Skip to content
GitLab
Menu
Projects
Groups
Snippets
/
Help
Help
Support
Community forum
Keyboard shortcuts
?
Submit feedback
Sign in
Toggle navigation
Menu
Open sidebar
vadere
vadere
Commits
494fa906
Commit
494fa906
authored
Feb 24, 2019
by
Benedikt Kleinmeier
Browse files
Merge remote-tracking branch 'origin/java_eleven' into java_migration
# Conflicts: # pom.xml
parents
317514f0
8f3960fe
Pipeline
#93288
failed with stages
in 3 minutes and 41 seconds
Changes
103
Pipelines
1
Expand all
Hide whitespace changes
Inline
Side-by-side
.gitignore
View file @
494fa906
...
...
@@ -41,6 +41,9 @@ VadereUtils/testreports/*.txt
VadereSimulator/resources/current_commit_hash.txt
VadereSimulator/testResources/**/*.legacy
#Java runtime files generated with "jdeps" and "jlink"
java-runtime/*
#model test output
VadereModelTests/**/output
VadereModelTests/*_private
...
...
VadereAnnotation/pom.xml
View file @
494fa906
...
...
@@ -26,7 +26,6 @@
<build>
<sourceDirectory>
src
</sourceDirectory>
<testSourceDirectory>
tests
</testSourceDirectory>
<resources>
<resource>
<directory>
src
</directory>
...
...
@@ -62,7 +61,7 @@
<plugin>
<groupId>
org.jacoco
</groupId>
<artifactId>
jacoco-maven-plugin
</artifactId>
<version>
0.
7.9
</version>
<version>
0.
8.3
</version>
<executions>
<!-- Use JaCoCo's Java agents to record coverage data by using on-the-fly class file instrumentation. -->
<execution>
...
...
@@ -94,15 +93,13 @@
<!-- Maven Surefire is used to execute unit tests. -->
<groupId>
org.apache.maven.plugins
</groupId>
<artifactId>
maven-surefire-plugin
</artifactId>
<version>
2.1
9
</version>
<version>
2.
22.
1
</version>
<configuration>
<argLine>
${surefireArgLine}
</argLine>
<enableAssertions>
true
</enableAssertions>
<excludes>
<exclude></exclude>
</excludes>
<failIfNoTests>
false
</failIfNoTests>
<skipTests>
${skip.unit.tests}
</skipTests>
</configuration>
</plugin>
</plugins>
...
...
VadereGui/pom.xml
View file @
494fa906
...
...
@@ -119,7 +119,7 @@
<plugin>
<groupId>
org.jacoco
</groupId>
<artifactId>
jacoco-maven-plugin
</artifactId>
<version>
0.
7.9
</version>
<version>
0.
8.3
</version>
<executions>
<!-- Use JaCoCo's Java agents to record coverage data by using on-the-fly class file instrumentation. -->
<execution>
...
...
@@ -151,15 +151,13 @@
<!-- Maven Surefire is used to cup unit tests. -->
<groupId>
org.apache.maven.plugins
</groupId>
<artifactId>
maven-surefire-plugin
</artifactId>
<version>
2.1
9
</version>
<version>
2.
22.
1
</version>
<configuration>
<argLine>
${surefireArgLine}
</argLine>
<enableAssertions>
true
</enableAssertions>
<excludes>
<exclude></exclude>
</excludes>
<failIfNoTests>
false
</failIfNoTests>
<skipTests>
${skip.unit.tests}
</skipTests>
</configuration>
</plugin>
</plugins>
...
...
VadereMeshing/pom.xml
View file @
494fa906
...
...
@@ -81,15 +81,13 @@
<!-- Maven Surefire is used to cup unit tests. -->
<groupId>
org.apache.maven.plugins
</groupId>
<artifactId>
maven-surefire-plugin
</artifactId>
<version>
2.1
9
</version>
<version>
2.
22.
1
</version>
<configuration>
<argLine>
${surefireArgLine}
</argLine>
<enableAssertions>
true
</enableAssertions>
<excludes>
<exclude></exclude>
</excludes>
<failIfNoTests>
false
</failIfNoTests>
<skipTests>
${skip.unit.tests}
</skipTests>
</configuration>
</plugin>
<plugin>
...
