-
Notifications
You must be signed in to change notification settings - Fork 28
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Looking inside of a jar file and run Scancode upon the Java source files. #384
Comments
As can be seen in this example: https://github.com/fasten-project/fasten/blob/fd0e82ac5524d3b5b17c92a4a9234f7f910a5bd0/analyzer/vulnerability-packages-listener/src/test/resources/real-callable-index-message.json |
@MagielBruntink , thanks for the input. A follow-up question is:
As Sebastian @proksch mentioned about Kafka messages encapsulated, I still don't know how these messages are encapsulated.
|
It will be wrapped somewhere (this is a messy bit, tbh):
What I do is search for the
|
Hi @MagielBruntink Magiel, I am integrating the portion of code that you are suggesting here and here (I need to extract the package name and the package version, in Debian). Inside the code you mentioned, there is the |
Hi Michele, find the method here: Line 147 in 76f9997
|
I have just re-discovered this issue. xD So we did not just talk about the problems in a dev call that SIG had with the Flink sync job, but we even discussed and illustrated the ease of use of |
The Java license detector made heavy use of the messages produced by the RepoCloner. Unfortunately, modifications to the detector's code are required to adapt it to a new approach. Also, please consider that an approach that avoids the use of Flink but with a very similar implementation of the Java license detector has been carried out in Python (where the input Kafka topic is As you can imagine, the development and the deployment of the three different license detectors (Java, Python, and C) are tight to the pipeline itself, which are different between languages. Since the Java license detector was mainly developed in July, the Java pipeline in that period relied heavily on the usage of the RepoCloner. That's the main reason for having the Java license detector looking iteratively into the Kafka records consumed at the I only recently discovered, performing an analysis with @MagielBruntink, that the On the other hand, following the discussion with Magiel, we understood that having a common place where As you suggested in the last dev call, this task could be performed directly by the POM Analyzer, preventing the insertion of another plugin in the Java pipeline. This could be excellent for both |
Hi @MagielBruntink Magiel,
As the follow-up to yesterday's dev call, I tried to look at source code within the fasten-project GitHub organization running Scancode upon an unzipped Jar file containing Java source files.
Unfortunately, I couldn't find any source code related to this task.
Could you please point me out to the code you mentioned?
I appreciate any help you can provide.
M
The text was updated successfully, but these errors were encountered: