Giter VIP home page Giter VIP logo

nexus-report-plugin's Introduction

nexus-report-plugin

Build Status Coverage Status

Download a statistics report of your repositories.

Compatibility Matrix

Plugin version Nexus repository version
v0.2.1 >=3.37
v0.2.0 >=3.28 and <3.37
v0.1.2 >=3.24 and <3.28
v0.1.1 >=3.24 and <3.28
v0.1.0 >=3.24 and <3.28

Build

You don't need to build the code to install the plugin, pre-built bundle is available for each version in the assets of the releases on Github.

To build the plugin by yourself, clone the repository and run mvn clean install -PbuildKar in nexus-report-plugin directory. The bundle will be availbale in nexus-report-plugin/target/ with name nexus-report-plugin-<version>-bundle.kar

Installation

Copy the .kar file in deploy/ folder of your Nexus server and restart the server.

Permission

The users needs the "nx-report-download" permission to perform this action. You can create a new role with it or add it to an existing one. Of course, an administrator has this permission by default.

Usage

Excel

If one of yours roles has the permission "nx-report-download", you should see a "Report" button (1) on the left side menu. When you click on it a list of your granted repositories will be displayed. You have the possibility to sort it (2) or filter it (3) with the field at the top-right. When you click on a repository of the list, it will download the report associated to this repository.

JSON

Since 0.1.2, it is possible to get the informations in JSON format contacting the api /service/rest/v1/report/json/. This api is available in System API on the UI, but you cannot get it directly with the "Report" button. the right "nx-report-download" and an access to the repository are needed to get the JSON report.

Examples

Excel

JSON

Curl

curl -X GET "http://localhost:8081/service/rest/v1/report/json/maven-releases" -H "accept: application/json"

Response code

200

Response headers

 content-length: 735  content-type: application/json  date: Wed, 30 Sep 2020 23:21:09 GMT  server: Nexus/3.24.0-02 (OSS)  x-content-type-options: nosniff 

Response body

[
  {
    "group": "org.sonatype.nexus.plugins",
    "name": "nexus-report-plugin",
    "version": "0.1.2",
    "format": "maven2",
    "size": 3686343,
    "sizeMB": 3.52,
    "sizeGB": 0,
    "createdBy": "admin",
    "lastUpdated": "2020-10-01T01:17:52",
    "lastDownloaded": "never",
    "encoded": "bWF2ZW4tcmVsZWFzZXM6ODg0OTFjZDFkMTg1ZGQxMzYzMjY4ZjIyMGU0NWQ3ZGU"
  },
  {
    "group": "org.sonatype.nexus",
    "name": "nexus-ui-plugin",
    "version": "3.24.0-02",
    "format": "maven2",
    "size": 5494,
    "sizeMB": 0.01,
    "sizeGB": 0,
    "createdBy": "admin",
    "lastUpdated": "2020-10-01T01:20:41",
    "lastDownloaded": "never",
    "encoded": "bWF2ZW4tcmVsZWFzZXM6YzBhYzJhYjZjNWU5M2E0YTc2Zjc5OTEwMjllMDk0Yzg"
  }
]

System/API

Team

Product Owner: Cloudehard

Developer: mat1e

Getting help

Looking to contribute to our code but need some help? There's a few ways to get information:

nexus-report-plugin's People

Contributors

hboutemy avatar mat1e avatar

Stargazers

 avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar

Watchers

 avatar  avatar  avatar  avatar  avatar

nexus-report-plugin's Issues

how to debug sonatype nexus plugin

Hello, I want to do secondary development based on this plug-in, but I'm in the local IDEA, and I don't know how to debug,I tried to add parameters to the nexus run command,IDEA tries to connect,But obviously not。

How do you develop and debug locally

image

[DepShield] (CVSS 5.3) Vulnerability due to usage of ws:5.2.3

Vulnerabilities

DepShield reports that this application's usage of ws:5.2.3 results in the following vulnerability(s):


Occurrences

ws:5.2.3 is a transitive dependency introduced by the following direct dependency(s):

jest:24.8.0
        └─ jest-cli:24.9.0
              └─ jest-config:24.9.0
                    └─ jest-environment-jsdom:24.9.0
                          └─ jsdom:11.12.0
                                └─ ws:5.2.3

This is an automated GitHub Issue created by Sonatype DepShield. Details on managing GitHub Apps, including DepShield, are available for personal and organization accounts. Please submit questions or feedback about DepShield to the Sonatype DepShield Community.

[DepShield] (CVSS 7.5) Vulnerability due to usage of acorn:5.7.4

Vulnerabilities

DepShield reports that this application's usage of acorn:5.7.4 results in the following vulnerability(s):


Occurrences

acorn:5.7.4 is a transitive dependency introduced by the following direct dependency(s):

jest:24.8.0
        └─ jest-cli:24.9.0
              └─ jest-config:24.9.0
                    └─ jest-environment-jsdom:24.9.0
                          └─ jsdom:11.12.0
                                └─ acorn:5.7.4

This is an automated GitHub Issue created by Sonatype DepShield. Details on managing GitHub Apps, including DepShield, are available for personal and organization accounts. Please submit questions or feedback about DepShield to the Sonatype DepShield Community.

[DepShield] (CVSS 5.3) Vulnerability due to usage of kind-of:5.1.0

Vulnerabilities

DepShield reports that this application's usage of kind-of:5.1.0 results in the following vulnerability(s):


Occurrences

kind-of:5.1.0 is a transitive dependency introduced by the following direct dependency(s):

sass-loader:7.1.0
        └─ clone-deep:2.0.2
              └─ shallow-clone:1.0.0
                    └─ kind-of:5.1.0

webpack:4.42.0
        └─ micromatch:3.1.10
              └─ snapdragon:0.8.2
                    └─ define-property:0.2.5
                          └─ is-descriptor:0.1.6
                                └─ kind-of:5.1.0

This is an automated GitHub Issue created by Sonatype DepShield. Details on managing GitHub Apps, including DepShield, are available for personal and organization accounts. Please submit questions or feedback about DepShield to the Sonatype DepShield Community.

