Refactoring of Security Antipatterns in Distributed Java Components

Total Page:16

File Type:pdf, Size:1020Kb

Refactoring of Security Antipatterns in Distributed Java Components Schriften aus der Fakultät Wirtschaftsinformatik und 5 Angewandte Informatik der Otto-Friedrich-Universität Bamberg Refactoring of Security Antipatterns in Distributed Java Components von Marc Schönefeld UNIVERSITY OF BAMBERG PRESS Schriften aus der Fakultät Wirtschaftsinformatik und Angewandte Informatik der Otto-Friedrich-Universität Bamberg Schriften aus der Fakultät Wirtschaftsinformatik und Angewandte Informatik der Otto-Friedrich-Universität Bamberg Band 5 University of Bamberg Press 2010 Refactoring of Security Antipatterns in Distributed Java Components von Marc Schönefeld University of Bamberg Press 2010 Bibliographische Information der Deutschen Nationalbibliothek Die Deutsche Nationalbibliothek verzeichnet diese Publikation in der Deutschen Nationalbibliographie; detaillierte bibliographische Informationen sind im Internet über http://dnb.ddb.de/ abrufbar Diese Arbeit hat der Fakultät Wirtschaftsinformatik und Angewandte Informatik der Otto-Friedrich-Universität als Dissertation vorgelegen 1. Gutachter: Prof. Dr. Guido Wirtz 2. Gutachter: Prof. Dr. Wolfgang Golubski Tag der mündlichen Prüfung: 29. Januar 2010 Dieses Werk ist als freie Onlineversion über den Hochschulschriften- Server (OPUS; http://www.opus-bayern.de/uni-bamberg/) der Uni- versitätsbibliothek Bamberg erreichbar. Kopien und Ausdrucke dür- fen nur zum privaten und sonstigen eigenen Gebrauch angefertigt werden. Herstellung und Druck: docupoint GmbH, Magdeburg Umschlaggestaltung: Dezernat Kommunikation und Alumni © University of Bamberg Press Bamberg 2010 http://www.uni-bamberg.de/ubp/ ISSN: 1867-7401 ISBN: 978-3-923507-67-2 (Druckausgabe) eISBN: 978-3-923507-68-9 (Online-Ausgabe) URN: urn:nbn:de:bvb:473-opus-2403 To my parents Regina and Roger Acknowledgments I specially thank my doctoral adviser Prof. Dr. Guido Wirtz for his valuable guidance, patience and support throughout the entire dissertation project. Thanks go to Prof. Michael Mendler, PhD, and Prof. Dr. Andreas Henrich for their support as members of the thesis committee. A special “thank you” goes to my proofreaders Len DiMaggio, Andrew Dinn, Oliver Koen, Mark Stevens, Jim Manico, Adam Gowdiak and An- toine Rios. I also thank Frank Boldewin and Levin Hiltrop for their con- structive and motivational feedback in our daily 13:37 coffee break. Further I thank Jeff Moss, Dhillon Andrew Kannabhiran, Dragos Ruiu, Marc Heuse, Dr. Ulrich Flegel and the XFocus team for giving me the opportunity to present various parts of this research to an international audience. I owe my deepest gratitude to my late grandparents, my parents Regina and Roger, my brother Malte and my best friends Minh, Kira and Tadeuz. Their understanding and encouragement provided me with an ideal envi- ronment to complete the project. Zusammenfassung Die Bedeutung der Programmiersprache JAVA als Baustein für Software- entwicklungs- und Produktionsinfrastrukturen ist im letzten Jahrzehnt stetig gestiegen. JAVA hat sich als bedeutender Baustein für die Pro- grammierung von Middleware-Lösungen etabliert. Ebenfalls evident ist die Verwendung von JAVA-Technologien zur Migration von existierenden Arbeitsplatz-Anwendungen hin zu webbasierten Einsatzszenarien. Parallel zu dieser Entwicklung hat sich die Rolle der IT-Sicherheit nicht zuletzt aufgrund der Verdrängung von mainframe-basierten Systemen hin zu verteilten Umgebungen verstärkt. Der Schutz von Vertraulichkeit, Integrität und Verfügbarkeit ist seit einigen Jahren ein kritisches Allein- stellungsmerkmal für den Markterfolg von Produkten. Verwundbarkeiten in Produkten wirken mittlerweile indirekt über kundenseitigen Vertrau- ensverlust negativ auf den wirtschaftlichen Erfolg der Softwarehersteller, zumal der Sicherheitsgrad eines Systems durch die verwundbarste Kom- ponente bestimmt wird. Ein zentrales Ziel dieser Arbeit ist die Erkenntnis zu vermitteln, dass die alleinige Nutzung einer als „sicher“ eingestuften Programmiersprache nicht als alleinige Grundlage zur Erstellung von sicheren und vertrauens- würdigen Anwendungen ausreicht. Vielmehr führt die Einbeziehung des Bedrohungsmodells der Programmiersprache zu einer verbesserten Risi- kobetrachtung, da die Angriffsfläche einer Anwendung detaillierter