diff --git a/.gitignore b/.gitignore new file mode 100644 index 0000000..3d8c760 --- /dev/null +++ b/.gitignore @@ -0,0 +1 @@ +SOURCES/wagon-2.4-source-release.zip diff --git a/.maven-wagon.metadata b/.maven-wagon.metadata new file mode 100644 index 0000000..0ca9870 --- /dev/null +++ b/.maven-wagon.metadata @@ -0,0 +1 @@ +288337932a033d6de2f03acc4a6920bb343b6175 SOURCES/wagon-2.4-source-release.zip diff --git a/SOURCES/0001-Port-to-jetty-9.patch b/SOURCES/0001-Port-to-jetty-9.patch new file mode 100644 index 0000000..5a44979 --- /dev/null +++ b/SOURCES/0001-Port-to-jetty-9.patch @@ -0,0 +1,340 @@ +From a98d4de91d767519ed9f4680607d466ba170e45d Mon Sep 17 00:00:00 2001 +From: Michal Srb +Date: Wed, 27 Feb 2013 12:38:47 +0100 +Subject: [PATCH] Port to jetty 9 + +--- + wagon-provider-test/pom.xml | 30 ++++++- + .../apache/maven/wagon/http/HttpWagonTestCase.java | 97 +++++++++++----------- + 2 files changed, 78 insertions(+), 49 deletions(-) + +diff --git a/wagon-provider-test/pom.xml b/wagon-provider-test/pom.xml +index 1bc9826..efa730d 100644 +--- a/wagon-provider-test/pom.xml ++++ b/wagon-provider-test/pom.xml +@@ -51,8 +51,34 @@ under the License. + compile + + +- org.mortbay.jetty +- jetty ++ log4j ++ log4j ++ compile ++ ++ ++ org.eclipse.jetty ++ jetty-server ++ compile ++ ++ ++ org.eclipse.jetty ++ jetty-util ++ compile ++ ++ ++ org.eclipse.jetty ++ jetty-client ++ compile ++ ++ ++ org.eclipse.jetty ++ jetty-security ++ compile ++ ++ ++ org.eclipse.jetty ++ jetty-servlet ++ compile + + + +diff --git a/wagon-provider-test/src/main/java/org/apache/maven/wagon/http/HttpWagonTestCase.java b/wagon-provider-test/src/main/java/org/apache/maven/wagon/http/HttpWagonTestCase.java +index 4ee5475..96728d3 100644 +--- a/wagon-provider-test/src/main/java/org/apache/maven/wagon/http/HttpWagonTestCase.java ++++ b/wagon-provider-test/src/main/java/org/apache/maven/wagon/http/HttpWagonTestCase.java +@@ -34,20 +34,25 @@ + import org.codehaus.plexus.util.IOUtil; + import org.codehaus.plexus.util.StringOutputStream; + import org.codehaus.plexus.util.StringUtils; +-import org.mortbay.jetty.Handler; +-import org.mortbay.jetty.HttpConnection; +-import org.mortbay.jetty.Request; +-import org.mortbay.jetty.Response; +-import org.mortbay.jetty.Server; +-import org.mortbay.jetty.handler.AbstractHandler; +-import org.mortbay.jetty.handler.HandlerCollection; +-import org.mortbay.jetty.security.Constraint; +-import org.mortbay.jetty.security.ConstraintMapping; +-import org.mortbay.jetty.security.HashUserRealm; +-import org.mortbay.jetty.security.SecurityHandler; +-import org.mortbay.jetty.servlet.Context; +-import org.mortbay.jetty.servlet.DefaultServlet; +-import org.mortbay.jetty.servlet.ServletHolder; ++import org.eclipse.jetty.server.Handler; ++import org.eclipse.jetty.server.HttpConnection; ++import org.eclipse.jetty.server.HttpChannel; ++import org.eclipse.jetty.server.Request; ++import org.eclipse.jetty.server.Response; ++import org.eclipse.jetty.server.Server; ++import org.eclipse.jetty.server.NetworkConnector; ++import org.eclipse.jetty.server.UserIdentity; ++import org.eclipse.jetty.server.handler.AbstractHandler; ++import org.eclipse.jetty.server.handler.HandlerCollection; ++import