[DepShield] (CVSS 7.4) Vulnerability due to usage of ini:1.3.8

Vulnerabilities

DepShield reports that this application's usage of ini:1.3.8 results in the following vulnerability(s):


Occurrences

ini:1.3.8 is a transitive dependency introduced by the following direct dependency(s):

webpack-cli:3.3.11
        └─ findup-sync:3.0.0
              └─ resolve-dir:1.0.1
                    └─ global-modules:1.0.0
                          └─ global-prefix:1.0.2
                                └─ ini:1.3.8
        └─ global-modules:2.0.0
              └─ global-prefix:3.0.0
                    └─ ini:1.3.8

This is an automated GitHub Issue created by Sonatype DepShield. Details on managing GitHub Apps, including DepShield, are available for personal and organization accounts. Please submit questions or feedback about DepShield to the Sonatype DepShield Community.

[DepShield] (CVSS 7.4) Vulnerability due to usage of lodash.assign:4.2.0

Vulnerabilities

DepShield reports that this application's usage of lodash.assign:4.2.0 results in the following vulnerability(s):


Occurrences

lodash.assign:4.2.0 is a transitive dependency introduced by the following direct dependency(s):

@sonatype/react-shared-components:1.2.1
        └─ react-commonmark:3.0.0
              └─ commonmark-react-renderer:4.3.5
                    └─ lodash.assign:4.2.0

This is an automated GitHub Issue created by Sonatype DepShield. Details on managing GitHub Apps, including DepShield, are available for personal and organization accounts. Please submit questions or feedback about DepShield to the Sonatype DepShield Community.

[DepShield] (CVSS 7.4) Vulnerability due to usage of lodash.sortby:4.7.0

Vulnerabilities

DepShield reports that this application's usage of lodash.sortby:4.7.0 results in the following vulnerability(s):


Occurrences

lodash.sortby:4.7.0 is a transitive dependency introduced by the following direct dependency(s):

jest:24.8.0
        └─ jest-cli:24.9.0
              └─ jest-config:24.9.0
                    └─ jest-environment-jsdom:24.9.0
                          └─ jsdom:11.12.0
                                └─ data-urls:1.1.0
                                      └─ whatwg-url:7.1.0
                                            └─ lodash.sortby:4.7.0
                                └─ whatwg-url:6.5.0
                                      └─ lodash.sortby:4.7.0

This is an automated GitHub Issue created by Sonatype DepShield. Details on managing GitHub Apps, including DepShield, are available for personal and organization accounts. Please submit questions or feedback about DepShield to the Sonatype DepShield Community.

[DepShield] (CVSS 7.4) Vulnerability due to usage of lodash.memoize:4.1.2

Vulnerabilities

DepShield reports that this application's usage of lodash.memoize:4.1.2 results in the following vulnerability(s):


Occurrences

lodash.memoize:4.1.2 is a transitive dependency introduced by the following direct dependency(s):

optimize-css-assets-webpack-plugin:5.0.3
        └─ cssnano:4.1.11
              └─ cssnano-preset-default:4.0.8
                    └─ postcss-merge-rules:4.0.3
                          └─ caniuse-api:3.0.0
                                └─ lodash.memoize:4.1.2

This is an automated GitHub Issue created by Sonatype DepShield. Details on managing GitHub Apps, including DepShield, are available for personal and organization accounts. Please submit questions or feedback about DepShield to the Sonatype DepShield Community.

[DepShield] (CVSS 7.5) Vulnerability due to usage of q:1.5.1

Vulnerabilities

DepShield reports that this application's usage of q:1.5.1 results in the following vulnerability(s):


Occurrences

q:1.5.1 is a transitive dependency introduced by the following direct dependency(s):

optimize-css-assets-webpack-plugin:5.0.3
        └─ cssnano:4.1.11
              └─ cssnano-preset-default:4.0.8
                    └─ postcss-svgo:4.0.3
                          └─ svgo:1.3.2
                                └─ coa:2.0.2
                                      └─ q:1.5.1

This is an automated GitHub Issue created by Sonatype DepShield. Details on managing GitHub Apps, including DepShield, are available for personal and organization accounts. Please submit questions or feedback about DepShield to the Sonatype DepShield Community.

[DepShield] (CVSS 7.5) Vulnerability due to usage of debug:2.6.9

Vulnerabilities

DepShield reports that this application's usage of debug:2.6.9 results in the following vulnerability(s):


Occurrences

debug:2.6.9 is a transitive dependency introduced by the following direct dependency(s):

webpack:4.42.0
        └─ micromatch:3.1.10
              └─ extglob:2.0.4
                    └─ expand-brackets:2.1.4
                          └─ debug:2.6.9
              └─ snapdragon:0.8.2
                    └─ debug:2.6.9

This is an automated GitHub Issue created by Sonatype DepShield. Details on managing GitHub Apps, including DepShield, are available for personal and organization accounts. Please submit questions or feedback about DepShield to the Sonatype DepShield Community.

