This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
/* | |
* DefaultStaticResource resource = new DefaultStaticResource( getClass().getResource( | |
* "/static/js/nexus-user-account-plugin-all.js" ), "/js/repoServer/nexus-user-account-plugin-all.js", | |
* "application/x-javascript" ); | |
*/ | |
try | |
{ | |
DefaultStaticResource resource = new DefaultStaticResource( | |
new File( "/home/juven/js/nexus-user-account-plugin-all.js" ).toURL(), | |
"/js/repoServer/nexus-user-account-plugin-all.js", |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
2009-08-19 17:10:43 DEBUG [main ] - org.mortbay.log - Holding class org.sonatype.plexus.rest.PlexusServerServlet | |
2009-08-19 17:10:43 ERROR [main ] - org.mortbay.log - failed nexus | |
java.lang.NoClassDefFoundError: org/apache/commons/codec/binary/Base64InputStream | |
at java.lang.Class.getDeclaredConstructors0(Native Method) | |
at java.lang.Class.privateGetDeclaredConstructors(Class.java:2389) | |
at java.lang.Class.getConstructors(Class.java:1459) | |
at org.apache.xbean.recipe.ReflectionUtil.findConstructor(ReflectionUtil.java:527) | |
at org.apache.xbean.recipe.ObjectRecipe.findFactory(ObjectRecipe.java:532) | |
at org.apache.xbean.recipe.ObjectRecipe.internalCreate(ObjectRecipe.java:270) | |
at org.apache.xbean.recipe.AbstractRecipe.create(AbstractRecipe.java:96) |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
http://localhost:8081/nexus/service/local/staging/rule_sets | |
{ | |
* | |
- | |
data: [ | |
o | |
- | |
{ |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
onatype.repoServer.RulesetEditor = function( config ){ | |
var config = config || {}; | |
var defaultConfig = { | |
region: 'center', | |
width: '100%', | |
height: '100%', | |
autoScroll: true, | |
border: false, | |
frame: true, | |
collapsible: false, |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
/data/github/current/lib/github.rb:34: undefined method `env' for Rails:Module (NoMethodError) | |
from /usr/lib/ruby/1.8/rubygems/custom_require.rb:31:in `gem_original_require' | |
from /usr/lib/ruby/1.8/rubygems/custom_require.rb:31:in `require' | |
from /data/github/current/lib/rock_queue.rb:46 | |
from hooks/post-receive:14:in `require' | |
from hooks/post-receive:14 |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
var data = response.getDataTable(); | |
// coz google does not support 'total', so we calculate it here make it show different | |
var total = 0; | |
for ( var i = 0; i < data.getNumberOfRows(); i++ ) { | |
total = total + data.getValue(i, 1); | |
} | |
data.addRow([ | |
{v: 'Grand Total', p: {style: 'font-weight: bold;'} }, |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
base-url=https://maven.java.net/ | |
nexus-username=ossrh-cli | |
nexus-password=***** | |
#group-id=com.googlecode.test | |
release-repository-id=releases | |
snapshot-repository-id=snapshots | |
default-group-id=public | |
staging-group-id=staging | |
staging-ruleset-id=c2316f039fcc9 |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
'CVE-2011-0245' 'Buffer overflow in Apple QuickTime before 7.7 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted pict file.' 9.3 | |
'CVE-2011-0246' 'Heap-based buffer overflow in Apple QuickTime before 7.7 on Windows allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted GIF file.' 9.3 | |
'CVE-2011-0247' 'Multiple stack-based buffer overflows in Apple QuickTime before 7.7 on Windows allow remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted H.264 movie.' 9.3 | |
'CVE-2011-0248' 'Stack-based buffer overflow in the QuickTime ActiveX control in Apple QuickTime before 7.7 on Windows, when Internet Explorer is used, allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted QTL file.' 9.3 | |
'CVE-2011-0249' 'Heap-based buffer overflow in Apple QuickTime before 7.7 allows remote attacker |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
a|CVE-2011-0245|Buffer overflow in Apple QuickTime before 7.7 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted pict file.|9.3 | |
b|CVE-2011-0245|VENDOR_ADVISORY|APPLE|http://lists.apple.com/archives/security-announce/2011//Aug/msg00000.html | |
a|CVE-2011-0246|Heap-based buffer overflow in Apple QuickTime before 7.7 on Windows allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted GIF file.|9.3 | |
b|CVE-2011-0246|VENDOR_ADVISORY|APPLE|http://lists.apple.com/archives/security-announce/2011//Aug/msg00000.html | |
a|CVE-2011-0247|Multiple stack-based buffer overflows in Apple QuickTime before 7.7 on Windows allow remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted H.264 movie.|9.3 | |
b|CVE-2011-0247|VENDOR_ADVISORY|APPLE|http://lists.apple.com/archives/security-announce/2011//Aug/msg00000.html | |
a|CVE-2011-0248|Stack-based buffer overflow in the QuickTime Ac |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
@Test | |
public void scanPomLicensesSingle() | |
throws Exception | |
{ | |
Set<GavInfo> actual = scan( "pomLicenseSingle" ); | |
Assert.assertEquals( actual.size(), 1 ); | |
GavInfo info = (GavInfo) actual.toArray()[0]; | |
Set<String> expectedPomLicenses = new HashSet<String>(); |
OlderNewer