be- schreibbar wird. Die Entwicklung und fortschreitende Akzeptanz einer Programmier- sprache führt zu einer Verbreitung von allgemein anerkannten Lösungs- mustern zur Erfüllung wiederkehrender Qualitätsanforderungen. x Im Bereich der Dienstqualitäten fördern „Gegenmuster“, d.h. nicht- optimale Lösungen, die Entstehung von Strukturschwächen, welche in der Domäne der IT-Sicherheit „Verwundbarkeiten“ genannt werden. Des Weiteren ist die Einsatzumgebung einer Anwendung eine wichtige Ken- ngrö¨se, um eine Bedrohungsanalyse durchzuführen, denn je nach Be- schaffenheit der Bedrohungen im Zielszenario kann eine bestimmte Be- nutzeraktion eine Bedrohung darstellen, aber auch einen erwarteten An- wendungsfall charakterisieren. Während auf der Modellierungsebene ein breites Angebot von Beispie- len zur Umsetzung von Sicherheitsmustern besteht, fehlt es den Pro- grammierern auf der Implementierungsebene häufig an ganzheitlichem Verständnis. Dieses kann durch Beispiele, welche die Auswirkungen der Verwendung von „Gegenmustern“ illustrieren, vermittelt werden. Unsere Kernannahme besteht darin, dass fehlende Erfahrung der Pro- grammierer bzgl. der Sicherheitsrelevanz bei der Wahl von Implemen- tierungsmustern zur Entstehung von Verwundbarkeiten führt. Bei der Vermittlung herkömmlicher Software-Entwicklungsmodelle wird die In- tegration von praktischen Ansätzen zur Umsetzung von Sicherheitsan- forderungen zumeist nur in Meta-Modellen adressiert. Zur Erweiterung des Wirkungsgrades auf die praktische Ebene wird ein dreistufiger Ansatz präsentiert. Im ersten Teil stellen wir typische Sicherheitsprobleme von JAVA-An- wendungen in den Mittelpunkt der Betrachtung, und entwickeln einen standardisierten Katalog dieser „Gegenmuster“. Die Relevanz der einzel- nen Muster wird durch die Untersuchung des Auftretens dieser in Stan- dardprodukten verifiziert. Der zweite Untersuchungsbereich widmet sich der Integration von Vor- gehensweisen zur Identifikation und Vermeidung der „Sicherheits-Ge- genmuster“ innerhalb des Software-Entwicklungsprozesses. Hierfür wer- den zum einen Ansätze für die Analyse und Verbesserung von Imple- mentierungsergebnissen zur Verfügung gestellt. Zum anderen wird, in- xi duziert durch die verbreitete Nutzung von Fremdkomponenten, die ar- beitsintensive Auslieferungsphase mit einem Ansatz zur Erstellung ganz- heitlicher Sicherheitsrichtlinien versorgt. Da bei dieser Arbeit die praktische Verwendbarkeit der Ergebnisse eine zentrale Anforderung darstellt, wird diese durch prototypische Werkzeuge und nachvollziehbare Beispiele in einer dritten Perspektive unterstützt. Die Relevanz der Anwendung der entwickelten Methoden und Werk- zeuge auf Standardprodukte zeigt sich durch die im Laufe der Forschungs- arbeit entdeckten Sicherheitsdefizite. Die Rückmeldung bei führenden Middleware-Herstellern (Sun Microsystems, JBoss) hat durch gegensei- tigen Erfahrungsaustausch im Laufe dieser Forschungsarbeit zu einer messbaren Verringerung der Verwundbarkeit ihrer Middleware-Produkte geführt. Neben den erreichten positiven Auswirkungen bei den Herstellern der Basiskomponenten sollen Erfahrungen auch an die Architekten und Ent- wickler von Endprodukten, welche Standardkomponenten direkt oder in- direkt nutzen, weitergereicht werden. Um auch dem praktisch inter- essierten Leser einen möglichst einfachen Einstieg zu bieten, stehen die Werkzeuge mit Hilfe von Fallstudien in einem praktischen Gesamtzu- sammenhang. Die für das Tiefenverständnis notwendigen Theoriebe- standteile bieten dem Software-Architekten die Möglichkeit sicherheit- srelevante Auswirkungen einer Komponentenauswahl frühzeitig zu er- kennen und bei der Systemgestaltung zu nutzen. Abstract The importance of JAVA as a programming and execution environment has grown steadily over the past decade. Furthermore the IT industry has adapted JAVA as a major building block for the creation of new middle- ware as well as enabling technology to facilitate the migration of existing applications towards web-driven environments. Parallel in time the role of security in distributed environments has gained attention, after a large amount of middleware applications replaced enterprise-level mainframe systems. The perspectives on security Confi- dentiality, Integrity and Availability are therefore critical for the success of competiting in the market. The vulnerability level of every product is