SLING-12224 Remove dependency on org.apache.sling.jcr.base (#24)
diff --git a/pom.xml b/pom.xml
index 079b495..60e5d48 100644
--- a/pom.xml
+++ b/pom.xml
@@ -135,12 +135,6 @@
<scope>provided</scope>
</dependency>
<dependency>
- <groupId>org.apache.sling</groupId>
- <artifactId>org.apache.sling.jcr.base</artifactId>
- <version>3.1.12</version>
- <scope>provided</scope>
- </dependency>
- <dependency>
<groupId>org.apache.jackrabbit</groupId>
<artifactId>oak-security-spi</artifactId>
<version>${oak.version}</version>
diff --git a/src/main/java/org/apache/sling/jcr/jackrabbit/accessmanager/PrivilegesInfo.java b/src/main/java/org/apache/sling/jcr/jackrabbit/accessmanager/PrivilegesInfo.java
index daf5131..f093629 100644
--- a/src/main/java/org/apache/sling/jcr/jackrabbit/accessmanager/PrivilegesInfo.java
+++ b/src/main/java/org/apache/sling/jcr/jackrabbit/accessmanager/PrivilegesInfo.java
@@ -42,11 +42,11 @@
import jakarta.json.JsonValue;
import jakarta.json.JsonValue.ValueType;
+import org.apache.jackrabbit.api.JackrabbitSession;
import org.apache.jackrabbit.api.security.principal.PrincipalManager;
import org.apache.jackrabbit.oak.spi.security.authorization.restriction.RestrictionDefinition;
import org.apache.jackrabbit.oak.spi.security.authorization.restriction.RestrictionProvider;
import org.apache.jackrabbit.oak.spi.security.privilege.PrivilegeConstants;
-import org.apache.sling.jcr.base.util.AccessControlUtil;
import org.apache.sling.jcr.jackrabbit.accessmanager.impl.JsonConvert;
import org.osgi.framework.Bundle;
import org.osgi.framework.BundleContext;
@@ -81,7 +81,7 @@
* @throws RepositoryException if any errors reading the information
*/
public Privilege [] getSupportedPrivileges(Session session, String absPath) throws RepositoryException {
- AccessControlManager accessControlManager = AccessControlUtil.getAccessControlManager(session);
+ AccessControlManager accessControlManager = session.getAccessControlManager();
return accessControlManager.getSupportedPrivileges(absPath);
}
@@ -193,7 +193,7 @@
Map<Principal, AccessRights> map;
AccessControlManager acm = session.getAccessControlManager();
- PrincipalManager principalManager = AccessControlUtil.getPrincipalManager(session);
+ PrincipalManager principalManager = ((JackrabbitSession)session).getPrincipalManager();
Function<? super JsonValue, ? extends Principal> keyMapper = val -> {
String principalId = ((JsonObject)val).getString(JsonConvert.KEY_PRINCIPAL);
return principalManager.getPrincipal(principalId);
@@ -256,7 +256,7 @@
*/
public AccessRights getDeclaredAccessRightsForPrincipal(Session session, String absPath, String principalId) throws RepositoryException {
Map<Principal, AccessRights> declaredAccessRights = getDeclaredAccessRights(session, absPath);
- PrincipalManager principalManager = AccessControlUtil.getPrincipalManager(session);
+ PrincipalManager principalManager = ((JackrabbitSession)session).getPrincipalManager();
Principal principal = principalManager.getPrincipal(principalId);
return declaredAccessRights.get(principal);
}
@@ -414,7 +414,7 @@
*/
public AccessRights getEffectiveAccessRightsForPrincipal(Session session, String absPath, String principalId) throws RepositoryException {
Map<Principal, AccessRights> effectiveAccessRights = getEffectiveAccessRights(session, absPath);
- PrincipalManager principalManager = AccessControlUtil.getPrincipalManager(session);
+ PrincipalManager principalManager = ((JackrabbitSession)session).getPrincipalManager();
Principal principal = principalManager.getPrincipal(principalId);