[0.1.0] Export doesn't work when you deploy the plugin on docker image

When I deploy you plugin on our docker environnement we have the stacktrace below:
Envrionnement Docker image
OpenJDK 8 provides by Centos

org.sonatype.nexus.plugins.report.internal.rest.ReportResource - Unable to download the report dvs-integration-maven-release.xlsx
java.lang.NullPointerException: null
at sun.awt.FontConfiguration.getVersion(FontConfiguration.java:1264)
at sun.awt.FontConfiguration.readFontConfigFile(FontConfiguration.java:219)
at sun.awt.FontConfiguration.init(FontConfiguration.java:107)
at sun.awt.X11FontManager.createFontConfiguration(X11FontManager.java:774)
at sun.font.SunFontManager$2.run(SunFontManager.java:431)
at java.security.AccessController.doPrivileged(Native Method)
at sun.font.SunFontManager.(SunFontManager.java:376)
at sun.awt.FcFontManager.(FcFontManager.java:35)
at sun.awt.X11FontManager.(X11FontManager.java:57)
at sun.reflect.NativeConstructorAccessorImpl.newInstance0(Native Method)
at sun.reflect.NativeConstructorAccessorImpl.newInstance(NativeConstructorAccessorImpl.java:62)
at sun.reflect.DelegatingConstructorAccessorImpl.newInstance(DelegatingConstructorAccessorImpl.java:45)
at java.lang.reflect.Constructor.newInstance(Constructor.java:423)
at java.lang.Class.newInstance(Class.java:442)
at sun.font.FontManagerFactory$1.run(FontManagerFactory.java:83)
at java.security.AccessController.doPrivileged(Native Method)
at sun.font.FontManagerFactory.getInstance(FontManagerFactory.java:74)
at java.awt.Font.getFont2D(Font.java:491)
at java.awt.Font.canDisplayUpTo(Font.java:2060)
at java.awt.font.TextLayout.singleFont(TextLayout.java:470)
at java.awt.font.TextLayout.(TextLayout.java:531)
at org.apache.poi.ss.util.SheetUtil.getDefaultCharWidth(SheetUtil.java:273)
at org.apache.poi.ss.util.SheetUtil.getColumnWidth(SheetUtil.java:248)
at org.apache.poi.ss.util.SheetUtil.getColumnWidth(SheetUtil.java:233)
at org.apache.poi.xssf.usermodel.XSSFSheet.autoSizeColumn(XSSFSheet.java:555)
at org.apache.poi.xssf.usermodel.XSSFSheet.autoSizeColumn(XSSFSheet.java:537)
at org.sonatype.nexus.plugins.report.internal.builders.ExcelReportBuilder.buildSheet(ExcelReportBuilder.java:103)
at org.sonatype.nexus.plugins.report.internal.ReportService.downloadReport(ReportService.java:55)
at org.sonatype.nexus.plugins.report.internal.rest.ReportResource.downloadExcelReport(ReportResource.java:78)
at org.sonatype.nexus.plugins.report.internal.rest.ReportResource$$EnhancerByGuice$$5ab44a4f.CGLIB$downloadExcelReport$0()
at org.sonatype.nexus.plugins.report.internal.rest.ReportResource$$EnhancerByGuice$$5ab44a4f$$FastClassByGuice$$fdebbf92.invoke()
at com.google.inject.internal.cglib.proxy.$MethodProxy.invokeSuper(MethodProxy.java:228)
at com.google.inject.internal.InterceptorStackCallback$InterceptedMethodInvocation.proceed(InterceptorStackCallback.java:76)
at com.palominolabs.metrics.guice.ExceptionMeteredInterceptor.invoke(ExceptionMeteredInterceptor.java:23)
at com.google.inject.internal.InterceptorStackCallback$InterceptedMethodInvocation.proceed(InterceptorStackCallback.java:77)
at com.palominolabs.metrics.guice.TimedInterceptor.invoke(TimedInterceptor.java:26)
at com.google.inject.internal.InterceptorStackCallback$InterceptedMethodInvocation.proceed(InterceptorStackCallback.java:77)
at org.sonatype.nexus.validation.internal.ValidationInterceptor.invoke(ValidationInterceptor.java:53)
at com.google.inject.internal.InterceptorStackCallback$InterceptedMethodInvocation.proceed(InterceptorStackCallback.java:77)
at org.apache.shiro.guice.aop.AopAllianceMethodInvocationAdapter.proceed(AopAllianceMethodInvocationAdapter.java:49)
at org.apache.shiro.authz.aop.AuthorizingAnnotationMethodInterceptor.invoke(AuthorizingAnnotationMethodInterceptor.java:68)
at org.apache.shiro.guice.aop.AopAllianceMethodInterceptorAdapter.invoke(AopAllianceMethodInterceptorAdapter.java:36)
at com.google.inject.internal.InterceptorStackCallback$InterceptedMethodInvocation.proceed(InterceptorStackCallback.java:77)
at com.google.inject.internal.InterceptorStackCallback.intercept(InterceptorStackCallback.java:55)
at org.sonatype.nexus.plugins.report.internal.rest.ReportResource$$EnhancerByGuice$$5ab44a4f.downloadExcelReport()
at sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
at sun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
at sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
at java.lang.reflect.Method.invoke(Method.java:498)
at org.jboss.resteasy.core.MethodInjectorImpl.invoke(MethodInjectorImpl.java:140)
at org.jboss.resteasy.core.ResourceMethodInvoker.invokeOnTarget(ResourceMethodInvoker.java:294)
at org.jboss.resteasy.core.ResourceMethodInvoker.invoke(ResourceMethodInvoker.java:248)
at org.jboss.resteasy.core.ResourceMethodInvoker.invoke(ResourceMethodInvoker.java:235)
at org.jboss.resteasy.core.SynchronousDispatcher.invoke(SynchronousDispatcher.java:402)
at org.jboss.resteasy.core.SynchronousDispatcher.invoke(SynchronousDispatcher.java:209)
at org.jboss.resteasy.plugins.server.servlet.ServletContainerDispatcher.service(ServletContainerDispatcher.java:227)
at org.jboss.resteasy.plugins.server.servlet.HttpServletDispatcher.service(HttpServletDispatcher.java:56)
at org.jboss.resteasy.plugins.server.servlet.HttpServletDispatcher.service(HttpServletDispatcher.java:51)
at org.sonatype.nexus.siesta.internal.resteasy.ComponentContainerImpl.service(ComponentContainerImpl.java:109)
at org.sonatype.nexus.siesta.SiestaServlet.service(SiestaServlet.java:137)
at javax.servlet.http.HttpServlet.service(HttpServlet.java:790)
at com.google.inject.servlet.ServletDefinition.doServiceImpl(ServletDefinition.java:286)
at com.google.inject.servlet.ServletDefinition.doService(ServletDefinition.java:276)
at com.google.inject.servlet.ServletDefinition.service(ServletDefinition.java:181)
at com.google.inject.servlet.DynamicServletPipeline.service(DynamicServletPipeline.java:71)
at com.google.inject.servlet.FilterChainInvocation.doFilter(FilterChainInvocation.java:85)