determined by the weakest embedded component, and selling vulnerable products can cause enormous economic damage to software vendors. An important goal of this work is to create the awareness that usage of a programming language, which is designed as being secure, is not suffi- cient to create secure and trustworthy distributed applications. Moreover, the incorporation of the threat model of the programming language im- proves the risk analysis by allowing a better definition of the attack surface of the application. The evolution of a programming language leads towards common pat- terns to provide reoccurring quality aspects. Suboptimal solutions, also known as "antipatterns", are typical causes that create quality weaknesses such as security vulnerabilities. Moreover, the exposure to a specific envi- ronment is an important parameter for threat analysis, as code considered secure in a specific scenario can cause unexpected risks when switching the environment. xiv Antipatterns
Recommended publications
  • BH 2017 Winter Insider.FEB.PROOF#4
    WINTER 2017 ITheNS HawkIDER the fabulous 1970s Bishop Hendricken High School Catholic Values Fostering A Tradition Of Excellence FROM THE PRESIDENT Dear Friends, As you browse through this edition of the Hawk Insider, I am sure that you’ll be amazed at the many accomplishments of our students. It The Hawk Insider is a publication could be in the academic arena, with over 140 colleges and universities of Bishop Hendricken High School, coming to speak just to our juniors and seniors, or an opportunity to a Catholic, college preparatory make radio contact with the International Space Station! Or perhaps school for young men, grades 8-12. our fabulous Arts Department, where there has been a great produc- The Insider is published by the tion of Bye, Bye, Birdie, or two of our students being selected to play in the Rose Bowl Parade! Advancement Office throughout the year for alumni and friends It could be the phenomenon that is Kwity Paye, leading his team to our 7th consecutive State of the school. Championship in football, committing to the University of Michigan, and playing in the prestigious Under Armour All-America game in Orlando! John A. Jackson '71 No matter what your area of interest, the young men of Bishop Hendricken make us proud President on a daily basis. There is no more important area than the basic mission of our school, to bring each and every member of our community into a closer relationship with God. In this Paul Danesi P'08 Vice President for Operations edition of the Hawk Insider, you will read about two initiatives, one that began last year and one this year, both spearheaded by Hendricken faculty members.
    [Show full text]
  • Highland Park Public Schools Highland Park, New Jersey Mission Statement
    HIGHLAND PARK PUBLIC SCHOOLS HIGHLAND PARK, NEW JERSEY MISSION STATEMENT The mission of the Highland Park School District is to provide the community with the finest educational services through respect for diversity and commitment to collaboration, continuous improvement, and achievement of excellence. The Highland Park Board of Education will hold a REGULAR PUBLIC MEETING on Monday, September 19, 2016, at 6:30 p.m., at the Middle School, 330 Wayne Street, Highland Park, New Jersey. This meeting will be broadcast live on hpschools.net and youtube.com. AGENDA: 1. Call to Order 2. Announcement of Notice The New Jersey Open Public Meetings Act was enacted to ensure the right of the public to have advance notice of and to attend the meetings of the public bodies at which any business affecting their interest is discussed or acted upon. In compliance with the Open Public Meeting Act, the Highland Park Board of Education has caused notice of this meeting setting forth the time, date, and location to be submitted for publication to the Home News Tribune and Star Ledger and posted on the Board’s website at least 48 hours in advance of this meeting. Members of the public who wish to address the Board will be given the opportunity to do so before the Board adjourns for the evening. 3. Roll Call 4. Recess to Executive Session Be It Resolved, pursuant to the Sunshine Act, N.J.S.A. 10:4-12 and 13, the Highland Park Board of Education will now meet in closed session to discuss litigation. This exemption is permitted to be discussed in closed session in accordance with N.J.S.A.