...
VadereSimulator/pom.xml
View file @
494fa906
...
...
@@ -90,7 +90,7 @@
<plugin>
<groupId>
org.jacoco
</groupId>
<artifactId>
jacoco-maven-plugin
</artifactId>
<version>
0.
7.9
</version>
<version>
0.
8.3
</version>
<executions>
<!-- Use JaCoCo's Java agents to record coverage data by using on-the-fly class file instrumentation. -->
<execution>
...
...
@@ -122,15 +122,13 @@
<!-- Maven Surefire is used to cup unit tests. -->
<groupId>
org.apache.maven.plugins
</groupId>
<artifactId>
maven-surefire-plugin
</artifactId>
<version>
2.1
9
</version>
<version>
2.
22.
1
</version>
<configuration>
<argLine>
${surefireArgLine}
</argLine>
<enableAssertions>
true
</enableAssertions>
<excludes>
<exclude></exclude>
</excludes>
<failIfNoTests>
false
</failIfNoTests>
<skipTests>
${skip.unit.tests}
</skipTests>
</configuration>
</plugin>
...
...
VadereState/pom.xml
View file @
494fa906
...
...
@@ -32,7 +32,7 @@
<plugin>
<groupId>
org.jacoco
</groupId>
<artifactId>
jacoco-maven-plugin
</artifactId>
<version>
0.
7.9
</version>
<version>
0.
8.3
</version>
<executions>
<!-- Use JaCoCo's Java agents to record coverage data by using on-the-fly class file instrumentation. -->
<execution>
...
...
@@ -64,15 +64,13 @@
<!-- Maven Surefire is used to execute unit tests. -->
<groupId>
org.apache.maven.plugins
</groupId>
<artifactId>
maven-surefire-plugin
</artifactId>
<version>
2.1
9
</version>
<version>
2.
22.
1
</version>
<configuration>
<argLine>
${surefireArgLine}
</argLine>
<enableAssertions>
true
</enableAssertions>
<excludes>
<exclude></exclude>
</excludes>
<failIfNoTests>
false
</failIfNoTests>
<skipTests>
${skip.unit.tests}
</skipTests>
</configuration>
</plugin>
</plugins>
...
...
VadereUtils/pom.xml
View file @
494fa906
...
...
@@ -39,16 +39,16 @@
<plugin>
<groupId>
org.apache.maven.plugins
</groupId>
<artifactId>
maven-compiler-plugin
</artifactId>
<version>
3.0
</version>
<version>
3.
8.
0
</version>
<configuration>
<source>
1.
8
</source>
<target>
1.
8
</target>
<source>
1.
11
</source>
<target>
1.
11
</target>
</configuration>
</plugin>
<plugin>
<groupId>
org.jacoco
</groupId>
<artifactId>
jacoco-maven-plugin
</artifactId>
<version>
0.
7.9
</version>
<version>
0.
8.3
</version>
<executions>
<!-- Use JaCoCo's Java agents to record coverage data by using on-the-fly class file instrumentation. -->
<execution>
...
...
@@ -80,15 +80,13 @@
<!-- Maven Surefire is used to execute unit tests. -->
<groupId>
org.apache.maven.plugins
</groupId>
<artifactId>
maven-surefire-plugin
</artifactId>
<version>
2.1
9
</version>
<version>
2.
22.
1
</version>
<configuration>
<argLine>
${surefireArgLine}
</argLine>
<enableAssertions>
true
</enableAssertions>
<excludes>
<exclude></exclude>
</excludes>
<failIfNoTests>
false
</failIfNoTests>
<skipTests>
${skip.unit.tests}
</skipTests>
</configuration>
</plugin>
</plugins>
...
...
VadereUtils/src/org/vadere/util/geometry/shapes/MPoint.java
View file @
494fa906
package
org.vadere.util.geometry.shapes
;
import
jdk.nashorn.internal.runtime.regexp.joni.exception.InternalException
;
//
import jdk.nashorn.internal.runtime.regexp.joni.exception.InternalException;
public
class
MPoint
implements
org
.
vadere
.
util
.
geometry
.
shapes
.
IPoint
,
Cloneable
{
private
VPoint
point
;
...
...