at org.apache.shiro.web.servlet.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:112)
at com.google.inject.servlet.FilterChainInvocation.doFilter(FilterChainInvocation.java:82)
at org.apache.shiro.web.servlet.ProxiedFilterChain.doFilter(ProxiedFilterChain.java:61)
at org.apache.shiro.web.servlet.AdviceFilter.executeChain(AdviceFilter.java:108)
at org.apache.shiro.web.servlet.AdviceFilter.doFilterInternal(AdviceFilter.java:137)
at org.apache.shiro.web.servlet.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:125)
at org.apache.shiro.web.servlet.ProxiedFilterChain.doFilter(ProxiedFilterChain.java:66)
at org.apache.shiro.web.servlet.AdviceFilter.executeChain(AdviceFilter.java:108)
at org.apache.shiro.web.servlet.AdviceFilter.doFilterInternal(AdviceFilter.java:137)
at org.apache.shiro.web.servlet.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:125)
at org.apache.shiro.web.servlet.ProxiedFilterChain.doFilter(ProxiedFilterChain.java:66)
at org.apache.shiro.web.servlet.AdviceFilter.executeChain(AdviceFilter.java:108)
at org.apache.shiro.web.servlet.AdviceFilter.doFilterInternal(AdviceFilter.java:137)
at org.apache.shiro.web.servlet.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:125)
at org.apache.shiro.web.servlet.ProxiedFilterChain.doFilter(ProxiedFilterChain.java:66)
at org.apache.shiro.web.servlet.AbstractShiroFilter.executeChain(AbstractShiroFilter.java:449)
at org.sonatype.nexus.security.SecurityFilter.executeChain(SecurityFilter.java:85)
at org.apache.shiro.web.servlet.AbstractShiroFilter$1.call(AbstractShiroFilter.java:365)
at org.apache.shiro.subject.support.SubjectCallable.doCall(SubjectCallable.java:90)
at org.apache.shiro.subject.support.SubjectCallable.call(SubjectCallable.java:83)
at org.apache.shiro.subject.support.DelegatingSubject.execute(DelegatingSubject.java:387)
at org.apache.shiro.web.servlet.AbstractShiroFilter.doFilterInternal(AbstractShiroFilter.java:362)
at org.sonatype.nexus.security.SecurityFilter.doFilterInternal(SecurityFilter.java:101)
at org.apache.shiro.web.servlet.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:125)
at com.google.inject.servlet.FilterChainInvocation.doFilter(FilterChainInvocation.java:82)
at com.sonatype.nexus.licensing.internal.LicensingRedirectFilter.doFilter(LicensingRedirectFilter.java:116)
at com.google.inject.servlet.FilterChainInvocation.doFilter(FilterChainInvocation.java:82)
at com.codahale.metrics.servlet.AbstractInstrumentedFilter.doFilter(AbstractInstrumentedFilter.java:112)
at com.google.inject.servlet.FilterChainInvocation.doFilter(FilterChainInvocation.java:82)
at org.sonatype.nexus.internal.web.ErrorPageFilter.doFilter(ErrorPageFilter.java:79)
at com.google.inject.servlet.FilterChainInvocation.doFilter(FilterChainInvocation.java:82)
at org.sonatype.nexus.internal.web.EnvironmentFilter.doFilter(EnvironmentFilter.java:101)
at com.google.inject.servlet.FilterChainInvocation.doFilter(FilterChainInvocation.java:82)
at org.sonatype.nexus.internal.web.HeaderPatternFilter.doFilter(HeaderPatternFilter.java:98)
at com.google.inject.servlet.FilterChainInvocation.doFilter(FilterChainInvocation.java:82)
at com.google.inject.servlet.DynamicFilterPipeline.dispatch(DynamicFilterPipeline.java:104)
at com.google.inject.servlet.GuiceFilter.doFilter(GuiceFilter.java:135)
at org.sonatype.nexus.bootstrap.osgi.DelegatingFilter.doFilter(DelegatingFilter.java:73)
at org.eclipse.jetty.servlet.ServletHandler$CachedChain.doFilter(ServletHandler.java:1602)
at org.eclipse.jetty.servlet.ServletHandler.doHandle(ServletHandler.java:540)
at org.eclipse.jetty.server.handler.ScopedHandler.handle(ScopedHandler.java:146)
at org.eclipse.jetty.security.SecurityHandler.handle(SecurityHandler.java:548)
at org.eclipse.jetty.server.handler.HandlerWrapper.handle(HandlerWrapper.java:132)
at org.eclipse.jetty.server.handler.ScopedHandler.nextHandle(ScopedHandler.java:257)
at org.eclipse.jetty.server.session.SessionHandler.doHandle(SessionHandler.java:1700)
at org.eclipse.jetty.server.handler.ScopedHandler.nextHandle(ScopedHandler.java:255)
at org.eclipse.jetty.server.handler.ContextHandler.doHandle(ContextHandler.java:1345)
at org.eclipse.jetty.server.handler.ScopedHandler.nextScope(ScopedHandler.java:203)
at org.eclipse.jetty.servlet.ServletHandler.doScope(ServletHandler.java:480)
at org.eclipse.jetty.server.session.SessionHandler.doScope(SessionHandler.java:1667)
at org.eclipse.jetty.server.handler.ScopedHandler.nextScope(ScopedHandler.java:201)
at org.eclipse.jetty.server.handler.ContextHandler.doScope(ContextHandler.java:1247)
at org.eclipse.jetty.server.handler.ScopedHandler.handle(ScopedHandler.java:144)
at org.eclipse.jetty.server.handler.HandlerWrapper.handle(HandlerWrapper.java:132)
at com.codahale.metrics.jetty9.InstrumentedHandler.handle(InstrumentedHandler.java:239)
at org.eclipse.jetty.server.handler.HandlerCollection.handle(HandlerCollection.java:152)
at org.eclipse.jetty.server.handler.HandlerWrapper.handle(HandlerWrapper.java:132)
at org.eclipse.jetty.server.Server.handle(Server.java:505)
at org.eclipse.jetty.server.HttpChannel.handle(HttpChannel.java:370)
at org.eclipse.jetty.server.HttpConnection.onFillable(HttpConnection.java:267)
at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:305)
at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:103)
at org.eclipse.jetty.io.ChannelEndPoint$2.run(ChannelEndPoint.java:117)
at org.eclipse.jetty.util.thread.strategy.EatWhatYouKill.runTask(EatWhatYouKill.java:333)
at org.eclipse.jetty.util.thread.strategy.EatWhatYouKill.doProduce(EatWhatYouKill.java:310)
at org.eclipse.jetty.util.thread.strategy.EatWhatYouKill.tryProduce(EatWhatYouKill.java:168)
at org.eclipse.jetty.util.thread.strategy.EatWhatYouKill.run(EatWhatYouKill.java:126)
at org.eclipse.jetty.util.thread.ReservedThreadExecutor$ReservedThread.run(ReservedThreadExecutor.java:366)
at org.eclipse.jetty.util.thread.QueuedThreadPool.runJob(QueuedThreadPool.java:698)
at org.eclipse.jetty.util.thread.QueuedThreadPool$Runner.run(QueuedThreadPool.java:804)
at java.lang.Thread.run(Thread.java:748)

