All Downloads are FREE. Search and download functionalities are using the official Maven repository.

Download JAR files tagged by encoded with all dependencies

Search JAR files by class name

dkpro-jwktl from group org.dkpro.jwktl (version 1.1.0)

JWKTL (Java Wiktionary Library) is a Java-based API that enables efficient and structured access to the information encoded in the English and the German Wiktionary edition, including sense definitions, part of speech tags, etymology, example sentences, translations, semantic relations and many other lexical information types.

Group: org.dkpro.jwktl Artifact: dkpro-jwktl
Show documentation Show source 
 

2 downloads
Artifact dkpro-jwktl
Group org.dkpro.jwktl
Version 1.1.0
Last update 29. April 2016
Organization Ubiquitous Knowledge Processing (UKP) Lab
URL http://dkpro.org/jwktl/
License Apache License, Version 2.0
Dependencies amount 2
Dependencies je, ant,
There are maybe transitive dependencies!

jwktl from group de.tudarmstadt.ukp.jwktl (version 1.0.1)

JWKTL (Java Wiktionary Library) is a Java-based API that enables efficient and structured access to the information encoded in the English and the German Wiktionary edition, including sense definitions, part of speech tags, etymology, example sentences, translations, semantic relations and many other lexical information types.

Group: de.tudarmstadt.ukp.jwktl Artifact: jwktl
Show all versions Show documentation Show source 
 

2 downloads
Artifact jwktl
Group de.tudarmstadt.ukp.jwktl
Version 1.0.1
Last update 30. September 2014
Organization Ubiquitous Knowledge Processing (UKP) Lab
URL https://code.google.com/p/jwktl/
License Apache License, Version 2.0
Dependencies amount 3
Dependencies je, ant, xercesImpl,
There are maybe transitive dependencies!

jpatterns from group org.jpatterns (version 0.0.1)

Design Patterns are typically encoded into Java code in an ad-hoc fashion. They are either embedded into the names of the classes or written into the Javadocs. Unfortunately it is impossible to accurately determine a pattern based solely on the class structure without knowing the intent of the code author. JPatterns is a collection of annotations that make it easy to communicate the use of (Design)Patterns within your code to your fellow developers and your future self.

Group: org.jpatterns Artifact: jpatterns
Show documentation Show source 
 

0 downloads
Artifact jpatterns
Group org.jpatterns
Version 0.0.1
Last update 25. May 2011
Organization not specified
URL http://jpatterns.org
License The Apache Software License, Version 2.0
Dependencies amount 0
Dependencies No dependencies
There are maybe transitive dependencies!

card-management-sdk from group io.sdks (version 1.1.0)

The Shell Card Management API is REST-based and employs OAUTH 2.0,Basic and ApiKey authentication. The API endpoints accept JSON-encoded request bodies, return JSON-encoded responses and use standard HTTP response codes. All resources are located in the Shell Card Platform. The Shell Card Platform is the overall platform that encompasses all the internal Shell systems used to manage resources. The internal workings of the platform are not important when interacting with the API. However, it is worth noting that the platform uses a microservice architecture to communicate with various backend systems and some API calls are processed asynchronously. All endpoints use the POST verb for retrieving, updating, creating and deleting resources in the Shell Card Platform. The endpoints that retrieve resources from the Shell Card Platform allow flexible search parameters in the API request body.

Group: io.sdks Artifact: card-management-sdk
Show all versions Show documentation Show source 
 

0 downloads
Artifact card-management-sdk
Group io.sdks
Version 1.1.0
Last update 02. July 2024
Organization not specified
URL https://www.shell.com/
License MIT License
Dependencies amount 3
Dependencies core-interfaces, core, okhttp-client-adapter,
There are maybe transitive dependencies!

data-and-reporting-sdk from group io.sdks (version 1.0.0)

Data And Reporting product consists of API's which provides details of transaction and invoice informations about shell cards. The Shell Card Transaction and Invoice API is REST-based and employs Basic authentication in Version 1 and Oauth authentication in Version 2 end points. The API endpoints accept JSON-encoded request bodies, return JSON-encoded responses and use standard HTTP response codes. All resources are located in the Shell Card Platform. The Shell Card Platform is the overall platform that encompasses all the internal Shell systems used to manage resources.