@@ -163,7 +163,7 @@ public class MPoint implements org.vadere.util.geometry.shapes.IPoint, Cloneable
MPoint
clone
=
(
MPoint
)
super
.
clone
();
return
clone
;
}
catch
(
CloneNotSupportedException
e
)
{
throw
new
Internal
Exception
(
e
.
getMessage
());
throw
new
Runtime
Exception
(
e
.
getMessage
());
}
}
}
VadereUtils/tests/org/vadere/util/math/TestCLLinkedList.java
View file @
494fa906
...
...
@@ -124,6 +124,7 @@ public class TestCLLinkedList {
testGridCellSmall
(
CL_DEVICE_TYPE_ALL
);
}
@Ignore
@Test
public
void
testGridCellLarge
()
throws
IOException
,
OpenCLException
{
testGridCellLarge
(
CL_DEVICE_TYPE_ALL
);
...
...
@@ -159,12 +160,11 @@ public class TestCLLinkedList {
assertEquals
(
size
,
sum
);
}
private
void
testGridCellLarge
(
final
int
device
)
throws
IOException
,
OpenCLException
{
int
size
=
32768
;
final
int
size
=
32768
;
//int size = 8192;
CLLinkedCell
clUniformHashedGrid
=
new
CLLinkedCell
(
size
,
new
VRectangle
(
0
,
0
,
10
,
10
),
0.6
,
device
);
ArrayList
<
VPoint
>
positions
=
new
ArrayList
<>();
ArrayList
<
VPoint
>
positions
=
new
ArrayList
<>(
size
);
for
(
int
i
=
0
;
i
<
size
;
i
++)
{
positions
.
add
(
new
VPoint
(
0.5
+
random
.
nextFloat
()
*
9
,
0.5
+
random
.
nextFloat
()
*
9
));
}
...
...
