to apply the Apache License to your work.
+
+      To apply the Apache License to your work, attach the following
+      boilerplate notice, with the fields enclosed by brackets "[]"
+      replaced with your own identifying information. (Don't include
+      the brackets!)  The text should be enclosed in the appropriate
+      comment syntax for the file format. We also recommend that a
+      file or class name and description of purpose be included on the
+      same "printed page" as the copyright notice for easier
+      identification within third-party archives.
+
+   Copyright [yyyy] [name of copyright owner]
+
+   Licensed under the Apache License, Version 2.0 (the "License");
+   you may not use this file except in compliance with the License.
+   You may obtain a copy of the License at
+
+       http://www.apache.org/licenses/LICENSE-2.0
+
+   Unless required by applicable law or agreed to in writing, software
+   distributed under the License is distributed on an "AS IS" BASIS,
+   WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+   See the License for the specific language governing permissions and
+   limitations under the License.
diff --git a/src/main/resources/META-INF/NOTICE b/src/main/resources/META-INF/NOTICE
new file mode 100644
index 0000000..05117dd
--- /dev/null
+++ b/src/main/resources/META-INF/NOTICE
@@ -0,0 +1,8 @@
+Apache Sling Jackrabbit JSR-283 Access Control Manager Support
+Copyright 2008-2009 The Apache Software Foundation
+
+Apache Sling is based on source code originally developed 
+by Day Software (http://www.day.com/).
+
+This product includes software developed at
+The Apache Software Foundation (http://www.apache.org/).
diff --git a/src/main/resources/OSGI-INF/metatype/metatype.properties b/src/main/resources/OSGI-INF/metatype/metatype.properties
new file mode 100644
index 0000000..f9e0714
--- /dev/null
+++ b/src/main/resources/OSGI-INF/metatype/metatype.properties
@@ -0,0 +1,25 @@
+#
+#  Licensed to the Apache Software Foundation (ASF) under one
+#  or more contributor license agreements.  See the NOTICE file
+#  distributed with this work for additional information
+#  regarding copyright ownership.  The ASF licenses this file
+#  to you under the Apache License, Version 2.0 (the
+#  "License"); you may not use this file except in compliance
+#  with the License.  You may obtain a copy of the License at
+#
+#   http://www.apache.org/licenses/LICENSE-2.0
+#
+#  Unless required by applicable law or agreed to in writing,
+#  software distributed under the License is distributed on an
+#  "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY
+#  KIND, either express or implied.  See the License for the
+#  specific language governing permissions and limitations
+#  under the License.
+#
+
+
+#
+# This file contains localization strings for configuration labels and
+# descriptions as used in the metatype.xml descriptor generated by the
+# the Sling SCR plugin
+
diff --git a/src/main/resources/org/apache/sling/jcr/jackrabbit/accessmanager/PrivilegesResources.properties b/src/main/resources/org/apache/sling/jcr/jackrabbit/accessmanager/PrivilegesResources.properties
new file mode 100644
index 0000000..9c0112e
--- /dev/null
+++ b/src/main/resources/org/apache/sling/jcr/jackrabbit/accessmanager/PrivilegesResources.properties
@@ -0,0 +1,23 @@
+#
+#  Licensed to the Apache Software Foundation (ASF) under one
+#  or more contributor license agreements.  See the NOTICE file
+#  distributed with this work for additional information
+#  regarding copyright ownership.  The ASF licenses this file
+#  to you under the Apache License, Version 2.0 (the
+#  "License"); you may not use this file except in compliance
+#  with the License.  You may obtain a copy of the License at
+#
+#   http://www.apache.org/licenses/LICENSE-2.0
+#
+#  Unless required by applicable law or agreed to in writing,
+#  software distributed under the License is distributed on an
+#  "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY
+#  KIND, either express or implied.  See the License for the
+#  specific language governing permissions and limitations
+#  under the License.
+
+privilegeset.all=Full Control
+privilegeset.readonly=Read Only
+privilegeset.readwrite=Read/Write
+privilegeset.none=None
+privilegeset.custom=Custom
\ No newline at end of file

-- 
To stop receiving notification emails like this one, please contact
"commits@sling.apache.org" <co...@sling.apache.org>.

[sling-org-apache-sling-jcr-jackrabbit-accessmanager] 08/16: Use release parent pom

Posted by ro...@apache.org.
This is an automated email from the ASF dual-hosted git repository.

rombert pushed a commit to annotated tag org.apache.sling.jcr.jackrabbit.accessmanager-2.0.2-incubator
in repository https://gitbox.apache.org/repos/asf/sling-org-apache-sling-jcr-jackrabbit-accessmanager.git

commit ab5879258079b3c77cc29891bc7562b672d4ed86
Author: Carsten Ziegeler <cz...@apache.org>
AuthorDate: Tue May 5 15:06:21 2009 +0000

    Use release parent pom
    
    git-svn-id: https://svn.apache.org/repos/asf/incubator/sling/trunk/bundles/jcr/jackrabbit-accessmanager@771764 13f79535-47bb-0310-9956-ffa450edef68
---
 pom.xml | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/pom.xml b/pom.xml
index bd03049..8f0f8a5 100644
--- a/pom.xml
+++ b/pom.xml
@@ -6,7 +6,7 @@
 	<parent>
 		<groupId>org.apache.sling</groupId>
 		<artifactId>sling</artifactId>
-		<version>5-incubator-SNAPSHOT</version>
+		<version>5-incubator</version>
 		<relativePath>../../../parent/pom.xml</relativePath>
 	</parent>
 

-- 
To stop receiving notification emails like this one, please contact
"commits@sling.apache.org" <co...@sling.apache.org>.

[sling-org-apache-sling-jcr-jackrabbit-accessmanager] 02/16: SLING-879: New Bundle to provide actions for interacting with the jackrabbit AccessManager. Patch provided by Eric Norman. https://issues.apache.org/jira/browse/SLING-879

Posted by ro...@apache.org.
This is an automated email from the ASF dual-hosted git repository.

rombert pushed a commit to annotated tag org.apache.sling.jcr.jackrabbit.accessmanager-2.0.2-incubator
in repository https://gitbox.apache.org/repos/asf/sling-org-apache-sling-jcr-jackrabbit-accessmanager.git

commit 6e7aae9a064dc9670e7bfcbee74a1de4bdd35056
Author: Juan Vazquez <jv...@apache.org>
AuthorDate: Wed Mar 18 14:56:31 2009 +0000

    SLING-879: New Bundle to provide actions for interacting with the jackrabbit AccessManager. Patch provided by Eric Norman.
    https://issues.apache.org/jira/browse/SLING-879
    
    git-svn-id: https://svn.apache.org/repos/asf/incubator/sling/trunk/bundles/jcr/jackrabbit-accessmanager@755609 13f79535-47bb-0310-9956-ffa450edef68
---
 LICENSE                                            | 202 +++++++
 NOTICE                                             |   8 +
 README.txt                                         |  37 ++
 pom.xml                                            | 119 ++++
 .../jackrabbit/accessmanager/PrivilegesInfo.java   | 616 +++++++++++++++++++++
 .../post/AbstractAccessPostServlet.java            | 254 +++++++++
 .../accessmanager/post/DeleteAcesServlet.java      | 128 +++++
 .../accessmanager/post/GetAclServlet.java          | 180 ++++++
 .../accessmanager/post/ModifyAceServlet.java       | 241 ++++++++
 .../OSGI-INF/metatype/metatype.properties          |  25 +
 .../accessmanager/PrivilegesResources.properties   |  23 +
 11 files changed, 1833 insertions(+)