org.eclipse.jetty.util.security.Constraint; ++import org.eclipse.jetty.util.security.Password; ++import org.eclipse.jetty.security.ConstraintMapping; ++import org.eclipse.jetty.security.HashLoginService; ++import org.eclipse.jetty.security.SecurityHandler; ++import org.eclipse.jetty.security.ConstraintSecurityHandler; ++import org.eclipse.jetty.servlet.ServletContextHandler; ++import org.eclipse.jetty.servlet.DefaultServlet; ++import org.eclipse.jetty.servlet.ServletHolder; + + import javax.servlet.ServletException; + import javax.servlet.ServletInputStream; +@@ -95,7 +100,7 @@ protected void setupWagonTestingFixtures() + server = new Server( 0 ); + + PutHandler putHandler = new PutHandler( repositoryDirectory ); +- server.addHandler( putHandler ); ++ server.setHandler( putHandler ); + + createContext( server, repositoryDirectory ); + +@@ -113,14 +118,14 @@ protected final int getTestRepositoryPort() + { + return 0; + } +- return server.getConnectors()[0].getLocalPort(); ++ return ((NetworkConnector) (server.getConnectors()[0])).getLocalPort(); + } + + protected void createContext( Server server, File repositoryDirectory ) + throws IOException + { +- Context root = new Context( server, "/", Context.SESSIONS ); +- root.setResourceBase( repositoryDirectory.getAbsolutePath() ); ++ ServletContextHandler root = new ServletContextHandler( server, "/", ServletContextHandler.SESSIONS ); ++ //root.setResourceBase( repositoryDirectory.getAbsolutePath() ); + ServletHolder servletHolder = new ServletHolder( new DefaultServlet() ); + root.addServlet( servletHolder, "/*" ); + } +@@ -160,7 +165,7 @@ public void testHttpHeaders() + server.start(); + + wagon.connect( +- new Repository( "id", getProtocol() + "://localhost:" + server.getConnectors()[0].getLocalPort() ) ); ++ new Repository( "id", getProtocol() + "://localhost:" + ((NetworkConnector) (server.getConnectors()[0])).getLocalPort() ) ); + + wagon.getToStream( "resource", new StringOutputStream() ); + +@@ -192,7 +197,7 @@ public void testHttpHeadersWithCommonMethods() + server.start(); + + wagon.connect( +- new Repository( "id", getProtocol() + "://localhost:" + server.getConnectors()[0].getLocalPort() ) ); ++ new Repository( "id", getProtocol() + "://localhost:" + ((NetworkConnector) (server.getConnectors()[0])).getLocalPort() ) ); + + wagon.getToStream( "resource", new StringOutputStream() ); + +@@ -211,7 +216,7 @@ protected void addConnectors( Server server ) + + protected String getRepositoryUrl( Server server ) + { +- int localPort = server.getConnectors()[0].getLocalPort(); ++ int localPort = ((NetworkConnector) (server.getConnectors()[0])).getLocalPort(); + return getProtocol() + "://localhost:" + localPort; + } + +@@ -368,7 +373,7 @@ public void testGzipGet() + Server server = new Server( getTestRepositoryPort() ); + + String localRepositoryPath = FileTestUtils.getTestOutputDir().toString(); +- Context root = new Context( server, "/", Context.SESSIONS ); ++ ServletContextHandler root = new ServletContextHandler( server, "/", ServletContextHandler.SESSIONS ); + root.setResourceBase( localRepositoryPath ); + ServletHolder servletHolder = new ServletHolder( new