Because we doen't have the graphical library into our system your plugin cannot resize automaticatly the excel column
We try to add the JVM parameters to tell that graphical aren't install "-Djava.awt.headless=true"
But the problem persist

What is it about?

Installing this plugin would bring some statistics about how many time a package has been downloaded?
Is it compatible with docker, pypi and apt?

[DepShield] (CVSS 7.4) Vulnerability due to usage of lodash.uniq:4.5.0

Vulnerabilities

DepShield reports that this application's usage of lodash.uniq:4.5.0 results in the following vulnerability(s):


Occurrences

lodash.uniq:4.5.0 is a transitive dependency introduced by the following direct dependency(s):

optimize-css-assets-webpack-plugin:5.0.3
        └─ cssnano:4.1.11
              └─ cssnano-preset-default:4.0.8
                    └─ postcss-merge-rules:4.0.3
                          └─ caniuse-api:3.0.0
                                └─ lodash.uniq:4.5.0

This is an automated GitHub Issue created by Sonatype DepShield. Details on managing GitHub Apps, including DepShield, are available for personal and organization accounts. Please submit questions or feedback about DepShield to the Sonatype DepShield Community.

[DepShield] (CVSS 7.4) Vulnerability due to usage of lodash.tail:4.1.1

Vulnerabilities

DepShield reports that this application's usage of lodash.tail:4.1.1 results in the following vulnerability(s):


Occurrences

lodash.tail:4.1.1 is a transitive dependency introduced by the following direct dependency(s):

sass-loader:7.1.0
        └─ lodash.tail:4.1.1

This is an automated GitHub Issue created by Sonatype DepShield. Details on managing GitHub Apps, including DepShield, are available for personal and organization accounts. Please submit questions or feedback about DepShield to the Sonatype DepShield Community.

Interference with the styles in the NXRM screens

I'm assuming this is related to having two versions of the RSC library installed and the stylesheets from both versions exposed, but installing this plugin causes problems with the logging configuration screen.

image

Cannot install plugin

Hi,

Thanks for your plugin, which seems to do exactly what I was looking for ! I'm trying to install it but I'm facing an issue during the installation phase. I've put the release kar in the deploy folder and restarted my nexus instance but got the following errors logs :

