Skip to content

Instantly share code, notes, and snippets.

2011-08-30 09:32:04 DEBUG [t-1-thread-6438] - org.sonatype.nexus.events.NexusAuthenticationEventInspector - Sucessfully authenticated user [edburns] from IP address 148.87.19.214
2011-08-30 09:32:04 DEBUG [0-7-javadoc.jar] - org.sonatype.nexus.proxy.maven.maven2.M2Repository - getTargetsForRequest() :: snapshots:/com/sun/faces/jsf-api/2.1.3-SNAPSHOT/jsf-api-2.1.3-20110830.143150-7-javadoc.jar
2011-08-30 09:32:04 DEBUG [0-7-javadoc.jar] - org.sonatype.nexus.proxy.target.DefaultTargetRegistry - Resolving targets for repository='snapshots' for path='/com/sun/faces/jsf-api/2.1.3-SNAPSHOT/jsf-api-2.1.3-20110830.143150-7-javadoc.jar'
2011-08-30 09:32:04 DEBUG [H2DBWriter ] - com.sonatype.nexus.licensing.api.access.h2.H2DatabaseManager - UIPTracker updated for user edburns, number of records updated: 1
2011-08-30 09:32:04 DEBUG [0-7-javadoc.jar] - org.sonatype.nexus.proxy.maven.maven2.M2GroupRepository - getTargetsForRequest() :: public:/com/sun/faces/jsf-api/2.1.3-SNAPSHOT/jsf-api-2.1.3-20110830.143150-7-javado
/*
* It's not easy to test the last modified time (mtime), because 1) while checking out the file's mtime changed,
* so you have to set it before testing; 2) on different timezone and different OS, the mtime value might change,
* (I don't have too many details now, but the mtime value of files within zip is different on my machine from on
* CI Linux server).
*
* So, since I did test the mtime on my local machine and we don't care too much about the accuracy, I'm ignoring
* the mtime here.
*/
<field name="path" type="string" indexed="false" stored="true" required="true" multiValued="false"/>
<field name="subPath" type="string" indexed="false" stored="true" required="false" multiValued="false"/>
<field name="sha1" type="hash" indexed="true" stored="true" required="false" multiValued="false"/>
<!-- Number of files an archive (if it is) contains, archive of archive is only counted as 1. -->
<field name="size" type="int" indexed="false" stored="true" required="false" multiValued="false"/>
<!-- If the file is in an Archive Of Archive. -->
<field name="nested" type="boolean" indexed="true" stored="true" multiValued="false"/>
<!-- last modified timestamp of the file itself. -->
<field name="f_time" type="long" indexed="false" stored="true" multiValued="false"/>
<!-- last modified timestamp of the inner level archive containing this file. -->
juven@mac tmp$ touch a.txt
juven@mac tmp$ ls -al a.txt
-rw-r--r-- 1 juven staff 0 Aug 11 23:54 a.txt
juven@mac tmp$ date
Thu Aug 11 23:55:42 CST 2011
juven@mac tmp$ zip a.zip a.txt
adding: a.txt (stored 0%)
juven@mac tmp$ unzip -l a.zip
Archive: a.zip
Length Date Time Name
juven@mac ~$ unzip -lv ~/.m2/repository/junit/junit/4.8.2/junit-4.8.2.jar
Archive: /Users/juven/.m2/repository/junit/junit/4.8.2/junit-4.8.2.jar
Length Method Size Ratio Date Time CRC-32 Name
-------- ------ ------- ----- ---- ---- ------ ----
0 Stored 0 0% 04-08-10 13:07 00000000 META-INF/
95 Defl:N 83 13% 04-08-10 13:07 e0d91e91 META-INF/MANIFEST.MF
0 Stored 0 0% 04-08-10 13:07 00000000 junit/
0 Stored 0 0% 04-08-10 13:07 00000000 junit/extensions/
0 Stored 0 0% 04-08-10 13:07 00000000 junit/framework/
0 Stored 0 0% 04-08-10 13:07 00000000 junit/runner/
@Test
public void scanPomLicensesSingle()
throws Exception
{
Set<GavInfo> actual = scan( "pomLicenseSingle" );
Assert.assertEquals( actual.size(), 1 );
GavInfo info = (GavInfo) actual.toArray()[0];
Set<String> expectedPomLicenses = new HashSet<String>();
a|CVE-2011-0245|Buffer overflow in Apple QuickTime before 7.7 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted pict file.|9.3
b|CVE-2011-0245|VENDOR_ADVISORY|APPLE|http://lists.apple.com/archives/security-announce/2011//Aug/msg00000.html
a|CVE-2011-0246|Heap-based buffer overflow in Apple QuickTime before 7.7 on Windows allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted GIF file.|9.3
b|CVE-2011-0246|VENDOR_ADVISORY|APPLE|http://lists.apple.com/archives/security-announce/2011//Aug/msg00000.html
a|CVE-2011-0247|Multiple stack-based buffer overflows in Apple QuickTime before 7.7 on Windows allow remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted H.264 movie.|9.3
b|CVE-2011-0247|VENDOR_ADVISORY|APPLE|http://lists.apple.com/archives/security-announce/2011//Aug/msg00000.html
a|CVE-2011-0248|Stack-based buffer overflow in the QuickTime Ac
'CVE-2011-0245' 'Buffer overflow in Apple QuickTime before 7.7 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted pict file.' 9.3
'CVE-2011-0246' 'Heap-based buffer overflow in Apple QuickTime before 7.7 on Windows allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted GIF file.' 9.3
'CVE-2011-0247' 'Multiple stack-based buffer overflows in Apple QuickTime before 7.7 on Windows allow remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted H.264 movie.' 9.3
'CVE-2011-0248' 'Stack-based buffer overflow in the QuickTime ActiveX control in Apple QuickTime before 7.7 on Windows, when Internet Explorer is used, allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted QTL file.' 9.3
'CVE-2011-0249' 'Heap-based buffer overflow in Apple QuickTime before 7.7 allows remote attacker
base-url=https://maven.java.net/
nexus-username=ossrh-cli
nexus-password=*****
#group-id=com.googlecode.test
release-repository-id=releases
snapshot-repository-id=snapshots
default-group-id=public
staging-group-id=staging
staging-ruleset-id=c2316f039fcc9
var data = response.getDataTable();
// coz google does not support 'total', so we calculate it here make it show different
var total = 0;
for ( var i = 0; i < data.getNumberOfRows(); i++ ) {
total = total + data.getValue(i, 1);
}
data.addRow([
{v: 'Grand Total', p: {style: 'font-weight: bold;'} },