diff --git a/LICENSE b/LICENSE
new file mode 100644
index 0000000..75b5248
--- /dev/null
+++ b/LICENSE
@@ -0,0 +1,202 @@
+
+                                 Apache License
+                           Version 2.0, January 2004
+                        http://www.apache.org/licenses/
+
+   TERMS AND CONDITIONS FOR USE, REPRODUCTION, AND DISTRIBUTION
+
+   1. Definitions.
+
+      "License" shall mean the terms and conditions for use, reproduction,
+      and distribution as defined by Sections 1 through 9 of this document.
+
+      "Licensor" shall mean the copyright owner or entity authorized by
+      the copyright owner that is granting the License.
+
+      "Legal Entity" shall mean the union of the acting entity and all
+      other entities that control, are controlled by, or are under common
+      control with that entity. For the purposes of this definition,
+      "control" means (i) the power, direct or indirect, to cause the
+      direction or management of such entity, whether by contract or
+      otherwise, or (ii) ownership of fifty percent (50%) or more of the
+      outstanding shares, or (iii) beneficial ownership of such entity.
+
+      "You" (or "Your") shall mean an individual or Legal Entity
+      exercising permissions granted by this License.
+
+      "Source" form shall mean the preferred form for making modifications,
+      including but not limited to software source code, documentation
+      source, and configuration files.
+
+      "Object" form shall mean any form resulting from mechanical
+      transformation or translation of a Source form, including but
+      not limited to compiled object code, generated documentation,
+      and conversions to other media types.
+
+      "Work" shall mean the work of authorship, whether in Source or
+      Object form, made available under the License, as indicated by a
+      copyright notice that is included in or attached to the work
+      (an example is provided in the Appendix below).
+
+      "Derivative Works" shall mean any work, whether in Source or Object
+      form, that is based on (or derived from) the Work and for which the
+      editorial revisions, annotations, elaborations, or other modifications
+      represent, as a whole, an original work of authorship. For the purposes
+      of this License, Derivative Works shall not include works that remain
+      separable from, or merely link (or bind by name) to the interfaces of,
+      the Work and Derivative Works thereof.
+
+      "Contribution" shall mean any work of authorship, including
+      the original version of the Work and any modifications or additions
+      to that Work or Derivative Works thereof, that is intentionally
+      submitted to Licensor for inclusion in the Work by the copyright owner
+      or by an individual or Legal Entity authorized to submit on behalf of
+      the copyright owner. For the purposes of this definition, "submitted"
+      means any form of electronic, verbal, or written communication sent
+      to the Licensor or its representatives, including but not limited to
+      communication on electronic mailing lists, source code control systems,
+      and issue tracking systems that are managed by, or on behalf of, the
+      Licensor for the purpose of discussing and improving the Work, but
+      excluding communication that is conspicuously marked or otherwise
+      designated in writing by the copyright owner as "Not a Contribution."
+
+      "Contributor" shall mean Licensor and any individual or Legal Entity
+      on behalf of whom a Contribution has been received by Licensor and
+      subsequently incorporated within the Work.
+
+   2. Grant of Copyright License. Subject to the terms and conditions of
+      this License, each Contributor hereby grants to You a perpetual,
+      worldwide, non-exclusive, no-charge, royalty-free, irrevocable
+      copyright license to reproduce, prepare Derivative Works of,
+      publicly display, publicly perform, sublicense, and distribute the
+      Work and such Derivative Works in Source or Object form.
+
+   3. Grant of Patent License. Subject to the terms and conditions of
+      this License, each Contributor hereby grants to You a perpetual,
+      worldwide, non-exclusive, no-charge, royalty-free, irrevocable
+      (except as stated in this section) patent license to make, have made,
+      use, offer to sell, sell, import, and otherwise transfer the Work,
+      where such license applies only to those patent claims licensable
+      by such Contributor that are necessarily infringed by their
+      Contribution(s) alone or by combination of their Contribution(s)
+      with the Work to which such Contribution(s) was submitted. If You
+      institute patent litigation against any entity (including a
+      cross-claim or counterclaim in a lawsuit) alleging that the Work
+      or a Contribution incorporated within the Work constitutes direct
+      or contributory patent infringement, then any patent licenses
+      granted to You under this License for that Work shall terminate
+      as of the date such litigation is filed.
+
+   4. Redistribution. You may reproduce and distribute copies of the
+      Work or Derivative Works thereof in any medium, with or without
+      modifications, and in Source or Object form, provided that You
+      meet the following conditions:
+
+      (a) You must give any other recipients of the Work or
+          Derivative Works a copy of this License; and
+
+      (b) You must cause any modified files to carry prominent notices
+          stating that You changed the files; and
+
+      (c) You must retain, in the Source form of any Derivative Works
+          that You distribute, all copyright, patent, trademark, and
+          attribution notices from the Source form of the Work,
+          excluding those notices that do not pertain to any part of
+          the Derivative Works; and
+
+      (d) If the Work includes a "NOTICE" text file as part of its
+          distribution, then any Derivative Works that You distribute must
+          include a readable copy of the attribution notices contained
+          within such NOTICE file, excluding those notices that do not
+          pertain to any part of the Derivative Works, in at least one
+          of the following places: within a NOTICE text file distributed
+          as part of the Derivative Works; within the Source form or
+          documentation, if provided along with the Derivative Works; or,
+          within a display generated by the Derivative Works, if and
+          wherever such third-party notices normally appear. The contents
+          of the NOTICE file are for informational purposes only and
+          do not modify the License. You may add Your own attribution
+          notices within Derivative Works that You distribute, alongside
+          or as an addendum to the NOTICE text from the Work, provided
+          that such additional attribution notices cannot be construed
+          as modifying the License.
+
+      You may add Your own copyright statement to Your modifications and
+      may provide additional or different license terms and conditions
+      for use, reproduction, or distribution of Your modifications, or
+      for any such Derivative Works as a whole, provided Your use,
+      reproduction, and distribution of the Work otherwise complies with
+      the conditions stated in this License.
+
+   5. Submission of Contributions. Unless You explicitly state otherwise,
+      any Contribution intentionally submitted for inclusion in the Work
+      by You to the Licensor shall be under the terms and conditions of
+      this License, without any additional terms or conditions.
+      Notwithstanding the above, nothing herein shall supersede or modify
+      the terms of any separate license agreement you may have executed
+      with Licensor regarding such Contributions.
+
+   6. Trademarks. This License does not grant permission to use the trade
+      names, trademarks, service marks, or product names of the Licensor,
+      except as required for reasonable and customary use in describing the
+      origin of the Work and reproducing the content of the NOTICE file.
+
+   7. Disclaimer of Warranty. Unless required by applicable law or
+      agreed to in writing, Licensor provides the Work (and each
+      Contributor provides its Contributions) on an "AS IS" BASIS,
+      WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or
+      implied, including, without limitation, any warranties or conditions
+      of TITLE, NON-INFRINGEMENT, MERCHANTABILITY, or FITNESS FOR A
+      PARTICULAR PURPOSE. You are solely responsible for determining the
+      appropriateness of using or redistributing the Work and assume any
+      risks associated with Your exercise of permissions under this License.
+
+   8. Limitation of Liability. In no event and under no legal theory,
+      whether in tort (including negligence), contract, or otherwise,
+      unless required by applicable law (such as deliberate and grossly
+      negligent acts) or agreed to in writing, shall any Contributor be
+      liable to You for damages, including any direct, indirect, special,
+      incidental, or consequential damages of any character arising as a
+      result of this License or out of the use or inability to use the
+      Work (including but not limited to damages for loss of goodwill,
+      work stoppage, computer failure or malfunction, or any and all
+      other commercial damages or losses), even if such Contributor
+      has been advised of the possibility of such damages.
+
+   9. Accepting Warranty or Additional Liability. While redistributing
+      the Work or Derivative Works thereof, You may choose to offer,
+      and charge a fee for, acceptance of support, warranty, indemnity,
+      or other liability obligations and/or rights consistent with this
+      License. However, in accepting such obligations, You may act only
+      on Your own behalf and on Your sole responsibility, not on behalf
+      of any other Contributor, and only if You agree to indemnify,
+      defend, and hold each Contributor harmless for any liability
+      incurred by, or claims asserted against, such Contributor by reason
+      of your accepting any such warranty or additional liability.
+
+   END OF TERMS AND CONDITIONS
+
+   APPENDIX: How to apply the Apache License to your work.
+
+      To apply the Apache License to your work, attach the following
+      boilerplate notice, with the fields enclosed by brackets "[]"
+      replaced with your own identifying information. (Don't include
+      the brackets!)  The text should be enclosed in the appropriate
+      comment syntax for the file format. We also recommend that a
+      file or class name and description of purpose be included on the
+      same "printed page" as the copyright notice for easier
+      identification within third-party archives.
+
+   Copyright [yyyy] [name of copyright owner]