java-runtime/conf/logging.properties
deleted
100644 → 0
View file @
317514f0
############################################################
# Default Logging Configuration File
#
# You can use a different file by specifying a filename
# with the java.util.logging.config.file system property.
# For example java -Djava.util.logging.config.file=myfile
############################################################
############################################################
# Global properties
############################################################
# "handlers" specifies a comma separated list of log Handler
# classes. These handlers will be installed during VM startup.
# Note that these classes must be on the system classpath.
# By default we only configure a ConsoleHandler, which will only
# show messages at the INFO and above levels.
handlers
=
java.util.logging.ConsoleHandler
# To also add the FileHandler, use the following line instead.
#handlers= java.util.logging.FileHandler, java.util.logging.ConsoleHandler
# Default global logging level.
# This specifies which kinds of events are logged across
# all loggers. For any given facility this global level
# can be overriden by a facility specific level
# Note that the ConsoleHandler also has a separate level
# setting to limit messages printed to the console.
.level
=
INFO
############################################################
# Handler specific properties.
# Describes specific configuration info for Handlers.
############################################################
# default file output is in user's home directory.
java.util.logging.FileHandler.pattern
=
%h/java%u.log
java.util.logging.FileHandler.limit
=
50000
java.util.logging.FileHandler.count
=
1
# Default number of locks FileHandler can obtain synchronously.
# This specifies maximum number of attempts to obtain lock file by FileHandler
# implemented by incrementing the unique field %u as per FileHandler API documentation.
java.util.logging.FileHandler.maxLocks
=
100
java.util.logging.FileHandler.formatter
=
java.util.logging.XMLFormatter
# Limit the message that are printed on the console to INFO and above.
java.util.logging.ConsoleHandler.level
=
INFO
java.util.logging.ConsoleHandler.formatter
=
java.util.logging.SimpleFormatter
# Example to customize the SimpleFormatter output format
# to print one-line log message like this:
# <level>: <log message> [<date/time>]
#
# java.util.logging.SimpleFormatter.format=%4$s: %5$s [%1$tc]%n
############################################################
# Facility specific properties.
# Provides extra control for each logger.
############################################################
# For example, set the com.xyz.foo logger to only log SEVERE
# messages:
com.xyz.foo.level
=
SEVERE
java-runtime/conf/net.properties
deleted
100644 → 0
View file @
317514f0
############################################################
# Default Networking Configuration File
#
# This file may contain default values for the networking system properties.
# These values are only used when the system properties are not specified
# on the command line or set programmatically.
# For now, only the various proxy settings can be configured here.
############################################################
# Whether or not the DefaultProxySelector will default to System Proxy
# settings when they do exist.
# Set it to 'true' to enable this feature and check for platform
# specific proxy settings
# Note that the system properties that do explicitly set proxies
# (like http.proxyHost) do take precedence over the system settings
# even if java.net.useSystemProxies is set to true.
java.net.useSystemProxies
=
false
#------------------------------------------------------------------------
# Proxy configuration for the various protocol handlers.
# DO NOT uncomment these lines if you have set java.net.useSystemProxies
# to true as the protocol specific properties will take precedence over
# system settings.
#------------------------------------------------------------------------
# HTTP Proxy settings. proxyHost is the name of the proxy server
# (e.g. proxy.mydomain.com), proxyPort is the port number to use (default
# value is 80) and nonProxyHosts is a '|' separated list of hostnames which
# should be accessed directly, ignoring the proxy server (default value is
# localhost & 127.0.0.1).
#
# http.proxyHost=
# http.proxyPort=80
http.nonProxyHosts
=
localhost|127.*|[::1]
#
# HTTPS Proxy Settings. proxyHost is the name of the proxy server
# (e.g. proxy.mydomain.com), proxyPort is the port number to use (default
# value is 443). The HTTPS protocol handlers uses the http nonProxyHosts list.
#
# https.proxyHost=
# https.proxyPort=443
#
# FTP Proxy settings. proxyHost is the name of the proxy server
# (e.g. proxy.mydomain.com), proxyPort is the port number to use (default
# value is 80) and nonProxyHosts is a '|' separated list of hostnames which
# should be accessed directly, ignoring the proxy server (default value is
# localhost & 127.0.0.1).
#
# ftp.proxyHost=
# ftp.proxyPort=80
ftp.nonProxyHosts
=
localhost|127.*|[::1]
