mounttablelib: Persist permissions to the underlying file system.

I also got rid of references to TAM's (tagged acl maps).  Also
changed acl to al everywhere I noticed since we don't have
access control lists, we have access lists.

The al's are stored as JSON to make them easy to read and also
edit if need be.

MultiPart: 1/3

TBR:  Opps, I submitted the other two...  Doing this one quickly.

Change-Id: Ia423f123f4ef4c9d3e641e01c8656148ad2208c1
diff --git a/services/mounttable/mounttablelib/versionedpermissions.go b/services/mounttable/mounttablelib/versionedpermissions.go
new file mode 100644
index 0000000..f68401f
--- /dev/null
+++ b/services/mounttable/mounttablelib/versionedpermissions.go
@@ -0,0 +1,145 @@
+// Copyright 2015 The Vanadium Authors. All rights reserved.
+// Use of this source code is governed by a BSD-style
+// license that can be found in the LICENSE file.
+
+package mounttablelib
+
+import (
+	"encoding/json"
+	"io"
+	"os"
+	"strconv"
+	"strings"
+
+	"v.io/v23/context"
+	"v.io/v23/security"
+	"v.io/v23/security/access"
+	"v.io/v23/services/mounttable"
+	"v.io/v23/verror"
+	"v.io/x/lib/vlog"
+)
+
+// VersionedPermissions associates a Version with a Permissions
+type VersionedPermissions struct {
+	V int32
+	P access.Permissions
+}
+
+func NewVersionedPermissions() *VersionedPermissions {
+	return &VersionedPermissions{P: make(access.Permissions)}
+}
+
+// Set sets the Permissions iff Version matches the current Version.  If the set happens, the Version is advanced.
+// If b is nil, this creates a new VersionedPermissions.
+func (b *VersionedPermissions) Set(ctx *context.T, verstr string, perm access.Permissions) (*VersionedPermissions, error) {
+	if b == nil {
+		b = new(VersionedPermissions)
+	}
+	if len(verstr) > 0 {
+		gen, err := strconv.ParseInt(verstr, 10, 32)
+		if err != nil {
+			return b, verror.NewErrBadVersion(ctx)
+		}
+		if gen >= 0 && int32(gen) != b.V {
+			return b, verror.NewErrBadVersion(ctx)
+		}
+	}
+	b.P = perm
+	b.V++
+	// Protect against wrap.
+	if b.V < 0 {
+		b.V = 0
+	}
+	return b, nil
+}
+
+// Get returns the current Version and Permissions.
+func (b *VersionedPermissions) Get() (string, access.Permissions) {
+	if b == nil {
+		return "", nil
+	}
+	return strconv.FormatInt(int64(b.V), 10), b.P
+}
+
+// AccessListForTag returns the current access list for the given tag.
+func (b *VersionedPermissions) AccessListForTag(tag string) (access.AccessList, bool) {
+	al, exists := b.P[tag]
+	return al, exists
+}
+
+// Copy copies the receiver.
+func (b *VersionedPermissions) Copy() *VersionedPermissions {
+	nt := new(VersionedPermissions)
+	nt.P = b.P.Copy()
+	nt.V = b.V
+	return nt
+}
+
+// Add adds the blessing pattern to the tag in the reciever.
+func (b *VersionedPermissions) Add(pattern security.BlessingPattern, tag string) {
+	b.P.Add(pattern, tag)
+}
+
+// parsePermFile reads a file and parses the contained permissions.
+func (mt *mountTable) parsePermFile(path string) error {
+	vlog.VI(2).Infof("parsePermFile(%s)", path)
+	if path == "" {
+		return nil
+	}
+	// A map from node name to permissions.
+	var pm map[string]access.Permissions
+	f, err := os.Open(path)
+	if err != nil {
+		return err
+	}
+	defer f.Close()
+	decoder := json.NewDecoder(f)
+	for {
+		if err = decoder.Decode(&pm); err != nil {
+			if err == io.EOF {
+				break
+			}
+			return err
+		}
+		for name, perms := range pm {
+			var elems []string
+			isPattern := false
+
+			// The configuration file allows patterns and also will cause the superuser to
+			// be set to the root's administrator.
+			if len(name) == 0 {
+				// If the config file has is an Admin tag on the root AccessList, the
+				// list of Admin users is the equivalent of a super user for
+				// the whole table.  Later SetPermissions do not update the set
+				// of super users.
+				if bp, exists := perms[string(mounttable.Admin)]; exists {
+					mt.superUsers = bp
+				}
+			} else {
+				// AccessList templates terminate with a %% element.  These are very
+				// constrained matches, i.e., the trailing element of the name
+				// is copied into every %% in the AccessList.
+				elems = strings.Split(name, "/")
+				if elems[len(elems)-1] == templateVar {
+					isPattern = true
+					elems = elems[:len(elems)-1]
+				}
+			}
+
+			// Create name and add the Permissions map to it.
+			n, err := mt.findNode(nil, nil, elems, true, nil)
+			if n != nil || err == nil {
+				vlog.VI(2).Infof("added perms %v to %s", perms, name)
+				if isPattern {
+					n.permsTemplate = perms
+				} else {
+					n.vPerms, _ = n.vPerms.Set(nil, "", perms)
+					n.explicitPermissions = true
+				}
+			}
+			n.parent.Unlock()
+			n.Unlock()
+		}
+	}
+	return nil
+}