DefaultServlet() ); + servletHolder.setInitParameter( "gzip", "true" ); +@@ -471,7 +476,7 @@ public void testRedirectGetToStream() + protocol = "https"; + } + +- String redirectUrl = protocol + "://localhost:" + server.getConnectors()[0].getLocalPort(); ++ String redirectUrl = protocol + "://localhost:" + ((NetworkConnector) (server.getConnectors()[0])).getLocalPort(); + + RedirectHandler redirectHandler = new RedirectHandler( "Found", 303, redirectUrl, null ); + +@@ -537,7 +542,7 @@ public void testRedirectGet() + protocol = "https"; + } + +- String redirectUrl = protocol + "://localhost:" + server.getConnectors()[0].getLocalPort(); ++ String redirectUrl = protocol + "://localhost:" + ((NetworkConnector) (server.getConnectors()[0])).getLocalPort(); + + RedirectHandler redirectHandler = new RedirectHandler( "Found", 303, redirectUrl, null ); + +@@ -605,7 +610,7 @@ public void testRedirectPutFromStreamWithFullUrl() + protocol = "https"; + } + +- String redirectUrl = protocol + "://localhost:" + realServer.getConnectors()[0].getLocalPort(); ++ String redirectUrl = protocol + "://localhost:" + ((NetworkConnector) (realServer.getConnectors()[0])).getLocalPort(); + + RedirectHandler redirectHandler = new RedirectHandler( "Found", 303, redirectUrl, repositoryDirectory ); + +@@ -776,7 +781,7 @@ public void testRedirectPutFileWithFullUrl() + protocol = "https"; + } + +- String redirectUrl = protocol + "://localhost:" + realServer.getConnectors()[0].getLocalPort(); ++ String redirectUrl = protocol + "://localhost:" + ((NetworkConnector) (realServer.getConnectors()[0])).getLocalPort(); + + RedirectHandler redirectHandler = new RedirectHandler( "Found", 303, redirectUrl, repositoryDirectory ); + +@@ -901,13 +906,13 @@ public void testRedirectPutFileRelativeUrl() + this.repositoryDirectory = repositoryDirectory; + } + +- public void handle( String s, HttpServletRequest req, HttpServletResponse resp, int i ) ++ public void handle( String s, Request baseRequest, HttpServletRequest req, HttpServletResponse resp ) + throws IOException, ServletException + { + if ( req.getRequestURI().contains( "redirectRequest" ) ) + { + PutHandler putHandler = new PutHandler( this.repositoryDirectory ); +- putHandler.handle( s, req, resp, i ); ++ putHandler.handle( s, baseRequest, req, resp ); + handlerRequestResponses.add( + new HandlerRequestResponse( req.getMethod(), ( (Response) resp ).getStatus(), + req.getRequestURI() ) ); +@@ -935,7 +940,7 @@ private void runTestProxiedRequest( ProxyInfo proxyInfo, TestHeaderHandler handl + + proxyServer.start(); + +- proxyInfo.setPort( proxyServer.getConnectors()[0].getLocalPort() ); ++ proxyInfo.setPort( ((NetworkConnector) (proxyServer.getConnectors()[0])).getLocalPort() ); + + System.out.println( + "start proxy on host/port " + proxyInfo.getHost() + "/" + proxyInfo.getPort() + " with non proxyHosts " +@@ -1062,7 +1067,7 @@ public void runTestSecuredGet( AuthenticationInfo authInfo ) + + assertEquals( "top secret", IOUtil.toString( in ) ); + +- TestSecurityHandler securityHandler = (TestSecurityHandler) ( (Context) server.getHandler() ).getHandler(); ++ TestSecurityHandler securityHandler = (TestSecurityHandler) ( (ServletContextHandler) server.getHandler() ).getHandler(); + testPreemptiveAuthenticationGet( securityHandler, supportPreemptiveAuthenticationGet() ); + + } +@@ -1113,7 +1118,7 @@ public void runTestSecuredGetToStream( AuthenticationInfo authInfo ) + + assertEquals( "top secret", out.toString() ); + +- TestSecurityHandler securityHandler = (TestSecurityHandler) ( (Context) server.getHandler() ).getHandler(); ++ TestSecurityHandler securityHandler = (TestSecurityHandler) ( (ServletContextHandler) server.getHandler() ).getHandler(); + testPreemptiveAuthenticationGet( securityHandler, supportPreemptiveAuthenticationGet() ); + } + finally +@@ -1203,9 +1208,9 @@ private Server createSecurityServer( String localRepositoryPath ) + + SecurityHandler sh = createSecurityHandler(); + +- Context root = new Context( Context.SESSIONS ); ++ ServletContextHandler root = new ServletContextHandler( ServletContextHandler.SESSIONS ); + root.setContextPath( "/" ); +- root.addHandler( sh ); ++ root.setHandler( sh ); + root.setResourceBase( localRepositoryPath ); + ServletHolder servletHolder = new ServletHolder( new DefaultServlet() ); + root.addServlet( servletHolder, "/*" ); +@@ -1566,7 +1571,7 @@ public void setStatusToReturn( int status ) + this.status = status; + } + +- public void handle( String target, HttpServletRequest request, HttpServletResponse response, int dispatch ) ++ public void handle( String target, Request baseRequest, HttpServletRequest request, HttpServletResponse response ) + throws IOException, ServletException + { + if ( status != 0 ) +@@ -1622,11 +1627,11 @@ public PutHandler( File repositoryDirectory ) + this.resourceBase = repositoryDirectory; + } + +- public void handle( String target, HttpServletRequest request, HttpServletResponse response, int dispatch ) ++ public void handle( String target, Request baseRequest, HttpServletRequest request, HttpServletResponse response ) + throws IOException, ServletException + { + Request base_request = +- request instanceof Request ? (Request) request : HttpConnection.getCurrentConnection().getRequest(); ++ request instanceof Request ? (Request) request : HttpConnection.getCurrentConnection().getHttpChannel().getRequest(); + + if ( base_request.isHandled() || !"PUT".equals( base_request.getMethod() ) ) + { +@@ -1671,7 +1676,7 @@ public void handle( String target, HttpServletRequest request, HttpServletRespon + + List handlerRequestResponses = new ArrayList(); + +- public void handle( String target, HttpServletRequest request, HttpServletResponse response, int dispatch ) ++ public void handle( String target, Request baseRequest, HttpServletRequest request, HttpServletResponse response ) + throws IOException, ServletException + { + System.out.println( " handle proxy request" ); +@@ -1687,7 +1692,7 @@ public void handle( String target, HttpServletRequest request, HttpServletRespon + } + handlerRequestResponses.add( + new HandlerRequestResponse( request.getMethod(), 200, request.getRequestURI() ) ); +- super.handle( target, request, response, dispatch ); ++ super.handle( target, baseRequest, request, response ); + } + } + +@@ -1702,7 +1707,7 @@ public TestHeaderHandler() + { + } + +- public void