Group: io.sdks Artifact: data-and-reporting-sdk
Show documentation Show source 
 

0 downloads
Artifact data-and-reporting-sdk
Group io.sdks
Version 1.0.0
Last update 28. May 2024
Organization not specified
URL https://www.shell.com/
License MIT License
Dependencies amount 3
Dependencies core-interfaces, core, okhttp-client-adapter,
There are maybe transitive dependencies!

sbscl from group org.draegerlab (version 2.1)

The Systems Biology Simulation Core Library provides an efficient and exhaustive Java™ implementation of methods to interpret the content of models encoded in the Systems Biology Markup Language (SBML) and its numerical solution. This library is based on the JSBML project. It can be used on every operating system for which a Java Virtual Machine is available. Version 2.0 and beyond support simulation in three frameworks: constraint-based analysis, stochastic simulation, and ordinary differential equation systems. SBSCL supports SED-ML and COMBINE archives in OMEX format.

Group: org.draegerlab Artifact: sbscl
Show documentation Show source 
 

0 downloads
Artifact sbscl
Group org.draegerlab
Version 2.1
Last update 20. April 2021
Organization not specified
URL https://github.com/draeger-lab/SBSCL/
License GNU Lesser General Public License
Dependencies amount 14
Dependencies junit, jsbml, jdom2, jmathml, jlibsedml, commons-math, commons-lang3, jfreechart, colt, SCPSolver, GLPKSolverPack, LPSOLVESolverPack, libkisao, CombineArchive,
There are maybe transitive dependencies!

ks-server-http from group eu.fbk.knowledgestore (version 1.7.1)

The HTTP server module (ks-server-http) implements the Web API of the KnowledgeStore, which includes the two CRUD and SPARQL endpoints. The CRUD Endpoint supports the retrieval and manipulation of semi-structured data about resource, mention, entity and axiom records (encoded in RDF, possibly using JSONLD), and the upload / download of resource representation. The SPARQL Endpoint supports SPARQL SELECT, CONSTRUCT, DESCRIBE and ASK queries according to the W3C SPARQL protocol. The two endpoints are implemented on top of a component implementing the KnowledgeStore Java API (the Store interface), which can be either the the KnowledgeStore frontend (ks-frontend) or the Java Client. The implementation of the module is based on the Jetty Web sever (run in embedded mode) and the Jersey JAX-RS implementation. Reference documentation of the Web API is automatically generated using the Enunciate tool.

Group: eu.fbk.knowledgestore Artifact: ks-server-http
Show all versions Show documentation Show source 
 

1 downloads
Artifact ks-server-http
Group eu.fbk.knowledgestore
Version 1.7.1
Last update 08. October 2015
Organization not specified
URL http://knowledgestore.fbk.eu/ks-server-http/
License not specified
Dependencies amount 21
Dependencies slf4j-api, guava, sesame-model, jetty-server, jetty-jmx, jetty-webapp, jetty-security, jetty-util, javax.servlet-api, javax.ws.rs-api, jersey-server, jersey-common, jersey-media-multipart, jersey-mvc, jersey-mvc-mustache, logback-access, sesame-query, ks-core, ks-server, rdfpro-core, sesame-rio-api,
There are maybe transitive dependencies!

drools-compiler from group drools (version 3.0.4)

JBoss Rules provides an open source and standards-based business rules engine that enables easy business policy access, change and management. JBoss Rules is a fast and highly efficient rules engine that makes it easy for a business analyst or auditor to view your business rules as encoded in your IT application infrastructure to verify that the encoded rules indeed implement the documented business policies. JBoss Rules also supports a variety of language and decision table inputs, making it easy to quickly modify your business policies to respond to opportunities and competitive threats.

Group: drools Artifact: drools-compiler

 

0 downloads
Artifact drools-compiler
Group drools
Version 3.0.4
Last update 31. January 2007
Organization not specified
URL http://www.jboss.com/products/rules
License Apache License, Version 2.0
Dependencies amount 6
Dependencies drools-core, commons-jci-core, commons-logging-api, commons-lang, stringtemplate, antlr,
There are maybe transitive dependencies!

drools-decisiontables from group drools (version 3.0.4)

JBoss Rules provides an open source and standards-based business rules engine that enables easy business policy access, change and management. JBoss Rules is a fast and highly efficient rules engine that makes it easy for a business analyst or auditor to view your business rules as encoded in your IT application infrastructure to verify that the encoded rules indeed implement the documented business policies. JBoss Rules also supports a variety of language and decision table inputs, making it easy to quickly modify your business policies to respond to opportunities and competitive threats.