+
+   Licensed under the Apache License, Version 2.0 (the "License");
+   you may not use this file except in compliance with the License.
+   You may obtain a copy of the License at
+
+       http://www.apache.org/licenses/LICENSE-2.0
+
+   Unless required by applicable law or agreed to in writing, software
+   distributed under the License is distributed on an "AS IS" BASIS,
+   WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+   See the License for the specific language governing permissions and
+   limitations under the License.
diff --git a/NOTICE b/NOTICE
new file mode 100644
index 0000000..ca3686b
--- /dev/null
+++ b/NOTICE
@@ -0,0 +1,8 @@
+Apache Sling Jackrabbit JSR-283 Access Control Manager Support
+Copyright 2008-2009 The Apache Software Foundation
+
+Apache Sling is based on source code originally developed 
+by Day Software (http://www.day.com/).
+
+This product includes software developed at
+The Apache Software Foundation (http://www.apache.org/).
diff --git a/README.txt b/README.txt
new file mode 100644
index 0000000..3482a22
--- /dev/null
+++ b/README.txt
@@ -0,0 +1,37 @@
+Apache Sling Jackrabbit JSR-283 Access Control Manager Support
+
+Provides actions for the JSR-283 Access Control Manager.
+
+Disclaimer
+==========
+Apache Sling is an effort undergoing incubation at The Apache Software Foundation (ASF),
+sponsored by the Apache Jackrabbit PMC. Incubation is required of all newly accepted
+projects until a further review indicates that the infrastructure, communications,
+and decision making process have stabilized in a manner consistent with other
+successful ASF projects. While incubation status is not necessarily a reflection of
+the completeness or stability of the code, it does indicate that the project has yet
+to be fully endorsed by the ASF.
+
+Getting Started
+===============
+
+This component uses a Maven 2 (http://maven.apache.org/) build
+environment. It requires a Java 5 JDK (or higher) and Maven (http://maven.apache.org/)
+2.0.7 or later. We recommend to use the latest Maven version.
+
+If you have Maven 2 installed, you can compile and
+package the jar using the following command:
+
+    mvn package
+
+See the Maven 2 documentation for other build features.
+
+The latest source code for this component is available in the
+Subversion (http://subversion.tigris.org/) source repository of
+the Apache Software Foundation. If you have Subversion installed,
+you can checkout the latest source using the following command:
+
+    svn checkout http://svn.apache.org/repos/asf/incubator/sling/trunk/servlets/post
+
+See the Subversion documentation for other source control features.
+
diff --git a/pom.xml b/pom.xml
new file mode 100644
index 0000000..b51abe4
--- /dev/null
+++ b/pom.xml
@@ -0,0 +1,119 @@
+<project xmlns="http://maven.apache.org/POM/4.0.0"
+	xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
+	xsi:schemaLocation="http://maven.apache.org/POM/4.0.0 http://maven.apache.org/maven-v4_0_0.xsd">
+	
+	<modelVersion>4.0.0</modelVersion>
+	<parent>
+		<groupId>org.apache.sling</groupId>
+		<artifactId>sling</artifactId>
+		<version>5-incubator-SNAPSHOT</version>
+		<relativePath>../../../parent/pom.xml</relativePath>
+	</parent>
+
+	<artifactId>org.apache.sling.jcr.jackrabbit.accessmanager</artifactId>
+	<packaging>bundle</packaging>
+	<version>2.0.0-incubator-SNAPSHOT</version>
+	<name>Apache Sling Jackrabbit JSR-283 Access Control Manager Support</name>
+	<description>
+		Provides SlingPostOperations for the Jackrabbit JSR-283 Access Control Manager.
+	</description>
+
+	<scm>
+		<connection>
+			scm:svn:http://svn.apache.org/repos/asf/incubator/sling/trunk/bundles/jcr/jackrabbit-accessmanager
+		</connection>
+		<developerConnection>
+			scm:svn:https://svn.apache.org/repos/asf/incubator/sling/trunk/bundles/jcr/jackrabbit-accessmanager
+		</developerConnection>
+		<url>
+			http://svn.apache.org/viewvc/incubator/sling/trunk/bundles/jcr/jackrabbit-accessmanager
+		</url>
+	</scm>
+
+	<build>
+		<plugins>
+			<plugin>
+				<groupId>org.apache.felix</groupId>
+				<artifactId>maven-scr-plugin</artifactId>
+			</plugin>
+			<plugin>
+				<groupId>org.apache.felix</groupId>
+				<artifactId>maven-bundle-plugin</artifactId>
+				<extensions>true</extensions>
+				<configuration>
+					<instructions>
+						<Private-Package>
+						</Private-Package>
+						<Export-Package>
+                     org.apache.sling.jcr.jackrabbit.accessmanager;version=${pom.version},
+                     org.apache.sling.jcr.jackrabbit.accessmanager.post;version=${pom.version}                   
+						</Export-Package>
+						<Sling-Initial-Content></Sling-Initial-Content>
+						<Sling-Nodetypes></Sling-Nodetypes>
+					</instructions>
+				</configuration>
+			</plugin>
+		</plugins>
+	</build>
+
+	<reporting>
+		<plugins>
+			<plugin>
+				<groupId>org.apache.maven.plugins</groupId>
+				<artifactId>maven-javadoc-plugin</artifactId>
+				<configuration>
+					<!-- No javadocs -->
+					<excludePackageNames>
+					</excludePackageNames>
+				</configuration>
+			</plugin>
+		</plugins>
+	</reporting>
+
+	<dependencies>
+		<dependency>
+			<groupId>javax.servlet</groupId>
+			<artifactId>servlet-api</artifactId>
+		</dependency>
+		
+      <dependency>
+         <groupId>org.apache.sling</groupId>
+         <artifactId>org.apache.sling.commons.json</artifactId>
+         <version>2.0.3-incubator-SNAPSHOT</version>
+      </dependency>
+		
+		<dependency>
+			<groupId>org.apache.sling</groupId>
+			<artifactId>org.apache.sling.api</artifactId>
+			<version>2.0.3-incubator-SNAPSHOT</version>
+		</dependency>
+		<dependency>
+			<groupId>org.apache.sling</groupId>
+			<artifactId>org.apache.sling.servlets.post</artifactId>
+			<version>2.0.3-incubator-SNAPSHOT</version>
+		</dependency>
+		<dependency>
+			<groupId>org.apache.sling</groupId>
+			<artifactId>org.apache.sling.jcr.jackrabbit.api</artifactId>
+			<version>2.0.3-incubator-SNAPSHOT</version>
+		</dependency>
+		<dependency>
+			<groupId>org.apache.sling</groupId>
+			<artifactId>org.apache.sling.jcr.base</artifactId>
+			<version>2.0.3-incubator-SNAPSHOT</version>
+		</dependency>
+		<dependency>
+			<groupId>org.apache.jackrabbit</groupId>
+			<artifactId>jackrabbit-api</artifactId>
+			<version>1.5.0</version>
+		</dependency>
+		<dependency>
+			<groupId>org.apache.felix</groupId>
+			<artifactId>org.osgi.core</artifactId>
+		</dependency>
+		<dependency>
+			<groupId>org.apache.felix</groupId>
+			<artifactId>org.osgi.compendium</artifactId>
+		</dependency>
+	</dependencies>
+</project>
\ No newline at end of file
diff --git a/src/main/java/org/apache/sling/jcr/jackrabbit/accessmanager/PrivilegesInfo.java b/src/main/java/org/apache/sling/jcr/jackrabbit/accessmanager/PrivilegesInfo.java
new file mode 100644
index 0000000..aef7a29
--- /dev/null
+++ b/src/main/java/org/apache/sling/jcr/jackrabbit/accessmanager/PrivilegesInfo.java
@@ -0,0 +1,616 @@
+/*
+ * Licensed to the Apache Software Foundation (ASF) under one or more
+ * contributor license agreements.  See the NOTICE file distributed with
+ * this work for additional information regarding copyright ownership.
+ * The ASF licenses this file to You under the Apache License, Version 2.0
+ * (the "License"); you may not use this file except in compliance with
+ * the License.  You may obtain a copy of the License at
+ *
+ *      http://www.apache.org/licenses/LICENSE-2.0
+ *
+ * Unless required by applicable law or agreed to in writing, software
+ * distributed under the License is distributed on an "AS IS" BASIS,
+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+ * See the License for the specific language governing permissions and
+ * limitations under the License.
+ */
+package org.apache.sling.jcr.jackrabbit.accessmanager;
+
+import java.lang.reflect.InvocationTargetException;
+import java.lang.reflect.Method;
+import java.security.Principal;
+import java.util.Arrays;
+import java.util.HashSet;
+import java.util.Iterator;
+import java.util.LinkedHashMap;
+import java.util.Locale;
+import java.util.Map;
+import java.util.ResourceBundle;
+import java.util.Set;
+
+import javax.jcr.Node;
+import javax.jcr.RepositoryException;
+import javax.jcr.Session;
+
+import org.apache.jackrabbit.api.jsr283.security.AccessControlEntry;
+import org.apache.jackrabbit.api.jsr283.security.AccessControlList;
+import org.apache.jackrabbit.api.jsr283.security.AccessControlManager;
+import org.apache.jackrabbit.api.jsr283.security.AccessControlPolicy;
+import org.apache.jackrabbit.api.jsr283.security.Privilege;
+import org.apache.jackrabbit.api.security.principal.PrincipalManager;
+import org.apache.sling.jcr.base.util.AccessControlUtil;
+
+/**
+ * Helper class to assist in the usage of access control from scripts.
+ */
+public class PrivilegesInfo {
+	
+	/**
+	 * Return the supported Privileges for the specified node.
+	 * 
+	 * @param node the node to check
+	 * @return array of Privileges
+	 * @throws RepositoryException
+	 */
+	public Privilege [] getSupportedPrivileges(Node node) throws RepositoryException {
+		return getSupportedPrivileges(node.getSession(), node.getPath());
+	}
+	
+	/**
+	 * Returns the supported privileges for the specified path.
+	 * 
+	 * @param session the session for the current user
+	 * @param absPath the path to get the privileges for
+	 * @return array of Privileges
+	 * @throws RepositoryException
+	 */
+	public Privilege [] getSupportedPrivileges(Session session, String absPath) throws RepositoryException {
+		AccessControlManager accessControlManager = AccessControlUtil.getAccessControlManager(session);
+		Privilege[] supportedPrivileges = accessControlManager.getSupportedPrivileges(absPath);
+		return supportedPrivileges;
+	}
+	
+	/**
+	 * Wrapper class that holds the set of Privileges that are granted 
+	 * and/or denied for a specific principal.
+	 */
+	public static class AccessRights {
+		private Set<Privilege> granted = new HashSet<Privilege>();
+		private Set<Privilege> denied = new HashSet<Privilege>();
+
+		private transient static ResourceBundle resBundle = null; 
+		private ResourceBundle getResourceBundle(Locale locale) {
+			if (resBundle == null || !resBundle.getLocale().equals(locale)) {
+				resBundle = ResourceBundle.getBundle(getClass().getPackage().getName() + ".PrivilegesResources", locale);
+			}
+			return resBundle;
+		}
+		
+
+		public Set<Privilege> getGranted() {
+			return granted;
+		}
+		public Set<Privilege> getDenied() {
+			return denied;
+		}
+		
+		public String getPrivilegeSetDisplayName(Locale locale) {
+			if (denied != null && !denied.isEmpty()) {
+				//if there are any denied privileges, then this is a custom privilege set
+				return getResourceBundle(locale).getString("privilegeset.custom");
+			} else {
+				if (granted.isEmpty()) {
+					//appears to have an empty privilege set
+					return getResourceBundle(locale).getString("privilegeset.none");
+				}
+					
+				if (granted.size() == 1) {
+					//check if the single privilege is jcr:all or jcr:read
+					Iterator<Privilege> iterator = granted.iterator();