handle( String target, HttpServletRequest request, HttpServletResponse response, int dispatch ) ++ public void handle( String target, Request baseRequest, HttpServletRequest request, HttpServletResponse response ) + throws IOException, ServletException + { + headers = new HashMap(); +@@ -1737,31 +1742,29 @@ protected TestSecurityHandler createSecurityHandler() + cm.setPathSpec( "/*" ); + + TestSecurityHandler sh = new TestSecurityHandler(); +- HashUserRealm hashUserRealm = new HashUserRealm( "MyRealm" ); +- hashUserRealm.put( "user", "secret" ); +- hashUserRealm.addUserToRole( "user", "admin" ); +- sh.setUserRealm( hashUserRealm ); ++ HashLoginService hashLoginService = new HashLoginService( "MyRealm" ); ++ hashLoginService.putUser( "user", new Password( "secret" ), new String[]{ "admin" } ); ++ sh.setLoginService( hashLoginService ); + sh.setConstraintMappings( new ConstraintMapping[]{ cm } ); + return sh; + } + + public static class TestSecurityHandler +- extends SecurityHandler ++ extends ConstraintSecurityHandler + { + + public List handlerRequestResponses = new ArrayList(); + + @Override +- public void handle( String target, HttpServletRequest request, HttpServletResponse response, int dispatch ) ++ public void handle( String target, Request baseRequest, HttpServletRequest request, HttpServletResponse response ) + throws IOException, ServletException + { + String method = request.getMethod(); +- super.handle( target, request, response, dispatch ); ++ super.handle( target, baseRequest, request, response ); + + handlerRequestResponses.add( + new HandlerRequestResponse( method, ( (Response) response ).getStatus(), request.getRequestURI() ) ); + } +- + } + + public static class HandlerRequestResponse +-- +1.8.1.2 + diff --git a/SPECS/maven-wagon.spec b/SPECS/maven-wagon.spec new file mode 100644 index 0000000..b4016c2 --- /dev/null +++ b/SPECS/maven-wagon.spec @@ -0,0 +1,245 @@ +%global bname wagon + +Name: maven-%{bname} +Version: 2.4 +Release: 3%{?dist} +Epoch: 0 +Summary: Tools to manage artifacts and deployment +License: ASL 2.0 +URL: http://maven.apache.org/wagon +Source0: http://repo1.maven.org/maven2/org/apache/maven/wagon/wagon/%{version}/wagon-%{version}-source-release.zip + +Patch0: 0001-Port-to-jetty-9.patch + +BuildArch: noarch + +BuildRequires: maven-local +BuildRequires: mvn(com.jcraft:jsch) +BuildRequires: mvn(commons-httpclient:commons-httpclient) +BuildRequires: mvn(commons-io:commons-io) +BuildRequires: mvn(commons-lang:commons-lang) +BuildRequires: mvn(commons-logging:commons-logging) +BuildRequires: mvn(commons-net:commons-net) +BuildRequires: mvn(easymock:easymock) +BuildRequires: mvn(junit:junit) +BuildRequires: mvn(log4j:log4j) +BuildRequires: mvn(nekohtml:nekohtml) +BuildRequires: mvn(org.apache.httpcomponents:httpclient) +BuildRequires: mvn(org.apache.httpcomponents:httpcore) +BuildRequires: mvn(org.apache.maven.plugins:maven-enforcer-plugin) +BuildRequires: mvn(org.apache.maven.plugins:maven-shade-plugin) +BuildRequires: mvn(org.apache.maven.scm:maven-scm-api) +BuildRequires: mvn(org.apache.maven:maven-parent) +BuildRequires: mvn(org.codehaus.plexus:plexus-component-metadata) +BuildRequires: