Skip to content

Instantly share code, notes, and snippets.

/*
* DefaultStaticResource resource = new DefaultStaticResource( getClass().getResource(
* "/static/js/nexus-user-account-plugin-all.js" ), "/js/repoServer/nexus-user-account-plugin-all.js",
* "application/x-javascript" );
*/
try
{
DefaultStaticResource resource = new DefaultStaticResource(
new File( "/home/juven/js/nexus-user-account-plugin-all.js" ).toURL(),
"/js/repoServer/nexus-user-account-plugin-all.js",
2009-08-19 17:10:43 DEBUG [main ] - org.mortbay.log - Holding class org.sonatype.plexus.rest.PlexusServerServlet
2009-08-19 17:10:43 ERROR [main ] - org.mortbay.log - failed nexus
java.lang.NoClassDefFoundError: org/apache/commons/codec/binary/Base64InputStream
at java.lang.Class.getDeclaredConstructors0(Native Method)
at java.lang.Class.privateGetDeclaredConstructors(Class.java:2389)
at java.lang.Class.getConstructors(Class.java:1459)
at org.apache.xbean.recipe.ReflectionUtil.findConstructor(ReflectionUtil.java:527)
at org.apache.xbean.recipe.ObjectRecipe.findFactory(ObjectRecipe.java:532)
at org.apache.xbean.recipe.ObjectRecipe.internalCreate(ObjectRecipe.java:270)
at org.apache.xbean.recipe.AbstractRecipe.create(AbstractRecipe.java:96)
http://localhost:8081/nexus/service/local/staging/rule_sets
{
*
-
data: [
o
-
{
onatype.repoServer.RulesetEditor = function( config ){
var config = config || {};
var defaultConfig = {
region: 'center',
width: '100%',
height: '100%',
autoScroll: true,
border: false,
frame: true,
collapsible: false,
/data/github/current/lib/github.rb:34: undefined method `env' for Rails:Module (NoMethodError)
from /usr/lib/ruby/1.8/rubygems/custom_require.rb:31:in `gem_original_require'
from /usr/lib/ruby/1.8/rubygems/custom_require.rb:31:in `require'
from /data/github/current/lib/rock_queue.rb:46
from hooks/post-receive:14:in `require'
from hooks/post-receive:14
var data = response.getDataTable();
// coz google does not support 'total', so we calculate it here make it show different
var total = 0;
for ( var i = 0; i < data.getNumberOfRows(); i++ ) {
total = total + data.getValue(i, 1);
}
data.addRow([
{v: 'Grand Total', p: {style: 'font-weight: bold;'} },
base-url=https://maven.java.net/
nexus-username=ossrh-cli
nexus-password=*****
#group-id=com.googlecode.test
release-repository-id=releases
snapshot-repository-id=snapshots
default-group-id=public
staging-group-id=staging
staging-ruleset-id=c2316f039fcc9
'CVE-2011-0245' 'Buffer overflow in Apple QuickTime before 7.7 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted pict file.' 9.3
'CVE-2011-0246' 'Heap-based buffer overflow in Apple QuickTime before 7.7 on Windows allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted GIF file.' 9.3
'CVE-2011-0247' 'Multiple stack-based buffer overflows in Apple QuickTime before 7.7 on Windows allow remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted H.264 movie.' 9.3
'CVE-2011-0248' 'Stack-based buffer overflow in the QuickTime ActiveX control in Apple QuickTime before 7.7 on Windows, when Internet Explorer is used, allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted QTL file.' 9.3
'CVE-2011-0249' 'Heap-based buffer overflow in Apple QuickTime before 7.7 allows remote attacker
a|CVE-2011-0245|Buffer overflow in Apple QuickTime before 7.7 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted pict file.|9.3
b|CVE-2011-0245|VENDOR_ADVISORY|APPLE|http://lists.apple.com/archives/security-announce/2011//Aug/msg00000.html
a|CVE-2011-0246|Heap-based buffer overflow in Apple QuickTime before 7.7 on Windows allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted GIF file.|9.3
b|CVE-2011-0246|VENDOR_ADVISORY|APPLE|http://lists.apple.com/archives/security-announce/2011//Aug/msg00000.html
a|CVE-2011-0247|Multiple stack-based buffer overflows in Apple QuickTime before 7.7 on Windows allow remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted H.264 movie.|9.3
b|CVE-2011-0247|VENDOR_ADVISORY|APPLE|http://lists.apple.com/archives/security-announce/2011//Aug/msg00000.html
a|CVE-2011-0248|Stack-based buffer overflow in the QuickTime Ac
@Test
public void scanPomLicensesSingle()
throws Exception
{
Set<GavInfo> actual = scan( "pomLicenseSingle" );
Assert.assertEquals( actual.size(), 1 );
GavInfo info = (GavInfo) actual.toArray()[0];
Set<String> expectedPomLicenses = new HashSet<String>();