return effectiveAccessRights.get(principal);
}
@@ -444,7 +444,7 @@
*/
public boolean canAddChildren(Session session, String absPath) {
try {
- AccessControlManager accessControlManager = AccessControlUtil.getAccessControlManager(session);
+ AccessControlManager accessControlManager = session.getAccessControlManager();
return accessControlManager.hasPrivileges(absPath, new Privilege[] {
accessControlManager.privilegeFromName(Privilege.JCR_ADD_CHILD_NODES)
});
@@ -478,8 +478,7 @@
*/
public boolean canDeleteChildren(Session session, String absPath) {
try {
- AccessControlManager accessControlManager = AccessControlUtil.getAccessControlManager(session);
-
+ AccessControlManager accessControlManager = session.getAccessControlManager();
return accessControlManager.hasPrivileges(absPath, new Privilege[] {
accessControlManager.privilegeFromName(Privilege.JCR_REMOVE_CHILD_NODES)
});
@@ -513,7 +512,7 @@
*/
public boolean canDelete(Session session, String absPath) {
try {
- AccessControlManager accessControlManager = AccessControlUtil.getAccessControlManager(session);
+ AccessControlManager accessControlManager = session.getAccessControlManager();
String parentPath;
int lastSlash = absPath.lastIndexOf('/');
@@ -557,7 +556,7 @@
*/
public boolean canModifyProperties(Session session, String absPath) {
try {
- AccessControlManager accessControlManager = AccessControlUtil.getAccessControlManager(session);
+ AccessControlManager accessControlManager = session.getAccessControlManager();
return accessControlManager.hasPrivileges(absPath, new Privilege[] {
accessControlManager.privilegeFromName(Privilege.JCR_MODIFY_PROPERTIES)
});
@@ -591,7 +590,7 @@
*/
public boolean canReadAccessControl(Session session, String absPath) {
try {
- AccessControlManager accessControlManager = AccessControlUtil.getAccessControlManager(session);
+ AccessControlManager accessControlManager = session.getAccessControlManager();
return accessControlManager.hasPrivileges(absPath, new Privilege[] {
accessControlManager.privilegeFromName(Privilege.JCR_READ_ACCESS_CONTROL)
});
@@ -625,7 +624,7 @@
*/
public boolean canModifyAccessControl(Session session, String absPath) {
try {
- AccessControlManager accessControlManager = AccessControlUtil.getAccessControlManager(session);
+ AccessControlManager accessControlManager = session.getAccessControlManager();
return accessControlManager.hasPrivileges(absPath, new Privilege[] {
accessControlManager.privilegeFromName(Privilege.JCR_MODIFY_ACCESS_CONTROL)
});
diff --git a/src/main/java/org/apache/sling/jcr/jackrabbit/accessmanager/post/AbstractAccessGetServlet.java b/src/main/java/org/apache/sling/jcr/jackrabbit/accessmanager/post/AbstractAccessGetServlet.java
index 5f1ad19..b7cbf5f 100644
--- a/src/main/java/org/apache/sling/jcr/jackrabbit/accessmanager/post/AbstractAccessGetServlet.java
+++ b/src/main/java/org/apache/sling/jcr/jackrabbit/accessmanager/post/AbstractAccessGetServlet.java
@@ -39,12 +39,10 @@
import javax.jcr.security.AccessControlList;
import javax.jcr.security.AccessControlPolicy;
import javax.jcr.security.Privilege;
-import jakarta.json.Json;
-import jakarta.json.JsonObject;
-import jakarta.json.stream.JsonGenerator;
import javax.servlet.ServletException;
import javax.servlet.http.HttpServletResponse;
+import org.apache.jackrabbit.api.JackrabbitSession;
import org.apache.jackrabbit.api.security.JackrabbitAccessControlEntry;
import org.apache.jackrabbit.api.security.JackrabbitAccessControlList;
import org.apache.jackrabbit.api.security.authorization.PrincipalAccessControlList;