+					Privilege next = iterator.next();
+					if ("jcr:all".equals(next.getName())) {
+						//full control privilege set
+						return getResourceBundle(locale).getString("privilegeset.all");
+					} else if ("jcr:read".equals(next.getName())) {
+						//readonly privilege set
+						return getResourceBundle(locale).getString("privilegeset.readonly");
+					} 
+				} else if (granted.size() == 2) {
+					//check if the two privileges are jcr:read and jcr:write
+					Iterator<Privilege> iterator = granted.iterator();
+					Privilege next = iterator.next();
+					Privilege next2 = iterator.next();
+					if ( ("jcr:read".equals(next.getName()) && "jcr:write".equals(next2.getName())) ||
+							("jcr:read".equals(next2.getName()) && "jcr:write".equals(next.getName())) ) {
+						//read/write privileges
+						return getResourceBundle(locale).getString("privilegeset.readwrite");
+					}
+				}
+
+				//some other set of privileges
+				return getResourceBundle(locale).getString("privilegeset.custom");
+			}
+		}
+	}
+
+	/**
+	 * Returns the mapping of declared access rights that have been set for the resource at
+	 * the given path. 
+	 * 
+	 * @param node the node to get the access rights for
+	 * @return map of access rights.  Key is the user/group principal, value contains the granted/denied privileges
+	 * @throws RepositoryException
+	 */
+	public Map<Principal, AccessRights> getDeclaredAccessRights(Node node) throws RepositoryException {
+		Map<Principal, AccessRights> accessRights = getDeclaredAccessRights(node.getSession(), node.getPath());
+		return accessRights;
+	}
+	
+	/**
+	 * Returns the mapping of declared access rights that have been set for the resource at
+	 * the given path. 
+	 * 
+	 * @param session the current user session.
+	 * @param absPath the path of the resource to get the access rights for
+	 * @return map of access rights.  Key is the user/group principal, value contains the granted/denied privileges
+	 * @throws RepositoryException
+	 */
+	public Map<Principal, AccessRights> getDeclaredAccessRights(Session session, String absPath) throws RepositoryException {
+		Map<Principal, AccessRights> accessMap = new LinkedHashMap<Principal, AccessRights>();
+		AccessControlEntry[] entries = getDeclaredAccessControlEntries(session, absPath);
+		if (entries != null) {
+			for (AccessControlEntry ace : entries) {
+				Principal principal = ace.getPrincipal();
+				AccessRights accessPrivleges = accessMap.get(principal);
+				if (accessPrivleges == null) {
+					accessPrivleges = new AccessRights();
+					accessMap.put(principal, accessPrivleges);
+				}
+				boolean allow = AccessControlUtil.isAllow(ace);
+				if (allow) {
+					accessPrivleges.getGranted().addAll(Arrays.asList(ace.getPrivileges()));
+				} else {
+					accessPrivleges.getDenied().addAll(Arrays.asList(ace.getPrivileges()));
+				}
+			}
+		}
+		
+		return accessMap;
+	}
+
+	private AccessControlEntry[] getDeclaredAccessControlEntries(Session session, String absPath) throws RepositoryException {
+		AccessControlManager accessControlManager = AccessControlUtil.getAccessControlManager(session);
+		AccessControlPolicy[] policies = accessControlManager.getPolicies(absPath);
+		for (AccessControlPolicy accessControlPolicy : policies) {
+			if (accessControlPolicy instanceof AccessControlList) {
+				AccessControlEntry[] accessControlEntries = ((AccessControlList)accessControlPolicy).getAccessControlEntries();
+				return accessControlEntries;
+			}
+		}
+		return new AccessControlEntry[0];
+	}
+
+	/**
+	 * Returns the declared access rights for the specified Node for the given
+	 * principalId.
+	 * 
+	 * @param node the JCR node to retrieve the access rights for
+	 * @param principalId the principalId to get the access rights for
+	 * @return access rights for the specified principal
+	 * @throws RepositoryException
+	 */
+	public AccessRights getDeclaredAccessRightsForPrincipal(Node node, String principalId) throws RepositoryException {
+		return getDeclaredAccessRightsForPrincipal(node.getSession(), node.getPath(), principalId);
+	}
+
+	/**
+	 * Returns the declared access rights for the resource at the specified path for the given
+	 * principalId.
+	 * 
+	 * @param session the current JCR session
+	 * @param absPath the path of the resource to retrieve the rights for
+	 * @param principalId the principalId to get the access rights for
+	 * @return access rights for the specified principal
+	 * @throws RepositoryException
+	 */
+	public AccessRights getDeclaredAccessRightsForPrincipal(Session session, String absPath, String principalId) throws RepositoryException {
+		AccessRights rights = new AccessRights();
+		if (principalId != null && principalId.length() > 0) {
+			AccessControlManager accessControlManager = AccessControlUtil.getAccessControlManager(session);
+			AccessControlPolicy[] policies = accessControlManager.getPolicies(absPath);
+			for (AccessControlPolicy accessControlPolicy : policies) {
+				if (accessControlPolicy instanceof AccessControlList) {
+					AccessControlEntry[] accessControlEntries = ((AccessControlList)accessControlPolicy).getAccessControlEntries();
+					for (AccessControlEntry ace : accessControlEntries) {
+						if (principalId.equals(ace.getPrincipal().getName())) {
+							boolean isAllow = AccessControlUtil.isAllow(ace);
+							if (isAllow) {
+								rights.getGranted().addAll(Arrays.asList(ace.getPrivileges()));
+							} else {
+								rights.getDenied().addAll(Arrays.asList(ace.getPrivileges()));
+							}
+						}
+					}
+				}
+			}
+		}
+		
+		return rights;
+	}
+	
+
+	
+	
+	/**
+	 * Returns the mapping of effective access rights that have been set for the resource at
+	 * the given path. 
+	 * 
+	 * @param node the node to get the access rights for
+	 * @return map of access rights.  Key is the user/group principal, value contains the granted/denied privileges
+	 * @throws RepositoryException
+	 */
+	public Map<Principal, AccessRights> getEffectiveAccessRights(Node node) throws RepositoryException {
+		Map<Principal, AccessRights> accessRights = getEffectiveAccessRights(node.getSession(), node.getPath());
+		return accessRights;
+	}
+	
+	/**
+	 * Returns the mapping of effective access rights that have been set for the resource at
+	 * the given path. 
+	 * 
+	 * @param session the current user session.
+	 * @param absPath the path of the resource to get the access rights for
+	 * @return map of access rights.  Key is the user/group principal, value contains the granted/denied privileges
+	 * @throws RepositoryException
+	 */
+	public Map<Principal, AccessRights> getEffectiveAccessRights(Session session, String absPath) throws RepositoryException {
+		Map<Principal, AccessRights> accessMap = new LinkedHashMap<Principal, AccessRights>();
+		AccessControlEntry[] entries = getEffectiveAccessControlEntries(session, absPath);
+		if (entries != null) {
+			for (AccessControlEntry ace : entries) {
+				Principal principal = ace.getPrincipal();
+				AccessRights accessPrivleges = accessMap.get(principal);
+				if (accessPrivleges == null) {
+					accessPrivleges = new AccessRights();
+					accessMap.put(principal, accessPrivleges);
+				}
+				boolean allow = AccessControlUtil.isAllow(ace);
+				if (allow) {
+					accessPrivleges.getGranted().addAll(Arrays.asList(ace.getPrivileges()));
+				} else {
+					accessPrivleges.getDenied().addAll(Arrays.asList(ace.getPrivileges()));
+				}
+			}
+		}
+		
+		return accessMap;
+	}
+	
+	private AccessControlEntry[] getEffectiveAccessControlEntries(Session session, String absPath) throws RepositoryException {
+		AccessControlManager accessControlManager = AccessControlUtil.getAccessControlManager(session);
+		AccessControlPolicy[] policies = accessControlManager.getEffectivePolicies(absPath);
+		for (AccessControlPolicy accessControlPolicy : policies) {
+			if (accessControlPolicy instanceof AccessControlList) {
+				AccessControlEntry[] accessControlEntries = ((AccessControlList)accessControlPolicy).getAccessControlEntries();
+				return accessControlEntries;
+			}
+		}
+		return new AccessControlEntry[0];
+	}
+
+	/**
+	 * Returns the effective access rights for the specified Node for the given
+	 * principalId.
+	 * 
+	 * @param node the JCR node to retrieve the access rights for
+	 * @param principalId the principalId to get the access rights for
+	 * @return access rights for the specified principal
+	 * @throws RepositoryException
+	 */
+	public AccessRights getEffectiveAccessRightsForPrincipal(Node node, String principalId) throws RepositoryException {
+		return getEffectiveAccessRightsForPrincipal(node.getSession(), node.getPath(), principalId);
+	}
+
+	/**
+	 * Returns the effective access rights for the resource at the specified path for the given
+	 * principalId.
+	 * 
+	 * @param session the current JCR session
+	 * @param absPath the path of the resource to retrieve the rights for
+	 * @param principalId the principalId to get the access rights for
+	 * @return access rights for the specified principal
+	 * @throws RepositoryException
+	 */
+	public AccessRights getEffectiveAccessRightsForPrincipal(Session session, String absPath, String principalId) throws RepositoryException {
+		AccessRights rights = new AccessRights();
+		if (principalId != null && principalId.length() > 0) {
+			AccessControlManager accessControlManager = AccessControlUtil.getAccessControlManager(session);
+			AccessControlPolicy[] policies = accessControlManager.getEffectivePolicies(absPath);
+			for (AccessControlPolicy accessControlPolicy : policies) {
+				if (accessControlPolicy instanceof AccessControlList) {
+					AccessControlEntry[] accessControlEntries = ((AccessControlList)accessControlPolicy).getAccessControlEntries();
+					for (AccessControlEntry ace : accessControlEntries) {
+						if (principalId.equals(ace.getPrincipal().getName())) {
+							boolean isAllow = AccessControlUtil.isAllow(ace);
+							if (isAllow) {
+								rights.getGranted().addAll(Arrays.asList(ace.getPrivileges()));
+							} else {
+								rights.getDenied().addAll(Arrays.asList(ace.getPrivileges()));
+							}
+						}
+					}
+				}
+			}
+		}
+		
+		return rights;
+	}
+	
+	
+	
+	/**
+	 * Checks whether the current user has been granted privileges
+	 * to add children to the specified node.
+	 *  
+	 * @param node the node to check
+	 * @return true if the current user has the privileges, false otherwise
+	 */
+	public boolean canAddChildren(Node node) {
+		try {
+			return canAddChildren(node.getSession(), node.getPath());
+		} catch (RepositoryException e) {
+			return false;
+		}
+	}
+	
+	/**
+	 * Checks whether the current user has been granted privileges
+	 * to add children to the specified path.
+	 *  
+	 * @param session the JCR session of the current user
+	 * @param absPath the path of the resource to check
+	 * @return true if the current user has the privileges, false otherwise
+	 */
+	public boolean canAddChildren(Session session, String absPath) {
+		try {
+			AccessControlManager accessControlManager = AccessControlUtil.getAccessControlManager(session);