Group: drools Artifact: drools-decisiontables
Show all versions 
 

0 downloads
Artifact drools-decisiontables
Group drools
Version 3.0.4
Last update 31. January 2007
Organization not specified
URL http://www.jboss.com/products/rules
License Apache License, Version 2.0
Dependencies amount 2
Dependencies drools-compiler, jxl,
There are maybe transitive dependencies!

pact-jvm-provider-lein_2.12 from group au.com.dius (version 3.6.15)

# Leiningen plugin to verify a provider [version 2.2.14+, 3.0.3+] Leiningen plugin for verifying pacts against a provider. The plugin provides a `pact-verify` task which will verify all configured pacts against your provider. ## To Use It ### 1. Add the plugin to your project plugins, preferably in it's own profile. ```clojure :profiles { :pact { :plugins [[au.com.dius/pact-jvm-provider-lein_2.11 "3.2.11" :exclusions [commons-logging]]] :dependencies [[ch.qos.logback/logback-core "1.1.3"] [ch.qos.logback/logback-classic "1.1.3"] [org.apache.httpcomponents/httpclient "4.4.1"]] }}} ``` ### 2. Define the pacts between your consumers and providers You define all the providers and consumers within the `:pact` configuration element of your project. ```clojure :pact { :service-providers { ; You can define as many as you need, but each must have a unique name :provider1 { ; All the provider properties are optional, and have sensible defaults (shown below) :protocol "http" :host "localhost" :port 8080 :path "/" :has-pact-with { ; Again, you can define as many consumers for each provider as you need, but each must have a unique name :consumer1 { ; pact file can be either a path or an URL :pact-file "path/to/provider1-consumer1-pact.json" } } } } } ``` ### 3. Execute `lein with-profile pact pact-verify` You will have to have your provider running for this to pass. ## Enabling insecure SSL For providers that are running on SSL with self-signed certificates, you need to enable insecure SSL mode by setting `:insecure true` on the provider. ```clojure :pact { :service-providers { :provider1 { :protocol "https" :host "localhost" :port 8443 :insecure true :has-pact-with { :consumer1 { :pact-file "path/to/provider1-consumer1-pact.json" } } } } } ``` ## Specifying a custom trust store For environments that are running their own certificate chains: ```clojure :pact { :service-providers { :provider1 { :protocol "https" :host "localhost" :port 8443 :trust-store "relative/path/to/trustStore.jks" :trust-store-password "changeme" :has-pact-with { :consumer1 { :pact-file "path/to/provider1-consumer1-pact.json" } } } } } ``` `:trust-store` is relative to the current working (build) directory. `:trust-store-password` defaults to `changeit`. NOTE: The hostname will still be verified against the certificate. ## Modifying the requests before they are sent Sometimes you may need to add things to the requests that can't be persisted in a pact file. Examples of these would be authentication tokens, which have a small life span. The Leiningen plugin provides a request filter that can be set to an anonymous function on the provider that will be called before the request is made. This function will receive the HttpRequest object as a parameter. ```clojure :pact { :service-providers { :provider1 { ; function that adds an Authorization header to each request :request-filter #(.addHeader % "Authorization" "oauth-token eyJhbGciOiJSUzI1NiIsIm...") :has-pact-with { :consumer1 { :pact-file "path/to/provider1-consumer1-pact.json" } } } } } ``` __*Important Note:*__ You should only use this feature for things that can not be persisted in the pact file. By modifying the request, you are potentially modifying the contract from the consumer tests! ## Modifying the HTTP Client Used The default HTTP client is used for all requests to providers (created with a call to `HttpClients.createDefault()`). This can be changed by specifying a function assigned to `:create-client` on the provider that returns a `CloseableHttpClient`. The function will receive the provider info as a parameter. ## Turning off URL decoding of the paths in the pact file [version 3.3.3+] By default the paths loaded from the pact file will be decoded before the request is sent to the provider. To turn this behaviour off, set the system property `pact.verifier.disableUrlPathDecoding` to `true`. __*Important Note:*__ If you turn off the url path decoding, you need to ensure that the paths in the pact files are correctly encoded. The verifier will not be able to make a request with an invalid encoded path. ## Plugin Properties The following plugin options can be specified on the command line: |Property|Description| |--------|-----------| |:pact.showStacktrace|This turns on stacktrace printing for each request. It can help with diagnosing network errors| |:pact.showFullDiff|This turns on displaying the full diff of the expected versus actual bodies [version 3.3.6+]| |:pact.filter.consumers|Comma seperated list of consumer names to verify| |:pact.filter.description|Only verify interactions whose description match the provided regular expression| |:pact.filter.providerState|Only verify interactions whose provider state match the provided regular expression. An empty string matches interactions that have no state| |:pact.verifier.publishResults|Publishing of verification results will be skipped unless