@@ -53,7 +51,6 @@
import org.apache.sling.api.SlingHttpServletRequest;
import org.apache.sling.api.SlingHttpServletResponse;
import org.apache.sling.api.resource.ResourceNotFoundException;
-import org.apache.sling.jcr.base.util.AccessControlUtil;
import org.apache.sling.jcr.jackrabbit.accessmanager.LocalPrivilege;
import org.apache.sling.jcr.jackrabbit.accessmanager.LocalRestriction;
import org.apache.sling.jcr.jackrabbit.accessmanager.impl.PrincipalAceHelper;
@@ -61,6 +58,10 @@
import org.jetbrains.annotations.NotNull;
import org.jetbrains.annotations.Nullable;
+import jakarta.json.Json;
+import jakarta.json.JsonObject;
+import jakarta.json.stream.JsonGenerator;
+
@SuppressWarnings("serial")
public abstract class AbstractAccessGetServlet extends AbstractAccessServlet {
@@ -133,7 +134,7 @@
}
// validate that the submitted name is valid
- PrincipalManager principalManager = AccessControlUtil.getPrincipalManager(jcrSession);
+ PrincipalManager principalManager = ((JackrabbitSession)jcrSession).getPrincipalManager();
Principal principal = principalManager.getPrincipal(principalId);
if (principal == null) {
throw new RepositoryException("Invalid principalId was submitted.");
diff --git a/src/main/java/org/apache/sling/jcr/jackrabbit/accessmanager/post/AbstractGetAceServlet.java b/src/main/java/org/apache/sling/jcr/jackrabbit/accessmanager/post/AbstractGetAceServlet.java
index e327d5e..001dd77 100644
--- a/src/main/java/org/apache/sling/jcr/jackrabbit/accessmanager/post/AbstractGetAceServlet.java
+++ b/src/main/java/org/apache/sling/jcr/jackrabbit/accessmanager/post/AbstractGetAceServlet.java
@@ -27,18 +27,18 @@
import javax.jcr.security.AccessControlEntry;
import javax.jcr.security.AccessControlManager;
import javax.jcr.security.Privilege;
-import jakarta.json.JsonObject;
-import jakarta.json.JsonObjectBuilder;
import org.apache.jackrabbit.api.security.JackrabbitAccessControlEntry;
import org.apache.jackrabbit.oak.spi.security.authorization.restriction.RestrictionDefinition;
import org.apache.jackrabbit.oak.spi.security.privilege.PrivilegeConstants;
import org.apache.sling.api.resource.ResourceNotFoundException;
-import org.apache.sling.jcr.base.util.AccessControlUtil;
import org.apache.sling.jcr.jackrabbit.accessmanager.LocalPrivilege;
import org.apache.sling.jcr.jackrabbit.accessmanager.impl.JsonConvert;
import org.apache.sling.jcr.jackrabbit.accessmanager.impl.PrivilegesHelper;
+import jakarta.json.JsonObject;
+import jakarta.json.JsonObjectBuilder;
+
@SuppressWarnings({"serial", "java:S110"})
public abstract class AbstractGetAceServlet extends AbstractAccessGetServlet {
@@ -77,7 +77,7 @@
}
// combine any aggregates that are still valid
- AccessControlManager acm = AccessControlUtil.getAccessControlManager(jcrSession);
+ AccessControlManager acm = jcrSession.getAccessControlManager();
Map<Privilege, Integer> privilegeLongestDepthMap = PrivilegesHelper.buildPrivilegeLongestDepthMap(acm.privilegeFromName(PrivilegeConstants.JCR_ALL));
PrivilegesHelper.consolidateAggregates(jcrSession, resourcePath, privilegeToLocalPrivilegesMap, privilegeLongestDepthMap);
diff --git a/src/main/java/org/apache/sling/jcr/jackrabbit/accessmanager/post/AbstractGetAclServlet.java b/src/main/java/org/apache/sling/jcr/jackrabbit/accessmanager/post/AbstractGetAclServlet.java
index d547e7b..c65594e 100644
--- a/src/main/java/org/apache/sling/jcr/jackrabbit/accessmanager/post/AbstractGetAclServlet.java
+++ b/src/main/java/org/apache/sling/jcr/jackrabbit/accessmanager/post/AbstractGetAclServlet.java