+			return accessControlManager.hasPrivileges(absPath, new Privilege[] {
+							accessControlManager.privilegeFromName(Privilege.JCR_ADD_CHILD_NODES)
+						});
+		} catch (RepositoryException e) {
+			return false;
+		}
+	}
+	
+	/**
+	 * Checks whether the current user has been granted privileges
+	 * to delete children to the specified node.
+	 *  
+	 * @param node the node to check
+	 * @return true if the current user has the privileges, false otherwise
+	 */
+	public boolean canDeleteChildren(Node node) {
+		try {
+			return canDeleteChildren(node.getSession(), node.getPath());
+		} catch (RepositoryException e) {
+			return false;
+		}
+	}
+
+	/**
+	 * Checks whether the current user has been granted privileges
+	 * to delete children of the specified path.
+	 *  
+	 * @param session the JCR session of the current user
+	 * @param absPath the path of the resource to check
+	 * @return true if the current user has the privileges, false otherwise
+	 */
+	public boolean canDeleteChildren(Session session, String absPath) {
+		try {
+			AccessControlManager accessControlManager = AccessControlUtil.getAccessControlManager(session);
+			
+			return accessControlManager.hasPrivileges(absPath, new Privilege[] {
+							accessControlManager.privilegeFromName(Privilege.JCR_REMOVE_CHILD_NODES)
+						});
+		} catch (RepositoryException e) {
+			return false;
+		}
+	}
+	
+	/**
+	 * Checks whether the current user has been granted privileges
+	 * to delete the specified node.
+	 *  
+	 * @param node the node to check
+	 * @return true if the current user has the privileges, false otherwise
+	 */
+	public boolean canDelete(Node node) {
+		try {
+			return canDelete(node.getSession(), node.getPath());
+		} catch (RepositoryException e) {
+			return false;
+		}
+	}
+	
+	/**
+	 * Checks whether the current user has been granted privileges
+	 * to delete the specified path.
+	 *  
+	 * @param session the JCR session of the current user
+	 * @param absPath the path of the resource to check
+	 * @return true if the current user has the privileges, false otherwise
+	 */
+	public boolean canDelete(Session session, String absPath) {
+		try {
+			AccessControlManager accessControlManager = AccessControlUtil.getAccessControlManager(session);
+			
+			String parentPath = absPath.substring(0, absPath.lastIndexOf('/'));
+			boolean canDelete = accessControlManager.hasPrivileges(absPath, new Privilege[] {
+							accessControlManager.privilegeFromName(Privilege.JCR_REMOVE_NODE)
+						}) && canDeleteChildren(session, parentPath);
+			return canDelete;
+		} catch (RepositoryException e) {
+			return false;
+		}
+	}
+
+	/**
+	 * Checks whether the current user has been granted privileges
+	 * to modify properties of the specified node.
+	 *  
+	 * @param node the node to check
+	 * @return true if the current user has the privileges, false otherwise
+	 */
+	public boolean canModifyProperties(Node node) {
+		try {
+			return canModifyProperties(node.getSession(), node.getPath());
+		} catch (RepositoryException e) {
+			return false;
+		}
+	}
+	
+	/**
+	 * Checks whether the current user has been granted privileges
+	 * to modify properties of the specified path.
+	 *  
+	 * @param session the JCR session of the current user
+	 * @param absPath the path of the resource to check
+	 * @return true if the current user has the privileges, false otherwise
+	 */
+	public boolean canModifyProperties(Session session, String absPath) {
+		try {
+			AccessControlManager accessControlManager = AccessControlUtil.getAccessControlManager(session);
+			return accessControlManager.hasPrivileges(absPath, new Privilege[] {
+							accessControlManager.privilegeFromName(Privilege.JCR_MODIFY_PROPERTIES)
+						});
+		} catch (RepositoryException e) {
+			return false;
+		}
+	}
+	
+	/**
+	 * Checks whether the current user has been granted privileges
+	 * to read the access control of the specified node.
+	 *  
+	 * @param node the node to check
+	 * @return true if the current user has the privileges, false otherwise
+	 */
+	public boolean canReadAccessControl(Node node) {
+		try {
+			return canReadAccessControl(node.getSession(), node.getPath());
+		} catch (RepositoryException e) {
+			return false;
+		}
+	}
+	
+	/**
+	 * Checks whether the current user has been granted privileges
+	 * to read the access control of the specified path.
+	 *  
+	 * @param session the JCR session of the current user
+	 * @param absPath the path of the resource to check
+	 * @return true if the current user has the privileges, false otherwise
+	 */
+	public boolean canReadAccessControl(Session session, String absPath) {
+		try {
+			AccessControlManager accessControlManager = AccessControlUtil.getAccessControlManager(session);
+			return accessControlManager.hasPrivileges(absPath, new Privilege[] {
+							accessControlManager.privilegeFromName(Privilege.JCR_READ_ACCESS_CONTROL)
+						});
+		} catch (RepositoryException e) {
+			return false;
+		}
+	}
+	
+	/**
+	 * Checks whether the current user has been granted privileges
+	 * to modify the access control of the specified node.
+	 *  
+	 * @param node the node to check
+	 * @return true if the current user has the privileges, false otherwise
+	 */
+	public boolean canModifyAccessControl(Node node) {
+		try {
+			return canModifyAccessControl(node.getSession(), node.getPath());
+		} catch (RepositoryException e) {
+			return false;
+		}
+	}
+	
+	/**
+	 * Checks whether the current user has been granted privileges
+	 * to modify the access control of the specified path.
+	 *  
+	 * @param session the JCR session of the current user
+	 * @param absPath the path of the resource to check
+	 * @return true if the current user has the privileges, false otherwise
+	 */
+	public boolean canModifyAccessControl(Session session, String absPath) {
+		try {
+			AccessControlManager accessControlManager = AccessControlUtil.getAccessControlManager(session);
+			return accessControlManager.hasPrivileges(absPath, new Privilege[] {
+							accessControlManager.privilegeFromName(Privilege.JCR_MODIFY_ACCESS_CONTROL)
+						});
+		} catch (RepositoryException e) {
+			return false;
+		}
+	}
+
+
+	/**
+	 * Checks whether the current user has been granted privileges
+	 * to update the properties of the specified principal.
+	 *  
+	 * @param session the JCR session for the current user
+	 * @param principalID the id of the principal to check
+	 * @return true if the current user has the privileges, false otherwise
+	 */
+	public boolean canUpdateAuthorizable(Session session, String principalID) {
+		try {
+			PrincipalManager principalManager = AccessControlUtil.getPrincipalManager(session);
+			Principal principal = principalManager.getPrincipal(principalID);
+			if (principal == null) {
+				return false;
+			}
+
+			String path = getAuthorizableItemPath(principal);
+			return canModifyProperties(session, path);
+		} catch (Exception e) {
+			//just eat it.
+			return false;
+		}
+	}
+	private String getAuthorizableItemPath(Principal principal)
+			throws NoSuchMethodException, IllegalAccessException,
+			InvocationTargetException {
+		//should check if principal implements ItemBasedPrincipal, but it is not visible here so use reflection instead
+		Method method = principal.getClass().getMethod("getPath");
+		String path = (String)method.invoke(principal);
+		return path;
+	}
+	
+	/**
+	 * Checks whether the current user has been granted privileges
+	 * to delete the specified principal.
+	 *  
+	 * @param session the JCR session for the current user
+	 * @param principalID the id of the principal to check
+	 * @return true if the current user has the privileges, false otherwise
+	 */
+	public boolean canDeleteAuthorizable(Session session, String principalID) {
+		try {
+			PrincipalManager principalManager = AccessControlUtil.getPrincipalManager(session);
+			Principal principal = principalManager.getPrincipal(principalID);
+			if (principal == null) {
+				return false;
+			}
+			
+			//should check if principal implements ItemBasedPrincipal, but it is not visible here so use reflection instead
+			String path = getAuthorizableItemPath(principal);
+			return canDelete(session, path);
+		} catch (Exception e) {
+			//just eat it.
+			return false;
+		}
+	}
+}
diff --git a/src/main/java/org/apache/sling/jcr/jackrabbit/accessmanager/post/AbstractAccessPostServlet.java b/src/main/java/org/apache/sling/jcr/jackrabbit/accessmanager/post/AbstractAccessPostServlet.java
new file mode 100644
index 0000000..aa9cf4c
--- /dev/null
+++ b/src/main/java/org/apache/sling/jcr/jackrabbit/accessmanager/post/AbstractAccessPostServlet.java
@@ -0,0 +1,254 @@
+/*
+ * Licensed to the Apache Software Foundation (ASF) under one or more
+ * contributor license agreements.  See the NOTICE file distributed with
+ * this work for additional information regarding copyright ownership.
+ * The ASF licenses this file to You under the Apache License, Version 2.0
+ * (the "License"); you may not use this file except in compliance with
+ * the License.  You may obtain a copy of the License at
+ *
+ *      http://www.apache.org/licenses/LICENSE-2.0
+ *
+ * Unless required by applicable law or agreed to in writing, software
+ * distributed under the License is distributed on an "AS IS" BASIS,
+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+ * See the License for the specific language governing permissions and
+ * limitations under the License.
+ */
+package org.apache.sling.jcr.jackrabbit.accessmanager.post;
+
+import java.io.IOException;
+import java.util.ArrayList;
+import java.util.List;
+
+import javax.jcr.RepositoryException;
+import javax.jcr.Session;
+import javax.servlet.ServletException;
+import javax.servlet.http.HttpServletRequest;
+import javax.servlet.http.HttpServletResponse;
+
+import org.apache.sling.api.SlingHttpServletRequest;
+import org.apache.sling.api.SlingHttpServletResponse;
+import org.apache.sling.api.resource.ResourceNotFoundException;
+import org.apache.sling.api.resource.ResourceUtil;
+import org.apache.sling.api.servlets.HtmlResponse;
+import org.apache.sling.api.servlets.SlingAllMethodsServlet;
+import org.apache.sling.api.wrappers.SlingRequestPaths;
+import org.apache.sling.servlets.post.Modification;
+import org.apache.sling.servlets.post.SlingPostConstants;
+import org.slf4j.Logger;
+import org.slf4j.LoggerFactory;
+
+/**
+ * Base class for all the POST servlets for the AccessManager operations 
+ */
+public abstract class AbstractAccessPostServlet extends SlingAllMethodsServlet {
+	private static final long serialVersionUID = -5918670409789895333L;
+
+	/**
+     * default log
+     */
+    private final Logger log = LoggerFactory.getLogger(getClass());
+    
+	/* (non-Javadoc)
+	 * @see org.apache.sling.api.servlets.SlingAllMethodsServlet#doPost(org.apache.sling.api.SlingHttpServletRequest, org.apache.sling.api.SlingHttpServletResponse)
+	 */
+	@Override
+	protected void doPost(SlingHttpServletRequest request,
+			SlingHttpServletResponse httpResponse) throws ServletException,
+			IOException {