this property is set to 'true' [version 3.5.18+]| |:pact.matching.wildcard|Enables matching of map values ignoring the keys when this property is set to 'true'| Example, to run verification only for a particular consumer: ``` $ lein with-profile pact pact-verify :pact.filter.consumers=:consumer2 ``` ## Provider States For each provider you can specify a state change URL to use to switch the state of the provider. This URL will receive the `providerState` description from the pact file before each interaction via a POST. The `:state-change-uses-body` controls if the state is passed in the request body or as a query parameter. These values can be set at the provider level, or for a specific consumer. Consumer values take precedent if both are given. ```clojure :pact { :service-providers { :provider1 { :state-change-url "http://localhost:8080/tasks/pactStateChange" :state-change-uses-body false ; defaults to true :has-pact-with { :consumer1 { :pact-file "path/to/provider1-consumer1-pact.json" } } } } } ``` If the `:state-change-uses-body` is not specified, or is set to true, then the provider state description will be sent as JSON in the body of the request. If it is set to false, it will passed as a query parameter. As for normal requests (see Modifying the requests before they are sent), a state change request can be modified before it is sent. Set `:state-change-request-filter` to an anonymous function on the provider that will be called before the request is made. #### Returning values that can be injected (3.6.11+) You can have values from the provider state callbacks be injected into most places (paths, query parameters, headers, bodies, etc.). This works by using the V3 spec generators with provider state callbacks that return values. One example of where this would be useful is API calls that require an ID which would be auto-generated by the database on the provider side, so there is no way to know what the ID would be beforehand. There are methods on the consumer DSLs that can provider an expression that contains variables (like '/api/user/${id}' for the path). The provider state callback can then return a map for values, and the `id` attribute from the map will be expanded in the expression. For URL callbacks, the values need to be returned as JSON in the response body. ## Filtering the interactions that are verified You can filter the interactions that are run using three properties: `:pact.filter.consumers`, `:pact.filter.description` and `:pact.filter.providerState`. Adding `:pact.filter.consumers=:consumer1,:consumer2` to the command line will only run the pact files for those consumers (consumer1 and consumer2). Adding `:pact.filter.description=a request for payment.*` will only run those interactions whose descriptions start with 'a request for payment'. `:pact.filter.providerState=.*payment` will match any interaction that has a provider state that ends with payment, and `:pact.filter.providerState=` will match any interaction that does not have a provider state. ## Starting and shutting down your provider For the pact verification to run, the provider needs to be running. Leiningen provides a `do` task that can chain tasks together. So, by creating a `start-app` and `terminate-app` alias, you could so something like: $ lein with-profile pact do start-app, pact-verify, terminate-app However, if the pact verification fails the build will abort without running the `terminate-app` task. To have the start and terminate tasks always run regardless of the state of the verification, you can assign them to `:start-provider-task` and `:terminate-provider-task` on the provider. ```clojure :aliases {"start-app" ^{:doc "Starts the app"} ["tasks to start app ..."] ; insert tasks to start the app here "terminate-app" ^{:doc "Kills the app"} ["tasks to terminate app ..."] ; insert tasks to stop the app here } :pact { :service-providers { :provider1 { :start-provider-task "start-app" :terminate-provider-task "terminate-app" :has-pact-with { :consumer1 { :pact-file "path/to/provider1-consumer1-pact.json" } } } } } ``` Then you can just run: $ lein with-profile pact pact-verify and the `start-app` and `terminate-app` tasks will run before and after the provider verification. ## Specifying the provider hostname at runtime [3.0.4+] If you need to calculate the provider hostname at runtime (for instance it is run as a new docker container or AWS instance), you can give an anonymous function as the provider host that returns the host name. The function will receive the provider information as a parameter. ```clojure :pact { :service-providers { :provider1 { :host #(calculate-host-name %) :has-pact-with { :consumer1 { :pact-file "path/to/provider1-consumer1-pact.json" } } } } } ```

Group: au.com.dius Artifact: pact-jvm-provider-lein_2.12
Show all versions Show documentation Show source 
 

0 downloads
Artifact pact-jvm-provider-lein_2.12
Group au.com.dius
Version 3.6.15
Last update 29. April 2020
Organization not specified
URL https://github.com/DiUS/pact-jvm
License Apache 2
Dependencies amount 8
Dependencies pact-jvm-provider_2.12, clojure, core.match, leiningen-core, logback-core, logback-classic, httpclient, jansi,
There are maybe transitive dependencies!



Page 10 from 13 (items total 127)


© 2015 - 2024 Weber Informatics LLC | Privacy Policy