@@ -38,7 +38,6 @@
import org.apache.jackrabbit.api.security.JackrabbitAccessControlEntry;
import org.apache.jackrabbit.oak.spi.security.authorization.restriction.RestrictionDefinition;
import org.apache.jackrabbit.oak.spi.security.privilege.PrivilegeConstants;
-import org.apache.sling.jcr.base.util.AccessControlUtil;
import org.apache.sling.jcr.jackrabbit.accessmanager.LocalPrivilege;
import org.apache.sling.jcr.jackrabbit.accessmanager.LocalRestriction;
import org.apache.sling.jcr.jackrabbit.accessmanager.impl.JsonConvert;
@@ -103,7 +102,7 @@
}
// combine any aggregates that are still valid
- AccessControlManager acm = AccessControlUtil.getAccessControlManager(jcrSession);
+ AccessControlManager acm = jcrSession.getAccessControlManager();
Map<Privilege, Integer> privilegeLongestDepthMap = PrivilegesHelper.buildPrivilegeLongestDepthMap(acm.privilegeFromName(PrivilegeConstants.JCR_ALL));
for (Entry<Principal, Map<Privilege, LocalPrivilege>> entry : principalToPrivilegesMap.entrySet()) {
Map<Privilege, LocalPrivilege> privilegeToLocalPrivilegesMap = entry.getValue();
diff --git a/src/main/java/org/apache/sling/jcr/jackrabbit/accessmanager/post/DeleteAcesServlet.java b/src/main/java/org/apache/sling/jcr/jackrabbit/accessmanager/post/DeleteAcesServlet.java
index 167dc45..71d0177 100644
--- a/src/main/java/org/apache/sling/jcr/jackrabbit/accessmanager/post/DeleteAcesServlet.java
+++ b/src/main/java/org/apache/sling/jcr/jackrabbit/accessmanager/post/DeleteAcesServlet.java
@@ -29,9 +29,9 @@
import javax.jcr.security.AccessControlManager;
import javax.servlet.Servlet;
+import org.apache.jackrabbit.api.JackrabbitSession;
import org.apache.jackrabbit.api.security.principal.PrincipalManager;
import org.apache.sling.api.SlingHttpServletRequest;
-import org.apache.sling.jcr.base.util.AccessControlUtil;
import org.apache.sling.jcr.jackrabbit.accessmanager.DeleteAces;
import org.apache.sling.servlets.post.Modification;
import org.apache.sling.servlets.post.PostResponse;
@@ -144,7 +144,7 @@
validateResourcePath(jcrSession, resourcePath);
// validate that the submitted names are valid
- PrincipalManager principalManager = AccessControlUtil.getPrincipalManager(jcrSession);
+ PrincipalManager principalManager = ((JackrabbitSession)jcrSession).getPrincipalManager();
for (String pid : principalNamesToDelete) {
Principal principal = principalManager.getPrincipal(pid);
if (principal == null) {
@@ -165,7 +165,7 @@
@NotNull
Set<Principal> found = validateArgs(jcrSession, resourcePath, principalNamesToDelete);
try {
- AccessControlManager accessControlManager = AccessControlUtil.getAccessControlManager(jcrSession);
+ AccessControlManager accessControlManager = jcrSession.getAccessControlManager();
AccessControlList updatedAcl = getAccessControlListOrNull(accessControlManager, resourcePath, false);
// if there is no AccessControlList, then there is nothing to be deleted
diff --git a/src/main/java/org/apache/sling/jcr/jackrabbit/accessmanager/post/DeletePrincipalAcesServlet.java b/src/main/java/org/apache/sling/jcr/jackrabbit/accessmanager/post/DeletePrincipalAcesServlet.java
index b7aee92..1d0c80d 100644
--- a/src/main/java/org/apache/sling/jcr/jackrabbit/accessmanager/post/DeletePrincipalAcesServlet.java
+++ b/src/main/java/org/apache/sling/jcr/jackrabbit/accessmanager/post/DeletePrincipalAcesServlet.java
@@ -31,7 +31,6 @@
import org.apache.jackrabbit.api.security.JackrabbitAccessControlManager;
import org.apache.jackrabbit.api.security.authorization.PrincipalAccessControlList;