    [Show full text]
  • 003-011 DRE Clipper AP FINAL Copy
    GUIDE TO IN PARTNERSHIP WITH GROWTH NAVIGATING A CHANGING ECONOMY CONTENTS FOREWORDS 4-5 Introducing the guide to growth for retailers and brands AREAS FOR GROWTH 7 Product creation Do your research to create products that customers will love, and find suppliers that make the numbers stack up 8 Logistics and operations The backbone of any fashion business, and an essential touchpoint with your customer, your fulfilment must reflect your brand values 9 Branding and marketing It is easy to waste time and money chasing likes and comments, but a steady, sustained approach to social media can be more successful 10 Multichannel strategies How to make the transition from a direct-to-consumer operation to a multichannel retailer FOLLOW US FOR THE HOW TO GROW YOUR LATEST NEWS, ANALYSIS BUSINESS YOUR AND COMMENT QUESTIONS ANSWERED The Guide to Drapersonline.com Need business advice? The Growth will help Guide to Growth portal is here retailers navigate @Drapers for you to ask experts on any aspect of growing your business. the challenging @Drapersonline Go to drapersonline.com/growth times ahead For any further information Drapers Online about Drapers’ commercial content, contact Tony Mannix, Clipper Logistics Drapersonline [email protected] OCTOBER 2019 / DRAPERS 3 FOREWORDS ‘The advisory panel will provide direction for brands and retailers of all sizes’ Tony Mannix CEO, Clipper Logistics verybody’s talking about the changing shape of retail, particularly in reference to fashion. Some organisations have responded well, and others not so, E while new market entrants have created disruption and new opportunities. Clipper has long been regarded as a leader in retail logistics.
    [Show full text]
  • This Article Appeared in a Journal Published by Elsevier. the Attached Copy Is Furnished to the Author for Internal Non-Commerci
    This article appeared in a journal published by Elsevier. The attached copy is furnished to the author for internal non-commercial research and education use, including for instruction at the authors institution and sharing with colleagues. Other uses, including reproduction and distribution, or selling or licensing copies, or posting to personal, institutional or third party websites are prohibited. In most cases authors are permitted to post their version of the article (e.g. in Word or Tex form) to their personal website or institutional repository. Authors requiring further information regarding Elsevier’s archiving and manuscript policies are encouraged to visit: http://www.elsevier.com/copyright Author's personal copy Computer Languages, Systems & Structures 37 (2011) 132–150 Contents lists available at ScienceDirect Computer Languages, Systems & Structures journal homepage: www.elsevier.com/locate/cl Reconciling method overloading and dynamically typed scripting languages Alexandre Bergel à Pleiad Group, Computer Science Department (DCC), University of Chile, Santiago, Chile article info abstract Article history: The Java virtual machine (JVM) has been adopted as the executing platform by a large Received 13 July 2010 number of dynamically typed programming languages. For example, Scheme, Ruby, Received in revised form Javascript, Lisp, and Basic have been successfully implemented on the JVM and each is 28 February 2011 supported by a large community. Interoperability with Java is one important require- Accepted 15 March 2011 ment shared by all these languages. We claim that the lack of type annotation in interpreted dynamic languages makes Keywords: this interoperability either flawed or incomplete in the presence of method overloading. Multi-language system We studied 17 popular dynamically typed languages for JVM and .Net, none of them Interoperability were able to properly handle the complexity of method overloading.