2022-02-11 14:23:51,794+0100 ERROR [features-2-thread-1]  *SYSTEM java.lang.Throwable - org.apache.felix.resolver.reason.ReasonException: Unable to resolve root: missing requirement [root] osgi.identity; osgi.identity=nexus-report-plugin; type=karaf.feature; version="[0.2.1,0.2.1]"; filter:="(&(osgi.identity=nexus-report-plugin)(type=karaf.feature)(version>=0.2.1)(version<=0.2.1))" [caused by: Unable to resolve nexus-report-plugin/0.2.1: missing requirement [nexus-report-plugin/0.2.1] osgi.identity; osgi.identity=org.sonatype.nexus.plugins.nexus-report-plugin; type=osgi.bundle; version="[0.2.1,0.2.1]"; resolution:=mandatory [caused by: Unable to resolve org.sonatype.nexus.plugins.nexus-report-plugin/0.2.1: missing requirement [org.sonatype.nexus.plugins.nexus-report-plugin/0.2.1] osgi.wiring.package; filter:="(&(osgi.wiring.package=com.softwarementors.extjs.djn.config.annotations)(version>=3.37.0))"]]
2022-02-11 14:23:51,794+0100 ERROR [features-2-thread-1]  *SYSTEM java.lang.Throwable - 	at org.apache.felix.resolver.Candidates$MissingRequirementError.toException(Candidates.java:1341)
2022-02-11 14:23:51,794+0100 ERROR [features-2-thread-1]  *SYSTEM java.lang.Throwable - 	at org.apache.felix.resolver.ResolverImpl.doResolve(ResolverImpl.java:433)
2022-02-11 14:23:51,795+0100 ERROR [features-2-thread-1]  *SYSTEM java.lang.Throwable - 	at org.apache.felix.resolver.ResolverImpl.resolve(ResolverImpl.java:420)
2022-02-11 14:23:51,795+0100 ERROR [features-2-thread-1]  *SYSTEM java.lang.Throwable - 	at org.apache.felix.resolver.ResolverImpl.resolve(ResolverImpl.java:374)
2022-02-11 14:23:51,795+0100 ERROR [features-2-thread-1]  *SYSTEM java.lang.Throwable - 	at org.apache.karaf.features.internal.region.SubsystemResolver.resolve(SubsystemResolver.java:257)
2022-02-11 14:23:51,795+0100 ERROR [features-2-thread-1]  *SYSTEM java.lang.Throwable - 	at org.apache.karaf.features.internal.service.Deployer.deploy(Deployer.java:399)
2022-02-11 14:23:51,795+0100 ERROR [features-2-thread-1]  *SYSTEM java.lang.Throwable - 	at org.apache.karaf.features.internal.service.FeaturesServiceImpl.doProvision(FeaturesServiceImpl.java:1069)
2022-02-11 14:23:51,796+0100 ERROR [features-2-thread-1]  *SYSTEM java.lang.Throwable - 	at org.apache.karaf.features.internal.service.FeaturesServiceImpl.lambda$doProvisionInThread$13(FeaturesServiceImpl.java:1004)
2022-02-11 14:23:51,796+0100 ERROR [features-2-thread-1]  *SYSTEM java.lang.Throwable - 	at java.util.concurrent.FutureTask.run(FutureTask.java:266)
2022-02-11 14:23:51,796+0100 ERROR [features-2-thread-1]  *SYSTEM java.lang.Throwable - 	at java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1149)
2022-02-11 14:23:51,796+0100 ERROR [features-2-thread-1]  *SYSTEM java.lang.Throwable - 	at java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:624)
2022-02-11 14:23:51,796+0100 ERROR [features-2-thread-1]  *SYSTEM java.lang.Throwable - 	at java.lang.Thread.run(Thread.java:748)
2022-02-11 14:23:51,797+0100 ERROR [features-2-thread-1]  *SYSTEM java.lang.Throwable - Caused by: org.apache.felix.resolver.reason.ReasonException: Unable to resolve nexus-report-plugin/0.2.1: missing requirement [nexus-report-plugin/0.2.1] osgi.identity; osgi.identity=org.sonatype.nexus.plugins.nexus-report-plugin; type=osgi.bundle; version="[0.2.1,0.2.1]"; resolution:=mandatory [caused by: Unable to resolve org.sonatype.nexus.plugins.nexus-report-plugin/0.2.1: missing requirement [org.sonatype.nexus.plugins.nexus-report-plugin/0.2.1] osgi.wiring.package; filter:="(&(osgi.wiring.package=com.softwarementors.extjs.djn.config.annotations)(version>=3.37.0))"]
2022-02-11 14:23:51,797+0100 ERROR [features-2-thread-1]  *SYSTEM java.lang.Throwable - 	at org.apache.felix.resolver.Candidates$MissingRequirementError.toException(Candidates.java:1341)
2022-02-11 14:23:51,797+0100 ERROR [features-2-thread-1]  *SYSTEM java.lang.Throwable - 	... 12 more
2022-02-11 14:23:51,797+0100 ERROR [features-2-thread-1]  *SYSTEM java.lang.Throwable - Caused by: org.apache.felix.resolver.reason.ReasonException: Unable to resolve org.sonatype.nexus.plugins.nexus-report-plugin/0.2.1: missing requirement [org.sonatype.nexus.plugins.nexus-report-plugin/0.2.1] osgi.wiring.package; filter:="(&(osgi.wiring.package=com.softwarementors.extjs.djn.config.annotations)(version>=3.37.0))"
2022-02-11 14:23:51,797+0100 ERROR [features-2-thread-1]  *SYSTEM java.lang.Throwable - 	at org.apache.felix.resolver.Candidates$MissingRequirementError.toException(Candidates.java:1341)
2022-02-11 14:23:51,797+0100 ERROR [features-2-thread-1]  *SYSTEM java.lang.Throwable - 	... 13 more
2022-02-11 14:23:51,799+0100 WARN  [fileinstall-/opt/nexus/deploy]  *SYSTEM org.apache.karaf.kar.internal.KarServiceImpl - Unable to install Kar feature nexus-report-plugin/0.2.1
org.apache.felix.resolver.reason.ReasonException: Unable to resolve root: missing requirement [root] osgi.identity; osgi.identity=nexus-report-plugin; type=karaf.feature; version="[0.2.1,0.2.1]"; filter:="(&(osgi.identity=nexus-report-plugin)(type=karaf.feature)(version>=0.2.1)(version<=0.2.1))" [caused by: Unable to resolve nexus-report-plugin/0.2.1: missing requirement [nexus-report-plugin/0.2.1] osgi.identity; osgi.identity=org.sonatype.nexus.plugins.nexus-report-plugin; type=osgi.bundle; version="[0.2.1,0.2.1]"; resolution:=mandatory [caused by: Unable to resolve org.sonatype.nexus.plugins.nexus-report-plugin/0.2.1: missing requirement [org.sonatype.nexus.plugins.nexus-report-plugin/0.2.1] osgi.wiring.package; filter:="(&(osgi.wiring.package=com.softwarementors.extjs.djn.config.annotations)(version>=3.37.0))"]]
	at org.apache.felix.resolver.Candidates$MissingRequirementError.toException(Candidates.java:1341)
	at org.apache.felix.resolver.ResolverImpl.doResolve(ResolverImpl.java:433)
	at org.apache.felix.resolver.ResolverImpl.resolve(ResolverImpl.java:420)
	at org.apache.felix.resolver.ResolverImpl.resolve(ResolverImpl.java:374)
	at org.apache.karaf.features.internal.region.SubsystemResolver.resolve(SubsystemResolver.java:257)
	at org.apache.karaf.features.internal.service.Deployer.deploy(Deployer.java:399)
	at org.apache.karaf.features.internal.service.FeaturesServiceImpl.doProvision(FeaturesServiceImpl.java:1069)
	at org.apache.karaf.features.internal.service.FeaturesServiceImpl.lambda$doProvisionInThread$13(FeaturesServiceImpl.java:1004)
	at java.util.concurrent.FutureTask.run(FutureTask.java:266)
	at java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1149)
	at java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:624)
	at java.lang.Thread.run(Thread.java:748)
Caused by: org.apache.felix.resolver.reason.ReasonException: Unable to resolve nexus-report-plugin/0.2.1: missing requirement [nexus-report-plugin/0.2.1] osgi.identity; osgi.identity=org.sonatype.nexus.plugins.nexus-report-plugin; type=osgi.bundle; version="[0.2.1,0.2.1]"; resolution:=mandatory [caused by: Unable to resolve org.sonatype.nexus.plugins.nexus-report-plugin/0.2.1: missing requirement [org.sonatype.nexus.plugins.nexus-report-plugin/0.2.1] osgi.wiring.package; filter:="(&(osgi.wiring.package=com.softwarementors.extjs.djn.config.annotations)(version>=3.37.0))"]
	at org.apache.felix.resolver.Candidates$MissingRequirementError.toException(Candidates.java:1341)
	... 12 common frames omitted
Caused by: org.apache.felix.resolver.reason.ReasonException: Unable to resolve org.sonatype.nexus.plugins.nexus-report-plugin/0.2.1: missing requirement [org.sonatype.nexus.plugins.nexus-report-plugin/0.2.1] osgi.wiring.package; filter:="(&(osgi.wiring.package=com.softwarementors.extjs.djn.config.annotations)(version>=3.37.0))"
	at org.apache.felix.resolver.Candidates$MissingRequirementError.toException(Candidates.java:1341)
	... 13 common frames omitted