#
# Gopher Proxy settings. proxyHost is the name of the proxy server
# (e.g. proxy.mydomain.com), proxyPort is the port number to use (default
# value is 80)
#
# gopher.proxyHost=
# gopher.proxyPort=80
#
# Socks proxy settings. socksProxyHost is the name of the proxy server
# (e.g. socks.domain.com), socksProxyPort is the port number to use
# (default value is 1080)
#
# socksProxyHost=
# socksProxyPort=1080
#
# HTTP Keep Alive settings. remainingData is the maximum amount of data
# in kilobytes that will be cleaned off the underlying socket so that it
# can be reused (default value is 512K), queuedConnections is the maximum
# number of Keep Alive connections to be on the queue for clean up (default
# value is 10).
# http.KeepAlive.remainingData=512
# http.KeepAlive.queuedConnections=10
# Authentication Scheme restrictions for HTTP and HTTPS.
#
# In some environments certain authentication schemes may be undesirable
# when proxying HTTP or HTTPS. For example, "Basic" results in effectively the
# cleartext transmission of the user's password over the physical network.
# This section describes the mechanism for disabling authentication schemes
# based on the scheme name. Disabled schemes will be treated as if they are not
# supported by the implementation.
#
# The 'jdk.http.auth.tunneling.disabledSchemes' property lists the authentication
# schemes that will be disabled when tunneling HTTPS over a proxy, HTTP CONNECT.
# The 'jdk.http.auth.proxying.disabledSchemes' property lists the authentication
# schemes that will be disabled when proxying HTTP.
#
# In both cases the property is a comma-separated list of, case-insensitive,
# authentication scheme names, as defined by their relevant RFCs. An
# implementation may, but is not required to, support common schemes whose names
# include: 'Basic', 'Digest', 'NTLM', 'Kerberos', 'Negotiate'. A scheme that
# is not known, or not supported, by the implementation is ignored.
#
# Note: This property is currently used by the JDK Reference implementation. It
# is not guaranteed to be examined and used by other implementations.
#
#jdk.http.auth.proxying.disabledSchemes=
jdk.http.auth.tunneling.disabledSchemes
=
Basic
#
# Transparent NTLM HTTP authentication mode on Windows. Transparent authentication
# can be used for the NTLM scheme, where the security credentials based on the
# currently logged in user's name and password can be obtained directly from the
# operating system, without prompting the user. This property has three possible
# values which regulate the behavior as shown below. Other unrecognized values
# are handled the same as 'disabled'. Note, that NTLM is not considered to be a
# strongly secure authentication scheme and care should be taken before enabling
# this mechanism.
#
# Transparent authentication never used.
#jdk.http.ntlm.transparentAuth=disabled
#
# Enabled for all hosts.
#jdk.http.ntlm.transparentAuth=allHosts
#
# Enabled for hosts that are trusted in Windows Internet settings
#jdk.http.ntlm.transparentAuth=trustedHosts
#
jdk.http.ntlm.transparentAuth
=
disabled
java-runtime/conf/security/java.policy
deleted
100644 → 0
View file @
317514f0
//
// This system policy file grants a set of default permissions to all domains
// and can be configured to grant additional permissions to modules and other
// code sources. The code source URL scheme for modules linked into a
// run-time image is "jrt".
//
// For example, to grant permission to read the "foo" property to the module
// "com.greetings", the grant entry is:
//
// grant codeBase "jrt:/com.greetings" {
// permission java.util.PropertyPermission "foo", "read";
// };
//
// default permissions granted to all domains
grant {
// allows anyone to listen on dynamic ports
permission java.net.SocketPermission "localhost:0", "listen";
// "standard" properies that can be read by anyone
permission java.util.PropertyPermission "java.version", "read";
permission java.util.PropertyPermission "java.vendor", "read";
permission java.util.PropertyPermission "java.vendor.url", "read";
permission java.util.PropertyPermission "java.class.version", "read";
permission java.util.PropertyPermission "os.name", "read";
permission java.util.PropertyPermission "os.version", "read";
permission java.util.PropertyPermission "os.arch", "read";
permission java.util.PropertyPermission "file.separator", "read";
permission java.util.PropertyPermission "path.separator", "read";
permission java.util.PropertyPermission "line.separator", "read";
permission java.util.PropertyPermission
"java.specification.version", "read";
permission java.util.PropertyPermission "java.specification.vendor", "read";
permission java.util.PropertyPermission "java.specification.name", "read";
permission java.util.PropertyPermission
"java.vm.specification.version", "read";
permission java.util.PropertyPermission
"java.vm.specification.vendor", "read";
permission java.util.PropertyPermission
"java.vm.specification.name", "read";
permission java.util.PropertyPermission "java.vm.version", "read";
permission java.util.PropertyPermission "java.vm.vendor", "read";
permission java.util.PropertyPermission "java.vm.name", "read";
};
java-runtime/conf/security/java.security
deleted
100644 → 0
View file @
317514f0
This diff is collapsed.
Click to expand it.
java-runtime/conf/security/policy/README.txt
deleted
100644 → 0
View file @
317514f0
Java(TM) Cryptography Extension Policy Files
for the Java(TM) Platform, Standard Edition Runtime Environment
README
------------------------------------------------------------------------
Import and export control rules on cryptographic software vary from
country to country. The Java Cryptography Extension (JCE) architecture
allows flexible cryptographic key strength to be configured via the
jurisdiction policy files which are referenced by the "crypto.policy"
security property in the <java-home>/conf/security/java.security file.
By default, Java provides two different sets of cryptographic policy
files:
unlimited: These policy files contain no restrictions on cryptographic
strengths or algorithms
limited: These policy files contain more restricted cryptographic
strengths
These files reside in <java-home>/conf/security/policy in the "unlimited"
or "limited" subdirectories respectively.
Each subdirectory contains a complete policy configuration,
and subdirectories can be added/edited/removed to reflect your
import or export control product requirements.
Within a subdirectory, the effective policy is the combined minimum
permissions of the grant statements in the file(s) matching the filename
pattern "default_*.policy". At least one grant is required. For example:
limited = Export (all) + Import (limited) = Limited
unlimited = Export (all) + Import (all) = Unlimited
The effective exemption policy is the combined minimum permissions
of the grant statements in the file(s) matching the filename pattern
"exempt_*.policy". Exemption grants are optional. For example:
limited = grants exemption permissions, by which the
effective policy can be circumvented.
e.g. KeyRecovery/KeyEscrow/KeyWeakening.