    [Show full text]
  • W & H Peacock Catalogue 01 Apr 2021
    W & H Peacock Catalogue 01 Apr 2021 *1 The Oodie pizza design one size with bag *31 Selection of accessories to include scarfs, gloves, belts, etc *2 The Oodie dog design one size *32 Stillage containing mixed ladies and men's 3 Half a stillage containing mixed children's clothing clothing (approximately 85 items) ages 3 and under (approximately 200 items) *33 Selection of sportswear to include Nike, Adidas, 4 Half a stillage containing mixed children's clothing Brick Fielder, etc ages 3+ (approximately 160 items) *34 Selection of denim wear to include New Look, 5 Selection of children's accessories to include Denim Life, Levis, etc blankets, socks, bags, etc *35 Selection of Zara clothing to include jackets, tops, 6 Babymoov baby natural bag complete: large trousers, etc changing pad, insulated bottle carrier, diaper / laundry pocket, soother pocket and polar fleece *36 Selection of Shein clothing to include jackets, blanket trousers, tops, etc 7 Burberry London England hamilton icon stripe *37 Public Desire x Carms London track suit sets in panel cotton hoodie size 18 months grey and pink sizes 6 and 10 *8 Stillage containing mixed ladies and men's *38 Selection of Atlas for Men clothing to include clothing (approximately 205 items) jackets, tops and trousers *9 Selection of sportswear to include Adidas, Nike, *39 Ganni ladies horses print cotton shirt size 38 Castore, etc *40 Superdry men's wind attacker jacket together with *10 Selection of denim wear to include Levi, BDG, softball ringer top both size medium Next, etc *41 Selection
    [Show full text]
  • Java Programming Language Family Godiva Scala Processing Aspectj Groovy Javafx Script Einstein J Sharp Judoscript Jasmin Beanshell
    JAVA PROGRAMMING LANGUAGE FAMILY GODIVA SCALA PROCESSING ASPECTJ GROOVY JAVAFX SCRIPT EINSTEIN J SHARP JUDOSCRIPT JASMIN BEANSHELL PDF-33JPLFGSPAGJSEJSJJB16 | Page: 133 File Size 5,909 KB | 10 Oct, 2020 PDF File: Java Programming Language Family Godiva Scala Processing Aspectj Groovy Javafx Script 1/3 Einstein J Sharp Judoscript Jasmin Beanshell - PDF-33JPLFGSPAGJSEJSJJB16 TABLE OF CONTENT Introduction Brief Description Main Topic Technical Note Appendix Glossary PDF File: Java Programming Language Family Godiva Scala Processing Aspectj Groovy Javafx Script 2/3 Einstein J Sharp Judoscript Jasmin Beanshell - PDF-33JPLFGSPAGJSEJSJJB16 Java Programming Language Family Godiva Scala Processing Aspectj Groovy Javafx Script Einstein J Sharp Judoscript Jasmin Beanshell e-Book Name : Java Programming Language Family Godiva Scala Processing Aspectj Groovy Javafx Script Einstein J Sharp Judoscript Jasmin Beanshell - Read Java Programming Language Family Godiva Scala Processing Aspectj Groovy Javafx Script Einstein J Sharp Judoscript Jasmin Beanshell PDF on your Android, iPhone, iPad or PC directly, the following PDF file is submitted in 10 Oct, 2020, Ebook ID PDF-33JPLFGSPAGJSEJSJJB16. Download full version PDF for Java Programming Language Family Godiva Scala Processing Aspectj Groovy Javafx Script Einstein J Sharp Judoscript Jasmin Beanshell using the link below: Download: JAVA PROGRAMMING LANGUAGE FAMILY GODIVA SCALA PROCESSING ASPECTJ GROOVY JAVAFX SCRIPT EINSTEIN J SHARP JUDOSCRIPT JASMIN BEANSHELL PDF The writers of Java Programming Language Family Godiva Scala Processing Aspectj Groovy Javafx Script Einstein J Sharp Judoscript Jasmin Beanshell have made all reasonable attempts to offer latest and precise information and facts for the readers of this publication. The creators will not be held accountable for any unintentional flaws or omissions that may be found.