I'm not a Nexus expert and can't see why a dependency is missing. I'm on a manual installation (not dockerized) without any others plugins. Below is the nexus version informations (I used the 0.2.1 of your plugins which seems to be the one compatible)

version | 3.33.0-01
-- | --
edition | OSS
buildRevision | d6966dfb56cc73f77e90c1a0a493d7205b029f36
buildTimestamp | 2021-08-02-2017-39574

Thanks in advance for your help !

[DepShield] (CVSS 7.5) Vulnerability due to usage of postcss:7.0.36

Vulnerabilities

DepShield reports that this application's usage of postcss:7.0.36 results in the following vulnerability(s):


Occurrences

postcss:7.0.36 is a transitive dependency introduced by the following direct dependency(s):

css-loader:3.0.0
        └─ icss-utils:4.1.1
              └─ postcss:7.0.36
        └─ postcss:7.0.36
        └─ postcss-modules-extract-imports:2.0.0
              └─ postcss:7.0.36
        └─ postcss-modules-local-by-default:3.0.3
              └─ postcss:7.0.36
        └─ postcss-modules-scope:2.2.0
              └─ postcss:7.0.36
        └─ postcss-modules-values:3.0.0
              └─ postcss:7.0.36

optimize-css-assets-webpack-plugin:5.0.3
        └─ cssnano:4.1.11
              └─ cssnano-preset-default:4.0.8
                    └─ css-declaration-sorter:4.0.1
                          └─ postcss:7.0.36
                    └─ cssnano-util-raw-cache:4.0.1
                          └─ postcss:7.0.36
                    └─ postcss:7.0.36
                    └─ postcss-calc:7.0.5
                          └─ postcss:7.0.36
                    └─ postcss-colormin:4.0.3
                          └─ postcss:7.0.36
                    └─ postcss-convert-values:4.0.1
                          └─ postcss:7.0.36
                    └─ postcss-discard-comments:4.0.2
                          └─ postcss:7.0.36
                    └─ postcss-discard-duplicates:4.0.2
                          └─ postcss:7.0.36
                    └─ postcss-discard-empty:4.0.1
                          └─ postcss:7.0.36
                    └─ postcss-discard-overridden:4.0.1
                          └─ postcss:7.0.36
                    └─ postcss-merge-longhand:4.0.11
                          └─ postcss:7.0.36
                          └─ stylehacks:4.0.3
                                └─ postcss:7.0.36
                    └─ postcss-merge-rules:4.0.3
                          └─ postcss:7.0.36
                    └─ postcss-minify-font-values:4.0.2
                          └─ postcss:7.0.36
                    └─ postcss-minify-gradients:4.0.2
                          └─ postcss:7.0.36
                    └─ postcss-minify-params:4.0.2
                          └─ postcss:7.0.36
                    └─ postcss-minify-selectors:4.0.2
                          └─ postcss:7.0.36
                    └─ postcss-normalize-charset:4.0.1
                          └─ postcss:7.0.36
                    └─ postcss-normalize-display-values:4.0.2
                          └─ postcss:7.0.36
                    └─ postcss-normalize-positions:4.0.2
                          └─ postcss:7.0.36
                    └─ postcss-normalize-repeat-style:4.0.2
                          └─ postcss:7.0.36
                    └─ postcss-normalize-string:4.0.2
                          └─ postcss:7.0.36
                    └─ postcss-normalize-timing-functions:4.0.2
                          └─ postcss:7.0.36
                    └─ postcss-normalize-unicode:4.0.1
                          └─ postcss:7.0.36
                    └─ postcss-normalize-url:4.0.1
                          └─ postcss:7.0.36
                    └─ postcss-normalize-whitespace:4.0.2
                          └─ postcss:7.0.36
                    └─ postcss-ordered-values:4.1.2
                          └─ postcss:7.0.36
                    └─ postcss-reduce-initial:4.0.3
                          └─ postcss:7.0.36
                    └─ postcss-reduce-transforms:4.0.2
                          └─ postcss:7.0.36
                    └─ postcss-svgo:4.0.3
                          └─ postcss:7.0.36
                    └─ postcss-unique-selectors:4.0.1
                          └─ postcss:7.0.36
              └─ postcss:7.0.36