Please see the Java Cryptography Architecture (JCA) documentation for
additional information on these files and formats.
YOU ARE ADVISED TO CONSULT YOUR EXPORT/IMPORT CONTROL COUNSEL OR ATTORNEY
TO DETERMINE THE EXACT REQUIREMENTS.
Please note that the JCE for Java SE, including the JCE framework,
cryptographic policy files, and standard JCE providers provided with
the Java SE, have been reviewed and approved for export as mass market
encryption item by the US Bureau of Industry and Security.
java-runtime/conf/security/policy/limited/default_US_export.policy
deleted
100644 → 0
View file @
317514f0
// Default US Export policy file.
grant {
// There is no restriction to any algorithms.
permission javax.crypto.CryptoAllPermission;
};
java-runtime/conf/security/policy/limited/default_local.policy
deleted
100644 → 0
View file @
317514f0
// Some countries have import limits on crypto strength. This policy file
// is worldwide importable.
grant {
permission javax.crypto.CryptoPermission "DES", 64;
permission javax.crypto.CryptoPermission "DESede", *;
permission javax.crypto.CryptoPermission "RC2", 128,
"javax.crypto.spec.RC2ParameterSpec", 128;
permission javax.crypto.CryptoPermission "RC4", 128;
permission javax.crypto.CryptoPermission "RC5", 128,
"javax.crypto.spec.RC5ParameterSpec", *, 12, *;
permission javax.crypto.CryptoPermission "RSA", *;
permission javax.crypto.CryptoPermission *, 128;
};
java-runtime/conf/security/policy/limited/exempt_local.policy
deleted
100644 → 0
View file @
317514f0
// Some countries have import limits on crypto strength, but may allow for
// these exemptions if the exemption mechanism is used.
grant {
// There is no restriction to any algorithms if KeyRecovery is enforced.
permission javax.crypto.CryptoPermission *, "KeyRecovery";
// There is no restriction to any algorithms if KeyEscrow is enforced.
permission javax.crypto.CryptoPermission *, "KeyEscrow";
// There is no restriction to any algorithms if KeyWeakening is enforced.
permission javax.crypto.CryptoPermission *, "KeyWeakening";
};
java-runtime/conf/security/policy/unlimited/default_US_export.policy
deleted
100644 → 0
View file @
317514f0
// Default US Export policy file.
grant {
// There is no restriction to any algorithms.
permission javax.crypto.CryptoAllPermission;
};
java-runtime/conf/security/policy/unlimited/default_local.policy
deleted
100644 → 0
View file @
317514f0
// Country-specific policy file for countries with no limits on crypto strength.
grant {
// There is no restriction to any algorithms.
permission javax.crypto.CryptoAllPermission;
};
java-runtime/conf/sound.properties
deleted
100644 → 0
View file @
317514f0
############################################################
# Sound Configuration File
############################################################
#
# This properties file is used to specify default service
# providers for javax.sound.midi.MidiSystem and
# javax.sound.sampled.AudioSystem.
#
# The following keys are recognized by MidiSystem methods:
#
# javax.sound.midi.Receiver
# javax.sound.midi.Sequencer
# javax.sound.midi.Synthesizer
# javax.sound.midi.Transmitter
#
# The following keys are recognized by AudioSystem methods:
#
# javax.sound.sampled.Clip
# javax.sound.sampled.Port
# javax.sound.sampled.SourceDataLine
# javax.sound.sampled.TargetDataLine
#
# The values specify the full class name of the service
# provider, or the device name.
#
# See the class descriptions for details.
#
# Example 1:
# Use MyDeviceProvider as default for SourceDataLines:
# javax.sound.sampled.SourceDataLine=com.xyz.MyDeviceProvider
#
# Example 2:
# Specify the default Synthesizer by its name "InternalSynth".
# javax.sound.midi.Synthesizer=#InternalSynth
#
# Example 3:
# Specify the default Receiver by provider and name:
# javax.sound.midi.Receiver=com.sun.media.sound.MidiProvider#SunMIDI1
#
Prev
1
2
3
4
5
6
Next
Write
Preview
Supports
Markdown
0%
Try again
or
attach a new file
.
Attach a file
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Cancel
Please
register
or
sign in
to comment