+        // prepare the response
+        HtmlResponse htmlResponse = new HtmlResponse();
+        htmlResponse.setReferer(request.getHeader("referer"));
+
+        // calculate the paths
+        String path = getItemPath(request);
+        htmlResponse.setPath(path);
+
+        // location
+        htmlResponse.setLocation(externalizePath(request, path));
+
+        // parent location
+        path = ResourceUtil.getParent(path);
+        if (path != null) {
+        	htmlResponse.setParentLocation(externalizePath(request, path));
+        }
+
+        Session session = request.getResourceResolver().adaptTo(Session.class);
+
+        final List<Modification> changes = new ArrayList<Modification>();
+        
+        try {
+            handleOperation(request, htmlResponse, changes);
+            
+            //TODO: maybe handle SlingAuthorizablePostProcessor handlers here
+            
+            // set changes on html response
+            for(Modification change : changes) {
+                switch ( change.getType() ) {
+                    case MODIFY : htmlResponse.onModified(change.getSource()); break;
+                    case DELETE : htmlResponse.onDeleted(change.getSource()); break;
+                    case MOVE :   htmlResponse.onMoved(change.getSource(), change.getDestination()); break;
+                    case COPY :   htmlResponse.onCopied(change.getSource(), change.getDestination()); break;
+                    case CREATE : htmlResponse.onCreated(change.getSource()); break;
+                    case ORDER : htmlResponse.onChange("ordered", change.getSource(), change.getDestination()); break;
+                }
+            }
+            
+            if (session.hasPendingChanges()) {
+                session.save();
+            }
+        } catch (ResourceNotFoundException rnfe) {
+            htmlResponse.setStatus(HttpServletResponse.SC_NOT_FOUND,
+                rnfe.getMessage());
+        } catch (Throwable throwable) {
+            log.debug("Exception while handling POST "
+                + request.getResource().getPath() + " with "
+                + getClass().getName(), throwable);
+            htmlResponse.setError(throwable);
+        } finally {
+            try {
+                if (session.hasPendingChanges()) {
+                    session.refresh(false);
+                }
+            } catch (RepositoryException e) {
+                log.warn("RepositoryException in finally block: {}",
+                    e.getMessage(), e);
+            }
+        }
+        
+        // check for redirect URL if processing succeeded
+        if (htmlResponse.isSuccessful()) {
+            String redirect = getRedirectUrl(request, htmlResponse);
+            if (redirect != null) {
+                httpResponse.sendRedirect(redirect);
+                return;
+            }
+        }
+
+        // create a html response and send if unsuccessful or no redirect
+        htmlResponse.send(httpResponse, isSetStatus(request));
+	}
+
+	/**
+	 * Extending Servlet should implement this operation to do the work
+	 * 
+	 * @param request the sling http request to process
+	 * @param htmlResponse the response 
+	 * @param changes 
+	 */
+	abstract protected void handleOperation(SlingHttpServletRequest request,
+			HtmlResponse htmlResponse, List<Modification> changes) throws RepositoryException;
+	
+	
+    /**
+     * compute redirect URL (SLING-126)
+     *
+     * @param ctx the post processor
+     * @return the redirect location or <code>null</code>
+     */
+    protected String getRedirectUrl(HttpServletRequest request, HtmlResponse ctx) {
+        // redirect param has priority (but see below, magic star)
+        String result = request.getParameter(SlingPostConstants.RP_REDIRECT_TO);
+        if (result != null && ctx.getPath() != null) {
+
+            // redirect to created/modified Resource
+            int star = result.indexOf('*');
+            if (star >= 0) {
+                StringBuffer buf = new StringBuffer();
+
+                // anything before the star
+                if (star > 0) {
+                    buf.append(result.substring(0, star));
+                }
+
+                // append the name of the manipulated node
+                buf.append(ResourceUtil.getName(ctx.getPath()));
+
+                // anything after the star
+                if (star < result.length() - 1) {
+                    buf.append(result.substring(star + 1));
+                }
+
+                // use the created path as the redirect result
+                result = buf.toString();
+
+            } else if (result.endsWith(SlingPostConstants.DEFAULT_CREATE_SUFFIX)) {
+                // if the redirect has a trailing slash, append modified node
+                // name
+                result = result.concat(ResourceUtil.getName(ctx.getPath()));
+            }
+
+            if (log.isDebugEnabled()) {
+                log.debug("Will redirect to " + result);
+            }
+        }
+        return result;
+    }
+
+    protected boolean isSetStatus(SlingHttpServletRequest request) {
+        String statusParam = request.getParameter(SlingPostConstants.RP_STATUS);
+        if (statusParam == null) {
+            log.debug(
+                "getStatusMode: Parameter {} not set, assuming standard status code",
+                SlingPostConstants.RP_STATUS);
+            return true;
+        }
+
+        if (SlingPostConstants.STATUS_VALUE_BROWSER.equals(statusParam)) {
+            log.debug(
+                "getStatusMode: Parameter {} asks for user-friendly status code",
+                SlingPostConstants.RP_STATUS);
+            return false;
+        }
+
+        if (SlingPostConstants.STATUS_VALUE_STANDARD.equals(statusParam)) {
+            log.debug(
+                "getStatusMode: Parameter {} asks for standard status code",
+                SlingPostConstants.RP_STATUS);
+            return true;
+        }
+
+        log.debug(
+            "getStatusMode: Parameter {} set to unknown value {}, assuming standard status code",
+            SlingPostConstants.RP_STATUS);
+        return true;
+    }
+	
+	// ------ These methods were copied from AbstractSlingPostOperation ------
+
+    /**
+     * Returns the path of the resource of the request as the item path.
+     * <p>
+     * This method may be overwritten by extension if the operation has
+     * different requirements on path processing.
+     */
+    protected String getItemPath(SlingHttpServletRequest request) {
+        return request.getResource().getPath();
+    }
+
+    /**
+     * Returns an external form of the given path prepending the context path
+     * and appending a display extension.
+     *
+     * @param path the path to externalize
+     * @return the url
+     */
+    protected final String externalizePath(SlingHttpServletRequest request,
+            String path) {
+        StringBuffer ret = new StringBuffer();
+        ret.append(SlingRequestPaths.getContextPath(request));
+        ret.append(request.getResourceResolver().map(path));
+
+        // append optional extension
+        String ext = request.getParameter(SlingPostConstants.RP_DISPLAY_EXTENSION);
+        if (ext != null && ext.length() > 0) {
+            if (ext.charAt(0) != '.') {
+                ret.append('.');
+            }
+            ret.append(ext);
+        }
+
+        return ret.toString();
+    }
+    
+}
diff --git a/src/main/java/org/apache/sling/jcr/jackrabbit/accessmanager/post/DeleteAcesServlet.java b/src/main/java/org/apache/sling/jcr/jackrabbit/accessmanager/post/DeleteAcesServlet.java
new file mode 100644
index 0000000..bcb0a3e
--- /dev/null
+++ b/src/main/java/org/apache/sling/jcr/jackrabbit/accessmanager/post/DeleteAcesServlet.java
@@ -0,0 +1,128 @@
+/*
+ * Licensed to the Apache Software Foundation (ASF) under one or more
+ * contributor license agreements.  See the NOTICE file distributed with
+ * this work for additional information regarding copyright ownership.
+ * The ASF licenses this file to You under the Apache License, Version 2.0
+ * (the "License"); you may not use this file except in compliance with
+ * the License.  You may obtain a copy of the License at
+ *
+ *      http://www.apache.org/licenses/LICENSE-2.0
+ *
+ * Unless required by applicable law or agreed to in writing, software
+ * distributed under the License is distributed on an "AS IS" BASIS,
+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+ * See the License for the specific language governing permissions and
+ * limitations under the License.
+ */
+package org.apache.sling.jcr.jackrabbit.accessmanager.post;
+
+import java.util.ArrayList;
+import java.util.Arrays;
+import java.util.HashSet;
+import java.util.List;
+import java.util.Set;
+
+import javax.jcr.Item;
+import javax.jcr.RepositoryException;
+import javax.jcr.Session;
+
+import org.apache.jackrabbit.api.jsr283.security.AccessControlEntry;
+import org.apache.jackrabbit.api.jsr283.security.AccessControlList;
+import org.apache.jackrabbit.api.jsr283.security.AccessControlManager;
+import org.apache.jackrabbit.api.jsr283.security.AccessControlPolicy;
+import org.apache.jackrabbit.api.jsr283.security.AccessControlPolicyIterator;
+import org.apache.sling.api.SlingHttpServletRequest;
+import org.apache.sling.api.resource.Resource;
+import org.apache.sling.api.resource.ResourceNotFoundException;
+import org.apache.sling.api.servlets.HtmlResponse;
+import org.apache.sling.jcr.base.util.AccessControlUtil;
+import org.apache.sling.servlets.post.Modification;
+import org.apache.sling.servlets.post.SlingPostConstants;
+
+/**
+ * Sling Post Servlet implementation for deleting the ACE for a set of principals on
+ * a JCR resource.
+ * 
+ * @scr.component immediate="true" 
+ * @scr.service interface="javax.servlet.Servlet"
+ * @scr.property name="sling.servlet.resourceTypes" value="sling/servlet/default"
+ * @scr.property name="sling.servlet.methods" value="POST" 
+ * @scr.property name="sling.servlet.selectors" value="deleteAce" 
+ */
+public class DeleteAcesServlet extends AbstractAccessPostServlet {
+	private static final long serialVersionUID = 3784866802938282971L;
+
+	/* (non-Javadoc)
+	 * @see org.apache.sling.jackrabbit.accessmanager.post.AbstractAccessPostServlet#handleOperation(org.apache.sling.api.SlingHttpServletRequest, org.apache.sling.api.servlets.HtmlResponse, java.util.List)
+	 */
+	@Override
+	protected void handleOperation(SlingHttpServletRequest request,
+			HtmlResponse htmlResponse, List<Modification> changes)
+			throws RepositoryException {
+		
+        String[] applyTo = request.getParameterValues(SlingPostConstants.RP_APPLY_TO);
+        if (applyTo == null) {
+			throw new RepositoryException("principalIds were not sumitted.");
+        } else {
+        	String resourcePath = null;
+        	Resource resource = request.getResource();
+        	if (resource == null) {
+    			throw new ResourceNotFoundException("Resource not found.");
+        	} else {
+        		Item item = resource.adaptTo(Item.class);
+        		if (item != null) {