This is an automated GitHub Issue created by Sonatype DepShield. Details on managing GitHub Apps, including DepShield, are available for personal and organization accounts. Please submit questions or feedback about DepShield to the Sonatype DepShield Community.

[DepShield] (CVSS 7.5) Vulnerability due to usage of yargs-parser:5.0.1

Vulnerabilities

DepShield reports that this application's usage of yargs-parser:5.0.1 results in the following vulnerability(s):


Occurrences

yargs-parser:5.0.1 is a transitive dependency introduced by the following direct dependency(s):

node-sass:4.13.1
        └─ sass-graph:2.2.6
              └─ yargs:7.1.2
                    └─ yargs-parser:5.0.1

This is an automated GitHub Issue created by Sonatype DepShield. Details on managing GitHub Apps, including DepShield, are available for personal and organization accounts. Please submit questions or feedback about DepShield to the Sonatype DepShield Community.

[DepShield] (CVSS 7.5) Vulnerability due to usage of node-sass:4.13.1

Vulnerabilities

DepShield reports that this application's usage of node-sass:4.13.1 results in the following vulnerability(s):

This is an automated GitHub Issue created by Sonatype DepShield. Details on managing GitHub Apps, including DepShield, are available for personal and organization accounts. Please submit questions or feedback about DepShield to the Sonatype DepShield Community.

[DepShield] (CVSS 7.4) Vulnerability due to usage of lodash.isplainobject:4.0.6

Vulnerabilities

DepShield reports that this application's usage of lodash.isplainobject:4.0.6 results in the following vulnerability(s):


Occurrences

lodash.isplainobject:4.0.6 is a transitive dependency introduced by the following direct dependency(s):

@sonatype/react-shared-components:1.2.1
        └─ react-commonmark:3.0.0
              └─ commonmark-react-renderer:4.3.5
                    └─ lodash.isplainobject:4.0.6

This is an automated GitHub Issue created by Sonatype DepShield. Details on managing GitHub Apps, including DepShield, are available for personal and organization accounts. Please submit questions or feedback about DepShield to the Sonatype DepShield Community.

[DepShield] (CVSS 9.0) Vulnerability due to usage of serialize-javascript:1.9.1

Vulnerabilities

DepShield reports that this application's usage of serialize-javascript:1.9.1 results in the following vulnerability(s):


Occurrences

serialize-javascript:1.9.1 is a transitive dependency introduced by the following direct dependency(s):

terser-webpack-plugin:1.3.0
        └─ serialize-javascript:1.9.1

This is an automated GitHub Issue created by Sonatype DepShield. Details on managing GitHub Apps, including DepShield, are available for personal and organization accounts. Please submit questions or feedback about DepShield to the Sonatype DepShield Community.

[DepShield] (CVSS 5.3) Vulnerability due to usage of kind-of:3.2.2

Vulnerabilities

DepShield reports that this application's usage of kind-of:3.2.2 results in the following vulnerability(s):


Occurrences

kind-of:3.2.2 is a transitive dependency introduced by the following direct dependency(s):

webpack:4.42.0
        └─ micromatch:3.1.10
              └─ braces:2.3.2
                    └─ fill-range:4.0.0
                          └─ is-number:3.0.0
                                └─ kind-of:3.2.2
                    └─ snapdragon-node:2.1.1
                          └─ snapdragon-util:3.0.1
                                └─ kind-of:3.2.2
              └─ snapdragon:0.8.2
                    └─ base:0.11.2
                          └─ cache-base:1.0.1
                                └─ to-object-path:0.3.0
                                      └─ kind-of:3.2.2
                          └─ class-utils:0.3.6
                                └─ static-extend:0.1.2
                                      └─ object-copy:0.1.0
                                            └─ kind-of:3.2.2
                    └─ define-property:0.2.5
                          └─ is-descriptor:0.1.6
                                └─ is-accessor-descriptor:0.1.6
                                      └─ kind-of:3.2.2
                                └─ is-data-descriptor:0.1.4
                                      └─ kind-of:3.2.2

This is an automated GitHub Issue created by Sonatype DepShield. Details on managing GitHub Apps, including DepShield, are available for personal and organization accounts. Please submit questions or feedback about DepShield to the Sonatype DepShield Community.

[DepShield] (CVSS 5.3) Vulnerability due to usage of kind-of:4.0.0

Vulnerabilities

DepShield reports that this application's usage of kind-of:4.0.0 results in the following vulnerability(s):


Occurrences

kind-of:4.0.0 is a transitive dependency introduced by the following direct dependency(s):

webpack:4.42.0
        └─ micromatch:3.1.10
              └─ snapdragon:0.8.2
                    └─ base:0.11.2
                          └─ cache-base:1.0.1
                                └─ has-value:1.0.0
                                      └─ has-values:1.0.0
                                            └─ kind-of:4.0.0

This is an automated GitHub Issue created by Sonatype DepShield. Details on managing GitHub Apps, including DepShield, are available for personal and organization accounts. Please submit questions or feedback about DepShield to the Sonatype DepShield Community.

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.