    [Show full text]
  • Design and Implementation of a Behaviorally Typed Programming System for Web Services
    Universidade Nova de Lisboa Faculdade de Cienciasˆ e Tecnologia Departamento de Informatica´ Dissertac¸ao˜ de Mestrado Mestrado em Engenharia Informatica´ Design and Implementation of a Behaviorally Typed Programming System for Web Services Filipe David Oliveira Militao˜ (26948) Lisboa (2008) Universidade Nova de Lisboa Faculdade de Cienciasˆ e Tecnologia Departamento de Informatica´ Dissertac¸ao˜ de Mestrado Design and Implementation of a Behaviorally Typed Programming System for Web Services Filipe David Oliveira Militao˜ (26948) Orientador: Prof. Doutor Lu´ıs Caires J ´uri Presidente: • Doutor Jos´eAlberto Cardoso e Cunha, Professor Catedratico,´ Departamento de Informatica´ da Faculdade de Cienciasˆ e Tecnologia, Universidade Nova de Lisboa. Vogais: • Doutor Francisco Martins, Professor Auxiliar, Departamento de Informatica´ da Faculdade de Ciencias,ˆ Universidade de Lisboa. • Doutor Lu´ısManuel Marques da Costa Caires, Professor Associado, Departa- mento de Informatica´ da Faculdade de Cienciasˆ e Tecnologia, Universidade Nova de Lisboa. Disserta¸c˜aoapresentada na Faculdade de Ciˆenciase Tecnologia da Uni- versidade Nova de Lisboa para a obten¸c˜aodo Grau de Mestre em En- genharia Inform´atica. Lisboa (2008) Acknowledgements This work was partially supported by a CITI/PLM/1001/2007 research grant. v Summary The growing use of the Internet as a global infrastructure for communication between dis- tributed applications is leading to the development of a considerable amount of technologies to ease the deployment, description and data exchange among services and thus improve their in- teroperability. There is also a growing interest in the use of the “software as a service” business model where a software vendor develops and hosts applications to be used by its clients over the Internet.
    [Show full text]
  • Red5 Documentation Daniel Rossi Red5 Documentation Daniel Rossi Copyright © 2007 Daniel Rossi
    Red5 Documentation Daniel Rossi Red5 Documentation Daniel Rossi Copyright © 2007 Daniel Rossi Abstract Table of Contents .................................................................................................................................. 1 .................................................................................................................................. 2 Frequently Asked Questions ................................................................................... 2 Project Management ...................................................................................... 6 Server Side Development ............................................................................... 6 Codecs/Media integration ............................................................................... 7 Client Side/API Testing ................................................................................. 7 Branding/Logo/Website .................................................................................. 7 Documentation ............................................................................................. 7 .................................................................................................................................. 9 How to build with eclipse ...................................................................................... 9 ................................................................................................................................ 10 ...............................................................................................................................
    [Show full text]
  • Castore Launches First Lifestyle Collection
    ⏲ 13 April 2021, 12:17 (CEST) Castore launches first lifestyle collection Tech Life collection introduces a range of clothing for everyday use using performance fabrics Liverpool, Tuesday April 13, 2021. FOR IMMEDIATE RELEASE: Castore builds sportswear to excel under the stresses of high intensity training, ensuring dependable performance at all times. Now we’ve taken the incredible attributes of our sportswear and applied them to a range of clothing suited to everyday use. The Tech Life collection is a capsule of key pieces essential to every wardrobe, created from the same technical performance fabrics that we use in our training collections. Each piece is designed for comfort to ensure they become instant wardrobe favourites. The collection Astoria long sleeve polo (black, navy, white) A classic long-sleeved polo created from a supersoft Pima cotton for next-to-skin comfort. We’ve done away with the placket buttons for a contemporary, minimalist look and added contrast Castore logo branding to the left chest. RRP: £60gbp Astoria short sleeve polo (black, navy, white) The short sleeved polo shirt option, using the same classic silhouette and button-free placket for an uncluttered, contemporary neckline. The softest Pima cotton delivers a beautifully soft next- to-skin feel, for all-day comfort. RRP: £55gbp Hoxton Jacket (navy, grey) Every wardrobe needs a shower proof jacket. The Hoxton is styled on the classic coach jacket silhouette with snap button fastening to the front, two hip pockets and a handy zip pocket to the left chest. We’ve built it from a hard wearing showerproof fabric featuring a high stretch for ease of movement.