+        			resourcePath = item.getPath();
+        		} else {
+        			throw new ResourceNotFoundException("Resource is not a JCR Node");
+        		}
+        	}
+        	
+    		Session session = request.getResourceResolver().adaptTo(Session.class);
+    		if (session == null) {
+    			throw new RepositoryException("JCR Session not found");
+    		}
+        	
+    		//load the principalIds array into a set for quick lookup below
+			Set<String> pidSet = new HashSet<String>();
+			pidSet.addAll(Arrays.asList(applyTo));
+			
+			try {
+				AccessControlManager accessControlManager = AccessControlUtil.getAccessControlManager(session);
+				AccessControlList updatedAcl = null;
+				AccessControlPolicyIterator applicablePolicies = accessControlManager.getApplicablePolicies(resourcePath);
+				while (applicablePolicies.hasNext()) {
+					AccessControlPolicy policy = applicablePolicies.nextAccessControlPolicy();
+					if (policy instanceof AccessControlList) {
+						updatedAcl = (AccessControlList)policy;
+						break;
+					}
+				}
+				if (updatedAcl == null) {
+					throw new RepositoryException("Unable to find an access control policy to update.");
+				}
+				
+				//keep track of the existing Aces for the target principal
+				AccessControlEntry[] accessControlEntries = updatedAcl.getAccessControlEntries();
+				List<AccessControlEntry> oldAces = new ArrayList<AccessControlEntry>();
+				for (AccessControlEntry ace : accessControlEntries) {
+					if (pidSet.contains(ace.getPrincipal().getName())) {
+						oldAces.add(ace);
+					}
+				}
+
+				//remove the old aces
+				if (!oldAces.isEmpty()) {
+					for (AccessControlEntry ace : oldAces) {
+						updatedAcl.removeAccessControlEntry(ace);
+					}
+				}
+				
+				//apply the changed policy
+				accessControlManager.setPolicy(resourcePath, updatedAcl);
+			} catch (RepositoryException re) {
+				throw new RepositoryException("Failed to delete access control.", re);
+			}
+        }
+	}
+
+}
diff --git a/src/main/java/org/apache/sling/jcr/jackrabbit/accessmanager/post/GetAclServlet.java b/src/main/java/org/apache/sling/jcr/jackrabbit/accessmanager/post/GetAclServlet.java
new file mode 100644
index 0000000..1104e24
--- /dev/null
+++ b/src/main/java/org/apache/sling/jcr/jackrabbit/accessmanager/post/GetAclServlet.java
@@ -0,0 +1,180 @@
+/*
+ * Licensed to the Apache Software Foundation (ASF) under one or more
+ * contributor license agreements.  See the NOTICE file distributed with
+ * this work for additional information regarding copyright ownership.
+ * The ASF licenses this file to You under the Apache License, Version 2.0
+ * (the "License"); you may not use this file except in compliance with
+ * the License.  You may obtain a copy of the License at
+ *
+ *      http://www.apache.org/licenses/LICENSE-2.0
+ *
+ * Unless required by applicable law or agreed to in writing, software
+ * distributed under the License is distributed on an "AS IS" BASIS,
+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+ * See the License for the specific language governing permissions and
+ * limitations under the License.
+ */
+package org.apache.sling.jcr.jackrabbit.accessmanager.post;
+
+import java.io.IOException;
+import java.security.Principal;
+import java.util.LinkedHashMap;
+import java.util.LinkedHashSet;
+import java.util.Map;
+import java.util.Set;
+import java.util.Map.Entry;
+
+import javax.jcr.AccessDeniedException;
+import javax.jcr.Item;
+import javax.jcr.RepositoryException;
+import javax.jcr.Session;
+import javax.servlet.ServletException;
+import javax.servlet.http.HttpServletResponse;
+
+import org.apache.jackrabbit.api.jsr283.security.AccessControlEntry;
+import org.apache.jackrabbit.api.jsr283.security.AccessControlList;
+import org.apache.jackrabbit.api.jsr283.security.AccessControlManager;
+import org.apache.jackrabbit.api.jsr283.security.AccessControlPolicy;
+import org.apache.jackrabbit.api.jsr283.security.Privilege;
+import org.apache.sling.api.SlingHttpServletRequest;
+import org.apache.sling.api.SlingHttpServletResponse;
+import org.apache.sling.api.resource.Resource;
+import org.apache.sling.api.resource.ResourceNotFoundException;
+import org.apache.sling.api.servlets.SlingAllMethodsServlet;
+import org.apache.sling.commons.json.JSONObject;
+import org.apache.sling.jcr.base.util.AccessControlUtil;
+import org.slf4j.Logger;
+import org.slf4j.LoggerFactory;
+
+/**
+ * Sling GET servlet implementation for dumping the declared ACL of a resource
+ * to JSON.
+ * 
+ * @scr.component immediate="true" 
+ * @scr.service interface="javax.servlet.Servlet"
+ * @scr.property name="sling.servlet.resourceTypes" value="sling/servlet/default"
+ * @scr.property name="sling.servlet.methods" value="GET" 
+ * @scr.property name="sling.servlet.selectors" value="acl" 
+ * @scr.property name="sling.servlet.extensions " value="json" 
+ */
+public class GetAclServlet extends SlingAllMethodsServlet {
+	private static final long serialVersionUID = 3391376559396223184L;
+
+	/**
+     * default log
+     */
+    private final Logger log = LoggerFactory.getLogger(getClass());
+
+	/* (non-Javadoc)
+	 * @see org.apache.sling.api.servlets.SlingSafeMethodsServlet#doGet(org.apache.sling.api.SlingHttpServletRequest, org.apache.sling.api.SlingHttpServletResponse)
+	 */
+	@Override
+	protected void doGet(SlingHttpServletRequest request,
+			SlingHttpServletResponse response) throws ServletException,
+			IOException {
+		
+        try {
+    		Session session = request.getResourceResolver().adaptTo(Session.class);
+    		if (session == null) {
+    			throw new RepositoryException("JCR Session not found");
+    		}
+    		
+        	String resourcePath = null;
+        	Resource resource = request.getResource();
+        	if (resource == null) {
+    			throw new ResourceNotFoundException("Resource not found.");
+        	} else {
+        		Item item = resource.adaptTo(Item.class);
+        		if (item != null) {
+        			resourcePath = item.getPath();
+        		} else {
+        			throw new ResourceNotFoundException("Resource is not a JCR Node");
+        		}
+        	}
+
+        	AccessControlEntry[] declaredAccessControlEntries = getDeclaredAccessControlEntries(session, resourcePath);
+        	Map<String, Map<String, Set<String>>> aclMap = new LinkedHashMap<String, Map<String,Set<String>>>();
+        	for (AccessControlEntry ace : declaredAccessControlEntries) {
+    			Principal principal = ace.getPrincipal();
+    			Map<String, Set<String>> map = aclMap.get(principal.getName());
+    			if (map == null) {
+    				map = new LinkedHashMap<String, Set<String>>();
+    				aclMap.put(principal.getName(), map);
+    			}
+
+    			boolean allow = AccessControlUtil.isAllow(ace);
+    			if (allow) {
+    				Set<String> grantedSet = map.get("granted");
+    				if (grantedSet == null) {
+    					grantedSet = new LinkedHashSet<String>();
+    					map.put("granted", grantedSet);
+    				}
+    				Privilege[] privileges = ace.getPrivileges();
+    				for (Privilege privilege : privileges) {
+    					grantedSet.add(privilege.getName());
+    				}
+    			} else {
+    				Set<String> deniedSet = map.get("denied");
+    				if (deniedSet == null) {
+    					deniedSet = new LinkedHashSet<String>();
+    					map.put("denied", deniedSet);
+    				}
+    				Privilege[] privileges = ace.getPrivileges();
+    				for (Privilege privilege : privileges) {
+    					deniedSet.add(privilege.getName());
+    				}
+    			}
+    		}
+        	
+
+        	response.setContentType("application/json");
+        	response.setCharacterEncoding("UTF-8");
+
+        	JSONObject jsonObj = new JSONObject();
+        	Set<Entry<String, Map<String, Set<String>>>> entrySet = aclMap.entrySet();
+        	for (Entry<String, Map<String, Set<String>>> entry : entrySet) {
+        		String principalName = entry.getKey();
+        		Map<String, Set<String>> value = entry.getValue();
+        		
+        		JSONObject aceObject = new JSONObject();
+        		Set<String> grantedSet = value.get("granted");
+        		if (grantedSet != null) {
+            		aceObject.put("granted", grantedSet);
+        		}
+        		
+        		Set<String> deniedSet = value.get("denied");
+        		if (deniedSet != null) {
+        			aceObject.put("denied", deniedSet);
+        		}
+
+        		jsonObj.put(principalName, aceObject);
+			}
+        	
+
+            // do the dump
+        	jsonObj.write(response.getWriter());
+        } catch (AccessDeniedException ade) {
+        	response.sendError(HttpServletResponse.SC_NOT_FOUND);
+        } catch (ResourceNotFoundException rnfe) {
+        	response.sendError(HttpServletResponse.SC_NOT_FOUND, rnfe.getMessage());
+        } catch (Throwable throwable) {
+            log.debug("Exception while handling GET "
+                + request.getResource().getPath() + " with "
+                + getClass().getName(), throwable);
+            throw new ServletException(throwable);
+        }
+	}
+
+	private AccessControlEntry[] getDeclaredAccessControlEntries(Session session, String absPath) throws RepositoryException {
+		AccessControlManager accessControlManager = AccessControlUtil.getAccessControlManager(session);
+		AccessControlPolicy[] policies = accessControlManager.getPolicies(absPath);
+		for (AccessControlPolicy accessControlPolicy : policies) {
+			if (accessControlPolicy instanceof AccessControlList) {
+				AccessControlEntry[] accessControlEntries = ((AccessControlList)accessControlPolicy).getAccessControlEntries();
+				return accessControlEntries;
+			}
+		}
+		return new AccessControlEntry[0];
+	}
+	
+}
diff --git a/src/main/java/org/apache/sling/jcr/jackrabbit/accessmanager/post/ModifyAceServlet.java b/src/main/java/org/apache/sling/jcr/jackrabbit/accessmanager/post/ModifyAceServlet.java
new file mode 100644
index 0000000..b98f7ac
--- /dev/null
+++ b/src/main/java/org/apache/sling/jcr/jackrabbit/accessmanager/post/ModifyAceServlet.java
@@ -0,0 +1,241 @@
+/*
+ * Licensed to the Apache Software Foundation (ASF) under one or more
+ * contributor license agreements.  See the NOTICE file distributed with
+ * this work for additional information regarding copyright ownership.
+ * The ASF licenses this file to You under the Apache License, Version 2.0
+ * (the "License"); you may not use this file except in compliance with
+ * the License.  You may obtain a copy of the License at
+ *
+ *      http://www.apache.org/licenses/LICENSE-2.0
+ *
+ * Unless required by applicable law or agreed to in writing, software
+ * distributed under the License is distributed on an "AS IS" BASIS,
+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+ * See the License for the specific language governing permissions and
+ * limitations under the License.
+ */
+package org.apache.sling.jcr.jackrabbit.accessmanager.post;
+
+import java.security.Principal;
+import java.util.ArrayList;
+import java.util.Enumeration;
+import java.util.List;
+
+import javax.jcr.Item;
+import javax.jcr.RepositoryException;
+import javax.jcr.Session;
+