-import org.apache.sling.jcr.base.util.AccessControlUtil;
import org.apache.sling.jcr.jackrabbit.accessmanager.DeletePrincipalAces;
import org.apache.sling.jcr.jackrabbit.accessmanager.impl.PrincipalAceHelper;
import org.apache.sling.servlets.post.Modification;
@@ -117,7 +116,7 @@
@NotNull
Set<Principal> found = validateArgs(jcrSession, resourcePath, principalNamesToDelete);
try {
- JackrabbitAccessControlManager jacm = (JackrabbitAccessControlManager)AccessControlUtil.getAccessControlManager(jcrSession);
+ JackrabbitAccessControlManager jacm = (JackrabbitAccessControlManager)jcrSession.getAccessControlManager();
// track which of the submitted principals had an ACE removed
Set<Principal> removedPrincipalSet = new HashSet<>();
diff --git a/src/main/java/org/apache/sling/jcr/jackrabbit/accessmanager/post/GetEffectiveAceServlet.java b/src/main/java/org/apache/sling/jcr/jackrabbit/accessmanager/post/GetEffectiveAceServlet.java
index de46755..6a2650f 100644
--- a/src/main/java/org/apache/sling/jcr/jackrabbit/accessmanager/post/GetEffectiveAceServlet.java
+++ b/src/main/java/org/apache/sling/jcr/jackrabbit/accessmanager/post/GetEffectiveAceServlet.java
@@ -33,7 +33,6 @@
import javax.servlet.Servlet;
import org.apache.jackrabbit.oak.spi.security.authorization.restriction.RestrictionProvider;
-import org.apache.sling.jcr.base.util.AccessControlUtil;
import org.apache.sling.jcr.jackrabbit.accessmanager.GetEffectiveAce;
import org.apache.sling.jcr.jackrabbit.accessmanager.impl.JsonConvert;
import org.osgi.service.component.annotations.Component;
@@ -112,7 +111,7 @@
@Override
protected Map<String, List<AccessControlEntry>> getAccessControlEntriesMap(Session session, String absPath,
Principal principal, Map<Principal, Map<DeclarationType, Set<String>>> declaredAtPaths) throws RepositoryException {
- AccessControlManager acMgr = AccessControlUtil.getAccessControlManager(session);
+ AccessControlManager acMgr = session.getAccessControlManager();
AccessControlPolicy[] policies = acMgr.getEffectivePolicies(absPath);
return entriesSortedByEffectivePath(policies, ace -> principal.equals(ace.getPrincipal()), declaredAtPaths);
}
diff --git a/src/main/java/org/apache/sling/jcr/jackrabbit/accessmanager/post/ModifyAceServlet.java b/src/main/java/org/apache/sling/jcr/jackrabbit/accessmanager/post/ModifyAceServlet.java
index d46ccee..aa0e833 100644
--- a/src/main/java/org/apache/sling/jcr/jackrabbit/accessmanager/post/ModifyAceServlet.java
+++ b/src/main/java/org/apache/sling/jcr/jackrabbit/accessmanager/post/ModifyAceServlet.java
@@ -48,6 +48,7 @@
import javax.jcr.security.Privilege;
import javax.servlet.Servlet;
+import org.apache.jackrabbit.api.JackrabbitSession;
import org.apache.jackrabbit.api.security.JackrabbitAccessControlEntry;
import org.apache.jackrabbit.api.security.JackrabbitAccessControlList;
import org.apache.jackrabbit.api.security.authorization.PrincipalAccessControlList;
@@ -56,7 +57,6 @@
import org.apache.jackrabbit.oak.spi.security.authorization.restriction.RestrictionProvider;
import org.apache.jackrabbit.oak.spi.security.privilege.PrivilegeConstants;
import org.apache.sling.api.SlingHttpServletRequest;
-import org.apache.sling.jcr.base.util.AccessControlUtil;
import org.apache.sling.jcr.jackrabbit.accessmanager.LocalPrivilege;
import org.apache.sling.jcr.jackrabbit.accessmanager.LocalRestriction;
import org.apache.sling.jcr.jackrabbit.accessmanager.ModifyAce;
@@ -228,7 +228,7 @@
// Calculate a map of restriction names to the restriction definition.
