This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
2011-08-30 09:32:04 DEBUG [t-1-thread-6438] - org.sonatype.nexus.events.NexusAuthenticationEventInspector - Sucessfully authenticated user [edburns] from IP address 148.87.19.214 | |
2011-08-30 09:32:04 DEBUG [0-7-javadoc.jar] - org.sonatype.nexus.proxy.maven.maven2.M2Repository - getTargetsForRequest() :: snapshots:/com/sun/faces/jsf-api/2.1.3-SNAPSHOT/jsf-api-2.1.3-20110830.143150-7-javadoc.jar | |
2011-08-30 09:32:04 DEBUG [0-7-javadoc.jar] - org.sonatype.nexus.proxy.target.DefaultTargetRegistry - Resolving targets for repository='snapshots' for path='/com/sun/faces/jsf-api/2.1.3-SNAPSHOT/jsf-api-2.1.3-20110830.143150-7-javadoc.jar' | |
2011-08-30 09:32:04 DEBUG [H2DBWriter ] - com.sonatype.nexus.licensing.api.access.h2.H2DatabaseManager - UIPTracker updated for user edburns, number of records updated: 1 | |
2011-08-30 09:32:04 DEBUG [0-7-javadoc.jar] - org.sonatype.nexus.proxy.maven.maven2.M2GroupRepository - getTargetsForRequest() :: public:/com/sun/faces/jsf-api/2.1.3-SNAPSHOT/jsf-api-2.1.3-20110830.143150-7-javado |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
/* | |
* It's not easy to test the last modified time (mtime), because 1) while checking out the file's mtime changed, | |
* so you have to set it before testing; 2) on different timezone and different OS, the mtime value might change, | |
* (I don't have too many details now, but the mtime value of files within zip is different on my machine from on | |
* CI Linux server). | |
* | |
* So, since I did test the mtime on my local machine and we don't care too much about the accuracy, I'm ignoring | |
* the mtime here. | |
*/ |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
<field name="path" type="string" indexed="false" stored="true" required="true" multiValued="false"/> | |
<field name="subPath" type="string" indexed="false" stored="true" required="false" multiValued="false"/> | |
<field name="sha1" type="hash" indexed="true" stored="true" required="false" multiValued="false"/> | |
<!-- Number of files an archive (if it is) contains, archive of archive is only counted as 1. --> | |
<field name="size" type="int" indexed="false" stored="true" required="false" multiValued="false"/> | |
<!-- If the file is in an Archive Of Archive. --> | |
<field name="nested" type="boolean" indexed="true" stored="true" multiValued="false"/> | |
<!-- last modified timestamp of the file itself. --> | |
<field name="f_time" type="long" indexed="false" stored="true" multiValued="false"/> | |
<!-- last modified timestamp of the inner level archive containing this file. --> |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
juven@mac tmp$ touch a.txt | |
juven@mac tmp$ ls -al a.txt | |
-rw-r--r-- 1 juven staff 0 Aug 11 23:54 a.txt | |
juven@mac tmp$ date | |
Thu Aug 11 23:55:42 CST 2011 | |
juven@mac tmp$ zip a.zip a.txt | |
adding: a.txt (stored 0%) | |
juven@mac tmp$ unzip -l a.zip | |
Archive: a.zip | |
Length Date Time Name |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
juven@mac ~$ unzip -lv ~/.m2/repository/junit/junit/4.8.2/junit-4.8.2.jar | |
Archive: /Users/juven/.m2/repository/junit/junit/4.8.2/junit-4.8.2.jar | |
Length Method Size Ratio Date Time CRC-32 Name | |
-------- ------ ------- ----- ---- ---- ------ ---- | |
0 Stored 0 0% 04-08-10 13:07 00000000 META-INF/ | |
95 Defl:N 83 13% 04-08-10 13:07 e0d91e91 META-INF/MANIFEST.MF | |
0 Stored 0 0% 04-08-10 13:07 00000000 junit/ | |
0 Stored 0 0% 04-08-10 13:07 00000000 junit/extensions/ | |
0 Stored 0 0% 04-08-10 13:07 00000000 junit/framework/ | |
0 Stored 0 0% 04-08-10 13:07 00000000 junit/runner/ |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
@Test | |
public void scanPomLicensesSingle() | |
throws Exception | |
{ | |
Set<GavInfo> actual = scan( "pomLicenseSingle" ); | |
Assert.assertEquals( actual.size(), 1 ); | |
GavInfo info = (GavInfo) actual.toArray()[0]; | |
Set<String> expectedPomLicenses = new HashSet<String>(); |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
a|CVE-2011-0245|Buffer overflow in Apple QuickTime before 7.7 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted pict file.|9.3 | |
b|CVE-2011-0245|VENDOR_ADVISORY|APPLE|http://lists.apple.com/archives/security-announce/2011//Aug/msg00000.html | |
a|CVE-2011-0246|Heap-based buffer overflow in Apple QuickTime before 7.7 on Windows allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted GIF file.|9.3 | |
b|CVE-2011-0246|VENDOR_ADVISORY|APPLE|http://lists.apple.com/archives/security-announce/2011//Aug/msg00000.html | |
a|CVE-2011-0247|Multiple stack-based buffer overflows in Apple QuickTime before 7.7 on Windows allow remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted H.264 movie.|9.3 | |
b|CVE-2011-0247|VENDOR_ADVISORY|APPLE|http://lists.apple.com/archives/security-announce/2011//Aug/msg00000.html | |
a|CVE-2011-0248|Stack-based buffer overflow in the QuickTime Ac |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
'CVE-2011-0245' 'Buffer overflow in Apple QuickTime before 7.7 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted pict file.' 9.3 | |
'CVE-2011-0246' 'Heap-based buffer overflow in Apple QuickTime before 7.7 on Windows allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted GIF file.' 9.3 | |
'CVE-2011-0247' 'Multiple stack-based buffer overflows in Apple QuickTime before 7.7 on Windows allow remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted H.264 movie.' 9.3 | |
'CVE-2011-0248' 'Stack-based buffer overflow in the QuickTime ActiveX control in Apple QuickTime before 7.7 on Windows, when Internet Explorer is used, allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted QTL file.' 9.3 | |
'CVE-2011-0249' 'Heap-based buffer overflow in Apple QuickTime before 7.7 allows remote attacker |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
base-url=https://maven.java.net/ | |
nexus-username=ossrh-cli | |
nexus-password=***** | |
#group-id=com.googlecode.test | |
release-repository-id=releases | |
snapshot-repository-id=snapshots | |
default-group-id=public | |
staging-group-id=staging | |
staging-ruleset-id=c2316f039fcc9 |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
var data = response.getDataTable(); | |
// coz google does not support 'total', so we calculate it here make it show different | |
var total = 0; | |
for ( var i = 0; i < data.getNumberOfRows(); i++ ) { | |
total = total + data.getValue(i, 1); | |
} | |
data.addRow([ | |
{v: 'Grand Total', p: {style: 'font-weight: bold;'} }, |