mvn(org.codehaus.plexus:plexus-container-default) +BuildRequires: mvn(org.codehaus.plexus:plexus-interactivity-api) +BuildRequires: mvn(org.codehaus.plexus:plexus-utils) +BuildRequires: mvn(org.eclipse.jetty:jetty-client) +BuildRequires: mvn(org.eclipse.jetty:jetty-security) +BuildRequires: mvn(org.eclipse.jetty:jetty-server) +BuildRequires: mvn(org.eclipse.jetty:jetty-servlet) +BuildRequires: mvn(org.eclipse.jetty:jetty-util) +BuildRequires: mvn(org.jsoup:jsoup) +BuildRequires: mvn(org.slf4j:slf4j-api) +BuildRequires: mvn(xerces:xercesImpl) + +Obsoletes: maven-wagon-manual < %{epoch}:%{version}-%{release} + +%description +Maven Wagon is a transport abstraction that is used in Maven's +artifact and repository handling code. Currently wagon has the +following providers: +* File +* HTTP +* FTP +* SSH/SCP +* WebDAV +* SCM (in progress) + +%package provider-test +Summary: provider-test module for %{name} + +%description provider-test +provider-test module for %{name}. + +%package scm +Summary: scm module for %{name} + +%description scm +scm module for %{name}. + +%package javadoc +Summary: Javadoc for %{name} + +%description javadoc +Javadoc for %{name}. + +%prep +%setup -q -n wagon-%{version} + +%patch0 -p1 + +%pom_remove_plugin :animal-sniffer-maven-plugin +%pom_remove_dep :wagon-tck-http wagon-providers/wagon-http + +%pom_remove_dep :xercesMinimal wagon-providers/wagon-http-shared +%pom_xpath_inject "pom:dependencies" \ + " + xerces + xercesImpl + " wagon-providers/wagon-http-shared + +# correct groupId for jetty +%pom_xpath_replace "pom:groupId[text()='org.mortbay.jetty']" "org.eclipse.jetty" + +# disable tests, missing dependencies +%pom_disable_module wagon-tcks +%pom_disable_module wagon-ssh-common-test wagon-providers/pom.xml + +# missing dependencies +%pom_disable_module wagon-webdav-jackrabbit wagon-providers + +%build +%mvn_file ":wagon-{*}" %{name}/@1 + +# wagon-provider-test has dependency on jetty +%mvn_package ":wagon-provider-test" provider-test +# scm module has a lot of dependencies +%mvn_package ":wagon-scm" scm + +# tests are disabled because of missing dependencies +%mvn_build -f + +# Maven requires Wagon HTTP with classifier "shaded" +%mvn_alias :wagon-http :::shaded: + +%install +%mvn_install + +%files -f .mfiles +%doc LICENSE NOTICE DEPENDENCIES +%files provider-test -f .mfiles-provider-test +%files scm -f .mfiles-scm +%files javadoc -f .mfiles-javadoc +%doc LICENSE NOTICE DEPENDENCIES + +%changelog +* Fri Dec 27 2013 Daniel Mach - 02.4-3 +- Mass rebuild 2013-12-27 + +* Mon Sep 23 2013 Mikolaj Izdebski - 0:2.4-2.2 +- Add shaded alias for wagon-http + +* Sat Aug 03 2013 Fedora Release Engineering - 0:2.4-2 +- Rebuilt for https://fedoraproject.org/wiki/Fedora_20_Mass_Rebuild + +* Fri Jun 28 2013 Mikolaj Izdebski - 0:2.4-2 +- Rebuild to regenerate API documentation +- Resolves: CVE-2013-1571 + +* Fri Mar 01 2013 Michal Srb - 0:2.4-1 +- Port to jetty 9 + +* Thu Feb 28 2013 Mikolaj Izdebski - 0:2.4-1 +- Simplify build-requires + +* Thu Feb 14 2013 Michal Srb - 0:2.4-1 +- Update to latest upstream 2.4 +- Remove old depmap and patches +- Build with xmvn + +* Thu Feb 14 2013 Fedora Release Engineering - 0:1.0-8 +- Rebuilt for