请选择 进入手机版 | 继续访问电脑版
  • 设为首页
  • 点击收藏
  • 手机版
    手机扫一扫访问
    迪恩网络手机版
  • 关注官方公众号
    微信扫一扫关注
    迪恩网络公众号

kawasima/try-artifact: Try a maven artifact on demand.

原作者: [db:作者] 来自: 网络 收藏 邀请

开源软件名称(OpenSource Name):

kawasima/try-artifact

开源软件地址(OpenSource Url):

https://github.com/kawasima/try-artifact

开源编程语言(OpenSource Language):

Java 100.0%

开源软件介绍(OpenSource Introduction):

Try artifact

TryArtifact is a tool for testing a maven artifacts in the JShell.

Usage

Download from https://github.com/kawasima/try-artifact/releases/tag/v0.3.0

Start TryArtifact's JShell.

% java -jar try-artifact-0.3.0.jar

|  Welcome to JShell -- Version (version info not available)
|  Type /help for help

-> 

The /resolve command is available in the TryArtifact's JShell.

-> /help
|  Type a Java language expression, statement, or declaration.
|  Or type one of the following commands:
|  
|     /list [all|start|<name or id>]                             -- list the source you have typed
|     /edit <name or id>                                         -- edit a source entry referenced by name or id
|     /drop <name or id>                                         -- delete a source entry referenced by name or id
|     /save [all|history|start] <file>                           -- Save snippet source to a file.
|     /open <file>                                               -- open a file as source input
|     /vars                                                      -- list the declared variables and their values
|     /methods                                                   -- list the declared methods and their signatures
|     /classes                                                   -- list the declared classes
|     /imports                                                   -- list the imported items
|     /exit                                                      -- exit jshell
|     /reset                                                     -- reset jshell
|     /reload [restore] [quiet]                                  -- reset and replay relevant history -- current or previous (restore)
|     /classpath <path>                                          -- add a path to the classpath
|     /history                                                   -- history of what you have typed
|     /help [<command>|<subject>]                                -- get information about jshell
|     /set editor|start|feedback|newmode|prompt|format|field ... -- set jshell configuration information
|     /?                                                         -- get information about jshell
|     /!                                                         -- re-run last snippet
|     /<id>                                                      -- re-run snippet by id
|     /-<n>                                                      -- re-run n-th previous snippet
|     /resolve <spec>                                            -- resolve an artifact
|  
|  For more information type '/help' followed by the name of command or a subject.
|  For example '/help /list' or '/help intro'.  Subjects:
|  
|     intro     -- An introduction to the jshell tool
|     shortcuts -- Describe shortcuts

Execute the /resolve command with a artifact that you'll try. When you press TAB key, the candidates of artifacts are shown.

-> /resolve org.
org.carewebframework:org.carewebframework-parent:pom:4.0.6               org.carewebframework:org.carewebframework.amqp-parent:pom:4.0.6          org.carewebframework:org.carewebframework.api-parent:pom:4.0.6           
org.carewebframework:org.carewebframework.ext-parent:pom:4.0.6           org.carewebframework:org.carewebframework.help-parent:pom:4.0.6          org.carewebframework:org.carewebframework.jms-parent:pom:4.0.6           
org.carewebframework:org.carewebframework.lib-parent:pom:4.0.6           org.carewebframework:org.carewebframework.lib.plugin:pom:4.0.6           org.carewebframework:org.carewebframework.mvn-parent:pom:4.0.6           
org.carewebframework:org.carewebframework.ui-parent:pom:4.0.6            org.jibx.schema.org.apache.maven:org.apache.maven:pom:1.1.4              org.jibx.schema.org.docbook:org.docbook:pom:1.1.4                        
org.jibx.schema.org.hr_xml:org.hr_xml:pom:1.0.6                          org.jibx.schema.org.w3:org.w3:pom:1.1.4                                  org.jibx.schema.org.xmlsoap.schemas:org.xmlsoap.schemas:pom:1.1.4        
org.jresearch:org.jresearch.pom:pom:25                                   org.openwms:org.openwms:pom:1.0                                          org.shaneking:org.shaneking:pom:0.0.1                                    
org.smartdeveloperhub.harvester.org:org-harvester-aggregator:pom:0.1.0   org.smartdeveloperhub.harvester.org:org-harvester-container:pom:0.1.0    

When the artifact is resolved, you can be using it.

-> /resolve org.apache.commons:commons-lang3:jar:3.6
|  Path /home/kawasima/.m2/repository/org/apache/commons/commons-lang3/3.4/commons-lang3-3.4.jar added to classpath


-> org.apache.commons.lang3.RandomStringUtils.randomAlphanumeric(30)
|  Expression value is: "8D1ysKPGhHPLGpsducw0ch0SnSfixb"
|    assigned to temporary variable $1 of type String



鲜花

握手

雷人

路过

鸡蛋
该文章已有0人参与评论

请发表评论

全部评论

热门推荐
阅读排行榜
  • ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This ca

    阅读:431|2022-09-23
  • Simple Task Scheduling System v1.0 was discovered to contain a SQL injection vul

    阅读:294|2022-09-18
  • Simple Task Scheduling System v1.0 was discovered to contain a SQL injection vul

    阅读:307|2022-09-18
  • Novel-Plus v3.6.2 was discovered to contain a hard-coded JWT key located in the

    阅读:307|2022-09-18
  • Novel-Plus v3.6.2 was discovered to contain an arbitrary file download vulnerabi

    阅读:306|2022-09-18
  • Simple Task Scheduling System v1.0 was discovered to contain a SQL injection vul

    阅读:234|2022-09-18
  • An issue was discovered in the Arm Mali GPU Kernel Driver. A non-privileged user

    阅读:344|2022-09-18
  • HashiCorp Boundary up to 0.10.1 did not properly perform data integrity checks t

    阅读:250|2022-09-18
  • In D-Link DIR-816 A2_v1.10CNB04.img a command injection vulnerability occurs in

    阅读:293|2022-09-18
  • D-Link DIR-816 A2_v1.10CNB04.img is vulnerable to Command Injection via /goform/

    阅读:260|2022-09-18

扫描微信二维码

查看手机版网站

随时了解更新最新资讯

139-2527-9053

在线客服(服务时间 9:00~18:00)

在线QQ客服
地址:深圳市南山区西丽大学城创智工业园
电邮:jeky_zhao#qq.com
移动电话:139-2527-9053

Powered by 互联科技 X3.4© 2001-2213 极客世界.|Sitemap