// Use for fast lookup during the calls below.
Map<String, RestrictionDefinition> srMap = buildRestrictionNameToDefinitionMap(resourcePath);
- AccessControlManager acm = AccessControlUtil.getAccessControlManager(session);
+ AccessControlManager acm = session.getAccessControlManager();
Map<Privilege, Integer> privilegeLongestDepthMap = PrivilegesHelper.buildPrivilegeLongestDepthMap(acm.privilegeFromName(PrivilegeConstants.JCR_ALL));
// first calculate what is currently stored in the ace
@@ -268,7 +268,7 @@
}
// validate that the submitted name is valid
- PrincipalManager principalManager = AccessControlUtil.getPrincipalManager(jcrSession);
+ PrincipalManager principalManager = ((JackrabbitSession)jcrSession).getPrincipalManager();
Principal principal = principalManager.getPrincipal(principalId);
if (principal == null) {
throw new RepositoryException("Invalid principalId was submitted.");
@@ -276,7 +276,7 @@
validateResourcePath(jcrSession, resourcePath);
- AccessControlManager acm = AccessControlUtil.getAccessControlManager(jcrSession);
+ AccessControlManager acm = jcrSession.getAccessControlManager();
JackrabbitAccessControlList acl = getAcl(acm, resourcePath, principal);
if (acl == null) {
throw new IllegalStateException("No access control list is available so unable to process");
@@ -1020,7 +1020,7 @@
// Calculate a map of restriction names to the restriction definition.
// Use for fast lookup during the calls below.
- AccessControlManager acm = AccessControlUtil.getAccessControlManager(jcrSession);
+ AccessControlManager acm = jcrSession.getAccessControlManager();
Map<String, RestrictionDefinition> srMap = buildRestrictionNameToDefinitionMap(resourcePath);
Map<Privilege, Integer> privilegeLongestDepthMap = PrivilegesHelper.buildPrivilegeLongestDepthMap(acm.privilegeFromName(PrivilegeConstants.JCR_ALL));
@@ -1137,7 +1137,7 @@
try {
// Get or create the ACL for the node.