+import org.apache.jackrabbit.api.jsr283.security.AccessControlEntry;
+import org.apache.jackrabbit.api.jsr283.security.AccessControlList;
+import org.apache.jackrabbit.api.jsr283.security.AccessControlManager;
+import org.apache.jackrabbit.api.jsr283.security.AccessControlPolicy;
+import org.apache.jackrabbit.api.jsr283.security.AccessControlPolicyIterator;
+import org.apache.jackrabbit.api.jsr283.security.Privilege;
+import org.apache.jackrabbit.api.security.user.Authorizable;
+import org.apache.jackrabbit.api.security.user.UserManager;
+import org.apache.sling.api.SlingHttpServletRequest;
+import org.apache.sling.api.resource.Resource;
+import org.apache.sling.api.resource.ResourceNotFoundException;
+import org.apache.sling.api.servlets.HtmlResponse;
+import org.apache.sling.jcr.base.util.AccessControlUtil;
+import org.apache.sling.servlets.post.Modification;
+import org.slf4j.Logger;
+import org.slf4j.LoggerFactory;
+
+/**
+ * Sling Post Servlet implementation for modifying the ACE for a principal on
+ * a JCR resource.
+ * 
+ * @scr.component immediate="true" 
+ * @scr.service interface="javax.servlet.Servlet"
+ * @scr.property name="sling.servlet.resourceTypes" value="sling/servlet/default"
+ * @scr.property name="sling.servlet.methods" value="POST" 
+ * @scr.property name="sling.servlet.selectors" value="modifyAce" 
+ */
+public class ModifyAceServlet extends AbstractAccessPostServlet {
+	private static final long serialVersionUID = -9182485466670280437L;
+
+	/**
+     * default log
+     */
+    private final Logger log = LoggerFactory.getLogger(getClass());
+
+	/* (non-Javadoc)
+	 * @see org.apache.sling.jackrabbit.accessmanager.post.AbstractAccessPostServlet#handleOperation(org.apache.sling.api.SlingHttpServletRequest, org.apache.sling.api.servlets.HtmlResponse, java.util.List)
+	 */
+	@SuppressWarnings("unchecked")
+	@Override
+	protected void handleOperation(SlingHttpServletRequest request,
+			HtmlResponse htmlResponse, List<Modification> changes)
+			throws RepositoryException {
+		Session session = request.getResourceResolver().adaptTo(Session.class);
+		if (session == null) {
+			throw new RepositoryException("JCR Session not found");
+		}
+
+		String principalId = request.getParameter("principalId");
+		if (principalId == null) {
+			throw new RepositoryException("principalId was not submitted.");
+		}
+		UserManager userManager = AccessControlUtil.getUserManager(session);
+		Authorizable authorizable = userManager.getAuthorizable(principalId);
+		if (authorizable == null) {
+			throw new RepositoryException("No principal found for id: " + principalId);
+		}
+
+    	String resourcePath = null;
+    	Resource resource = request.getResource();
+    	if (resource == null) {
+			throw new ResourceNotFoundException("Resource not found.");
+    	} else {
+    		Item item = resource.adaptTo(Item.class);
+    		if (item != null) {
+    			resourcePath = item.getPath();
+    		} else {
+    			throw new ResourceNotFoundException("Resource is not a JCR Node");
+    		}
+    	}
+		
+		
+		List<String> grantedPrivilegeNames = new ArrayList<String>();
+		List<String> deniedPrivilegeNames = new ArrayList<String>();
+		Enumeration parameterNames = request.getParameterNames();
+		while (parameterNames.hasMoreElements()) {
+			Object nextElement = parameterNames.nextElement();
+			if (nextElement instanceof String) {
+				String paramName = (String)nextElement;
+				if (paramName.startsWith("privilege@")) {
+					String parameterValue = request.getParameter(paramName);
+					if (parameterValue != null && parameterValue.length() > 0) {
+						if ("granted".equals(parameterValue)) {
+							String privilegeName = paramName.substring(10);
+							grantedPrivilegeNames.add(privilegeName);
+						} else if ("denied".equals(parameterValue)) {
+							String privilegeName = paramName.substring(10);
+							deniedPrivilegeNames.add(privilegeName);
+						}
+					}
+				}
+			}
+		}
+
+		try {
+			AccessControlManager accessControlManager = AccessControlUtil.getAccessControlManager(session);
+			AccessControlList updatedAcl = null;
+			AccessControlPolicyIterator applicablePolicies = accessControlManager.getApplicablePolicies(resourcePath);
+			while (applicablePolicies.hasNext()) {
+				AccessControlPolicy policy = applicablePolicies.nextAccessControlPolicy();
+				if (policy instanceof AccessControlList) {
+					updatedAcl = (AccessControlList)policy;
+					break;
+				}
+			}
+			if (updatedAcl == null) {
+				throw new RepositoryException("Unable to find an access conrol policy to update.");
+			}
+
+			StringBuilder oldPrivileges = null;
+			StringBuilder newPrivileges = null;
+			if (log.isDebugEnabled()) {
+				oldPrivileges = new StringBuilder();
+				newPrivileges = new StringBuilder();
+			}
+
+			//keep track of the existing Aces for the target principal
+			AccessControlEntry[] accessControlEntries = updatedAcl.getAccessControlEntries();
+			List<AccessControlEntry> oldAces = new ArrayList<AccessControlEntry>();
+			for (AccessControlEntry ace : accessControlEntries) {
+				if (principalId.equals(ace.getPrincipal().getName())) {
+					if (log.isDebugEnabled()) {
+						log.debug("Found Existing ACE for principal {0} on resource: ", new Object[] {principalId, resourcePath});
+					}
+					oldAces.add(ace);
+					
+					if (log.isDebugEnabled()) {
+						//collect the information for debug logging
+						boolean isAllow = AccessControlUtil.isAllow(ace);
+						Privilege[] privileges = ace.getPrivileges();
+						for (Privilege privilege : privileges) {
+							if (oldPrivileges.length() > 0) {
+								oldPrivileges.append(", "); //separate entries by commas
+							}
+							if (isAllow) {
+								oldPrivileges.append("granted=");
+							} else {
+								oldPrivileges.append("denied=");
+							}
+							oldPrivileges.append(privilege.getName());
+						}
+					}
+				}
+			}
+
+			//remove the old aces
+			if (!oldAces.isEmpty()) {
+				for (AccessControlEntry ace : oldAces) {
+					updatedAcl.removeAccessControlEntry(ace);
+				}
+			}
+			
+			//add a fresh ACE with the granted privileges
+			List<Privilege> grantedPrivilegeList = new ArrayList<Privilege>();
+			for (String name : grantedPrivilegeNames) {
+				if (name.length() == 0) {
+					continue; //empty, skip it.
+				}
+				Privilege privilege = accessControlManager.privilegeFromName(name);
+				grantedPrivilegeList.add(privilege);
+					
+				if (log.isDebugEnabled()) {
+					if (newPrivileges.length() > 0) {
+						newPrivileges.append(", "); //separate entries by commas
+					}
+					newPrivileges.append("granted=");
+					newPrivileges.append(privilege.getName());
+				}
+			}
+			if (grantedPrivilegeList.size() > 0) {
+				Principal principal = authorizable.getPrincipal();
+				updatedAcl.addAccessControlEntry(principal, grantedPrivilegeList.toArray(new Privilege[grantedPrivilegeList.size()]));
+			}
+
+			//if the authorizable is a user (not a group) process any denied privileges
+			if (!authorizable.isGroup()) {
+				//add a fresh ACE with the denied privileges
+				List<Privilege> deniedPrivilegeList = new ArrayList<Privilege>();
+				for (String name : deniedPrivilegeNames) {
+					if (name.length() == 0) {
+						continue; //empty, skip it.
+					}
+					Privilege privilege = accessControlManager.privilegeFromName(name);
+					deniedPrivilegeList.add(privilege);
+
+					if (log.isDebugEnabled()) {
+						if (newPrivileges.length() > 0) {
+							newPrivileges.append(", "); //separate entries by commas
+						}
+						newPrivileges.append("denied=");
+						newPrivileges.append(privilege.getName());
+					}
+				}
+				if (deniedPrivilegeList.size() > 0) {
+					Principal principal = authorizable.getPrincipal();
+					AccessControlUtil.addEntry(updatedAcl, principal, deniedPrivilegeList.toArray(new Privilege[deniedPrivilegeList.size()]), false);
+				}
+			}
+
+			accessControlManager.setPolicy(resourcePath, updatedAcl);
+			if (session.hasPendingChanges()) {
+				session.save();
+			}
+
+			if (log.isDebugEnabled()) {
+				log.debug("Updated ACE for principalId {0} for resource {1) from {2} to {3}", new Object [] {
+						authorizable.getID(), resourcePath, oldPrivileges.toString(), newPrivileges.toString()
+				});
+			}
+		} catch (RepositoryException re) {
+			throw new RepositoryException("Failed to create ace.", re);
+		}
+	}
+}
diff --git a/src/main/resources/OSGI-INF/metatype/metatype.properties b/src/main/resources/OSGI-INF/metatype/metatype.properties
new file mode 100644
index 0000000..f9e0714
--- /dev/null
+++ b/src/main/resources/OSGI-INF/metatype/metatype.properties
@@ -0,0 +1,25 @@
+#
+#  Licensed to the Apache Software Foundation (ASF) under one
+#  or more contributor license agreements.  See the NOTICE file
+#  distributed with this work for additional information
+#  regarding copyright ownership.  The ASF licenses this file
+#  to you under the Apache License, Version 2.0 (the
+#  "License"); you may not use this file except in compliance
+#  with the License.  You may obtain a copy of the License at
+#
+#   http://www.apache.org/licenses/LICENSE-2.0
+#
+#  Unless required by applicable law or agreed to in writing,
+#  software distributed under the License is distributed on an
+#  "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY
+#  KIND, either express or implied.  See the License for the
+#  specific language governing permissions and limitations
+#  under the License.
+#
+
+
+#
+# This file contains localization strings for configuration labels and
+# descriptions as used in the metatype.xml descriptor generated by the
+# the Sling SCR plugin
+
diff --git a/src/main/resources/org/apache/sling/jcr/jackrabbit/accessmanager/PrivilegesResources.properties b/src/main/resources/org/apache/sling/jcr/jackrabbit/accessmanager/PrivilegesResources.properties
new file mode 100644
index 0000000..a7d1083
--- /dev/null
+++ b/src/main/resources/org/apache/sling/jcr/jackrabbit/accessmanager/PrivilegesResources.properties
@@ -0,0 +1,23 @@
+#
+#  Licensed to the Apache Software Foundation (ASF) under one
+#  or more contributor license agreements.  See the NOTICE file
+#  distributed with this work for additional information
+#  regarding copyright ownership.  The ASF licenses this file
+#  to you under the Apache License, Version 2.0 (the
+#  "License"); you may not use this file except in compliance
+#  with the License.  You may obtain a copy of the License at
+#
+#   http://www.apache.org/licenses/LICENSE-2.0
+#
+#  Unless required by applicable law or agreed to in writing,
+#  software distributed under the License is distributed on an
+#  "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY
+#  KIND, either express or implied.  See the License for the
+#  specific language governing permissions and limitations
+#  under the License.
+
+privilegeset.all=Full Control
+privilegeset.readonly=Read Only
+privilegeset.readwrite=Read/Write
+privilegeset.none=None
+privilegeset.custom=Custom
\ No newline at end of file

-- 
To stop receiving notification emails like this one, please contact
"commits@sling.apache.org" <co...@sling.apache.org>.