https://fedoraproject.org/wiki/Fedora_19_Mass_Rebuild + +* Wed Feb 06 2013 Java SIG - 0:1.0-7 +- Update for https://fedoraproject.org/wiki/Fedora_19_Maven_Rebuild +- Replace maven BuildRequires with maven-local + +* Tue Aug 7 2012 Mikolaj Izdebski - 0:1.0-6 +- Remove BR: ganymed-ssh2 + +* Thu Jul 19 2012 Fedora Release Engineering - 0:1.0-5 +- Rebuilt for https://fedoraproject.org/wiki/Fedora_18_Mass_Rebuild + +* Wed Apr 18 2012 Alexander Kurtakov 0:1.0-4 +- Fix build against jetty 8 and servlet 3. + +* Fri Jan 13 2012 Fedora Release Engineering - 0:1.0-3 +- Rebuilt for https://fedoraproject.org/wiki/Fedora_17_Mass_Rebuild + +* Wed Jul 27 2011 Jaromir Capik - 0:1.0-2 +- Migration from plexus-maven-plugin to plexus-containers-component-metadata + +* Wed Jul 27 2011 Alexander Kurtakov 0:1.0-1 +- Update to 1.0 final. + +* Tue Apr 26 2011 Alexander Kurtakov 0:1.0-0.3.b7.22 +- Install wagon-providers depmap too. + +* Tue Apr 26 2011 Alexander Kurtakov 0:1.0-0.3.b7.21 +- Install wagon pom depmap. +- Use maven 3 for build. + +* Tue Feb 08 2011 Fedora Release Engineering - 0:1.0-0.3.b7.1 +- Rebuilt for https://fedoraproject.org/wiki/Fedora_15_Mass_Rebuild + +* Mon Dec 13 2010 Alexander Kurtakov 0:1.0-0.2.b7.1 +- Update to beta 7. +- Adapt to current guidelines. +- Fix pom names. + +* Thu Sep 9 2010 Alexander Kurtakov 0:1.0-0.2.b6.3 +- Use javadoc:aggregate. +- Drop ant build. +- Use global instead of define. + +* Fri May 14 2010 Yong Yang 0:1.0-0.2.b6.2 +- Create patch for wagon-http-shared pom.xml + +* Wed May 12 2010 Yong Yang 0:1.0-0.2.b6.1 +- Update to beta 6, build with with_maven 1 + +* Wed Aug 19 2009 Alexander Kurtakov 0:1.0-0.2.b2.7 +- Remove gcj parts. + +* Wed Aug 19 2009 Alexander Kurtakov 0:1.0-0.2.b2.6 +- Update to beta2 - sync with jpackage. + +* Sat Jul 25 2009 Fedora Release Engineering - 0:1.0-0.3.a5.3.5 +- Rebuilt for https://fedoraproject.org/wiki/Fedora_12_Mass_Rebuild + +* Wed Feb 25 2009 Fedora Release Engineering - 0:1.0-0.2.a5.3.5 +- Rebuilt for https://fedoraproject.org/wiki/Fedora_11_Mass_Rebuild + +* Mon Dec 1 2008 Michael Schwendt - 0:1.0-0.1.a5.3.5 +- include missing dir below _docdir + +* Fri Oct 03 2008 Matt Wringe - 0:1.0-0.1.a5.3.4 +- added patch to make it compatible with the newer version of jsch + +* Wed Jul 9 2008 Tom "spot" Callaway - 0:1.0-0.1.a5.3.3 +- drop repotag +- fix license tag + +* Sat Apr 05 2008 Matt Wringe - 0:1.0-0.1.a5.3jpp.2 +- Rebuild with new version of jsch + +* Tue Mar 13 2007 Matt Wringe - 0:1.0-0.1.a5.3jpp.1 +- Merge in the changes neeeded to build without jetty +- Fix rpmlint issues +- Generate new *-build.xml files from pom.xml files as origins of + *-project files is unknown. +- Remove maven1 project.xml files from sources +- Comment out various section requiring maven or javadocs + (to be re-enabled at a future time). Note that the ant:ant task + for maven2 does not currently generate javadocs. + +* Tue Apr 04 2006 Ralph Apel - 0:1.0-0.a5.3jpp +- Require j-c-codec, to build with j-c-httpclient = 3.0 + +* Thu Dec 22 2005 Deepak Bhole - 0:1.0-0.a5.2jpp +- Commented out potentially superfluous dependencies. +- Disabled wagon-scm + +* Mon Nov 07 2005 Ralph Apel - 0:1.0-0.a5.1jpp +- First JPackage build