- AccessControlManager acm = AccessControlUtil.getAccessControlManager(jcrSession);
+ AccessControlManager acm = jcrSession.getAccessControlManager();
JackrabbitAccessControlList acl = getAcl(acm, resourcePath, principal);
// remove all the old aces for the principal
diff --git a/src/test/java/org/apache/sling/jcr/jackrabbit/accessmanager/impl/JsonConvertTest.java b/src/test/java/org/apache/sling/jcr/jackrabbit/accessmanager/impl/JsonConvertTest.java
index 9afab17..842a803 100644
--- a/src/test/java/org/apache/sling/jcr/jackrabbit/accessmanager/impl/JsonConvertTest.java
+++ b/src/test/java/org/apache/sling/jcr/jackrabbit/accessmanager/impl/JsonConvertTest.java
@@ -52,7 +52,6 @@
import org.apache.jackrabbit.oak.spi.security.principal.PrincipalImpl;
import org.apache.jackrabbit.oak.spi.security.privilege.PrivilegeConstants;
import org.apache.jackrabbit.value.ValueFactoryImpl;
-import org.apache.sling.jcr.base.util.AccessControlUtil;
import org.apache.sling.jcr.jackrabbit.accessmanager.LocalPrivilege;
import org.apache.sling.jcr.jackrabbit.accessmanager.LocalRestriction;
import org.apache.sling.testing.mock.sling.ResourceResolverType;
@@ -78,7 +77,7 @@
public void buildPrivilegesMap() throws RepositoryException {
context.registerService(new RestrictionProviderImpl());
Session session = context.resourceResolver().adaptTo(Session.class);
- acm = AccessControlUtil.getAccessControlManager(session);
+ acm = session.getAccessControlManager();
}
private Privilege priv(String privilegeName) throws RepositoryException {
diff --git a/src/test/java/org/apache/sling/jcr/jackrabbit/accessmanager/impl/PrivilegesHelperTest.java b/src/test/java/org/apache/sling/jcr/jackrabbit/accessmanager/impl/PrivilegesHelperTest.java
index e5635ea..7d897e4 100644
--- a/src/test/java/org/apache/sling/jcr/jackrabbit/accessmanager/impl/PrivilegesHelperTest.java
+++ b/src/test/java/org/apache/sling/jcr/jackrabbit/accessmanager/impl/PrivilegesHelperTest.java
@@ -47,7 +47,6 @@
import org.apache.jackrabbit.oak.spi.security.authorization.restriction.RestrictionProvider;
import org.apache.jackrabbit.oak.spi.security.privilege.PrivilegeConstants;
import org.apache.jackrabbit.value.ValueFactoryImpl;
-import org.apache.sling.jcr.base.util.AccessControlUtil;
import org.apache.sling.jcr.jackrabbit.accessmanager.LocalPrivilege;
import org.apache.sling.jcr.jackrabbit.accessmanager.LocalRestriction;
import org.apache.sling.testing.mock.sling.ResourceResolverType;
@@ -72,7 +71,7 @@
public void buildPrivilegesMap() throws RepositoryException {
context.registerService(new RestrictionProviderImpl());
Session session = context.resourceResolver().adaptTo(Session.class);
- acm = AccessControlUtil.getAccessControlManager(session);
+ acm = session.getAccessControlManager();
Privilege jcrAll = acm.privilegeFromName(PrivilegeConstants.JCR_ALL);
privilegeLongestDepthMap = PrivilegesHelper.buildPrivilegeLongestDepthMap(jcrAll);
}
diff --git a/src/test/java/org/apache/sling/jcr/jackrabbit/accessmanager/post/LocalPrivilegeTest.java b/src/test/java/org/apache/sling/jcr/jackrabbit/accessmanager/post/LocalPrivilegeTest.java
index b2d6ef4..d05ac22 100644
--- a/src/test/java/org/apache/sling/jcr/jackrabbit/accessmanager/post/LocalPrivilegeTest.java
+++ b/src/test/java/org/apache/sling/jcr/jackrabbit/accessmanager/post/LocalPrivilegeTest.java
@@ -42,7 +42,6 @@
import org.apache.jackrabbit.oak.spi.security.authorization.restriction.RestrictionProvider;
import org.apache.jackrabbit.oak.spi.security.privilege.PrivilegeConstants;
import org.apache.jackrabbit.value.ValueFactoryImpl;
-import org.apache.sling.jcr.base.util.AccessControlUtil;
import org.apache.sling.jcr.jackrabbit.accessmanager.LocalPrivilege;
import org.apache.sling.jcr.jackrabbit.accessmanager.LocalRestriction;
import org.apache.sling.testing.mock.sling.ResourceResolverType;
@@ -66,7 +65,7 @@
@Before
public void setup() throws RepositoryException {
Session session = context.resourceResolver().adaptTo(Session.class);
- acm = AccessControlUtil.getAccessControlManager(session);
+ acm = session.getAccessControlManager();
context.registerService(new RestrictionProviderImpl());
}