    [Show full text]
  • Apache Ant User Manual Guide – Version 1.6.0 12/29/2003 9:39 AM
    Apache Ant User Manual Guide – Version 1.6.0 12/29/2003 9:39 AM Apache Ant User Manual Guide Version 1.6.0 Compiled by: Abdul Habra (www.tek271.com) From: http://ant.apache.org/ 12/2003 Copyright © 2000-2003 Apache Software Foundation. All rights Reserved. 1 of 130 Apache Ant User Manual Guide – Version 1.6.0 12/29/2003 9:39 AM 2 of 130 Apache Ant User Manual Guide – Version 1.6.0 12/29/2003 9:39 AM Contents At A Glance 1 Apache Ant User Manual Authors ............................................................................................................9 2 Feedback and Troubleshooting .............................................................................................................10 3 Introduction.........................................................................................................................................11 4 Installing Ant .......................................................................................................................................12 5 Running Ant ........................................................................................................................................18 6 Using Ant ............................................................................................................................................23 7 Concepts .............................................................................................................................................30 8 Listeners & Loggers..............................................................................................................................86
    [Show full text]
  • Accessing Application Context Listing
    19_1936_index.qxd 7/11/07 12:14 AM Page 503 INDEX A Ant BSF Support Example Accessing Application Context listing listing (7.12), 314 (10.2), 463 Ant task, Groovy, 132-133 Active File Example listing (8.20), 376 Ant Task That Compiles All Scripts Inside Active File Generator listing (8.22), 380 the Project listing (8.10), 357 active file pattern, 375 AntBuilder Example listing (7.14), 317 consequences, 375 any( ) method, Groovy, 175-177 problem, 375 any( ) Method listing (4.30), 175 sample code, 376-380 Apache Web servers, 62 solution, 375 BSF (Bean Scripting Framework), 94 Active File Template listing (8.21), 379 APIs (application programming ADD keyword, 5 interfaces), 49 addClassPath( ) method, 324 Java, 80-82 administration append( ) method, Groovy, 181-182 scripting, 328-334 append( ) Method listing (4.39), 182 scripting languages, 55-58 application scope, Web environments, 449 Administration Script Example application variable (Groovlet), 215 listing (7.17), 329 applications Advanced Ant BSF Support Example BSF (Bean Scripting Framework), 275 listing (7.13), 315 JSP (JavaServer Pages), 275-280 Advanced AntBuilder Example Xalan-J (XSLT), 280-287 listing (7.15), 320 Java, 79 Advanced Binding Example—Java web applications, 59, 61-67 Application listing (9.13), 408 ASP (Active Server Pages), 64 Advanced Groovy Programming Example games, 68-69 listing (5.22), 225 JavaScript, 65-67 AJAX (Asynchronous JavaScript And Perl, 61-62 XML), 66 PHP, 62-64 Ant build tools, 309-322 UNIX, 68 19_1936_index.qxd 7/11/07 12:14 AM Page 504 504 INDEX apply(
    [Show full text]
  • Publication DILA
    o Quarante-huitième année. – N 82 A ISSN 0298-296X Samedi 26 et dimanche 27 avril 2014 BODACCBULLETIN OFFICIEL DES ANNONCES CIVILES ET COMMERCIALES ANNEXÉ AU JOURNAL OFFICIEL DE LA RÉPUBLIQUE FRANÇAISE DIRECTION DE L’INFORMATION Standard......................................... 01-40-58-75-00 LÉGALE ET ADMINISTRATIVE Annonces....................................... 01-40-58-77-56 Accueil commercial....................... 01-40-15-70-10 26, rue Desaix, 75727 PARIS CEDEX 15 Abonnements................................. 01-40-15-67-77 www.dila.premier-ministre.gouv.fr (9 h à 12 h 30) www.bodacc.fr Télécopie........................................ 01-40-58-77-57 BODACC “A” Ventes et cessions - Créations d’établissements Procédures collectives Procédures de rétablissement personnel Avis relatifs aux successions Avis aux lecteurs Les autres catégories d’insertions sont publiées dans deux autres éditions séparées selon la répartition suivante Modifications diverses........................................ BODACC “B” Radiations ............................................................ } Avis de dépôt des comptes des sociétés ....... BODACC “C” Banque de données BODACC servie par les sociétés : Altares-D&B, EDD, Infogreffe, Questel SAS, Tessi (Defitech), Pouey International, Scores & Décisions, Les Echos, Creditsafe France, Coface Services, Cartegie, Infolegale & Marketing, France Telecom SA Kiosque Internet Entreprises, Telino, Docapost, Bureau Van Dijk EE (Bureau Van Dijk Electronic publishing), Tinubu, Data Project, Clic Formalités et Binq Media BV. Conformément à l’article 4 de l’arrêté du 17 mai 1984 relatif à la constitution et à la commercialisation d’une banque de données télématique des informations contenues dans le BODACC, le droit d’accès prévu par la loi no 78-17 du 6 janvier 1978 s’exerce auprès de la Direction de l’information légale et administrative. Le numéro : 3,80 € Abonnement.
    [Show full text]