diff --git a/.github/dependabot.yml b/.github/dependabot.yml index 5ace460..b6006ef 100644 --- a/.github/dependabot.yml +++ b/.github/dependabot.yml @@ -1,6 +1,12 @@ version: 2 updates: - - package-ecosystem: "github-actions" + + - package-ecosystem: "maven" directory: "/" schedule: interval: "weekly" + + - package-ecosystem: "github-actions" + directory: "/" + schedule: + interval: "weekly" \ No newline at end of file diff --git a/.github/workflows/ci.yml b/.github/workflows/ci.yml new file mode 100644 index 0000000..4c5d140 --- /dev/null +++ b/.github/workflows/ci.yml @@ -0,0 +1,26 @@ +name: Java CI + +on: + schedule: + - cron: '42 0 * * 4' + push: + branches: + - master + pull_request: + +jobs: + build: + runs-on: ubuntu-latest + steps: + - name: Checkout + uses: actions/checkout@v6 + with: + persist-credentials: false + - name: Set up JDK 21 + uses: actions/setup-java@v5 + with: + distribution: temurin + java-version: 21 + cache: 'maven' + - name: Build & run tests with Maven + run: ./mvnw -V verify diff --git a/.github/workflows/maven.yml b/.github/workflows/maven.yml deleted file mode 100644 index b6c820d..0000000 --- a/.github/workflows/maven.yml +++ /dev/null @@ -1,21 +0,0 @@ -name: Java CI - -on: [push] - -jobs: - build: - - runs-on: ubuntu-latest - - steps: - - uses: actions/checkout@v6 - - name: Set up JDK 11 - uses: actions/setup-java@v4 - with: - distribution: temurin - java-version: 11 - - name: Build with Maven - run: mvn -B test-compile - - name: Run tests with Maven - timeout-minutes: 10 - run: mvn -B test diff --git a/.mvn/maven.config b/.mvn/maven.config new file mode 100644 index 0000000..18c894e --- /dev/null +++ b/.mvn/maven.config @@ -0,0 +1,7 @@ +--strict-checksums +-Daether.checksums.algorithms=SHA-512,SHA-1,MD5 +-Daether.trustedChecksumsSource.summaryFile=true +-Daether.trustedChecksumsSource.summaryFile.basedir=${session.rootDirectory}/.mvn/checksums/ +-Daether.artifactResolver.postProcessor.trustedChecksums=true +-Daether.artifactResolver.postProcessor.trustedChecksums.checksumAlgorithms=SHA-512 +-Daether.artifactResolver.postProcessor.trustedChecksums.failIfMissing=false diff --git a/.mvn/wrapper/maven-wrapper.properties b/.mvn/wrapper/maven-wrapper.properties new file mode 100644 index 0000000..533e775 --- /dev/null +++ b/.mvn/wrapper/maven-wrapper.properties @@ -0,0 +1,4 @@ +wrapperVersion=3.3.4 +distributionType=only-script +distributionUrl=https://repo.maven.apache.org/maven2/org/apache/maven/apache-maven/3.9.12/apache-maven-3.9.12-bin.zip +distributionSha256Sum=305773a68d6ddfd413df58c82b3f8050e89778e777f3a745c8e5b8cbea4018ef diff --git a/mvnw b/mvnw new file mode 100755 index 0000000..bd8896b --- /dev/null +++ b/mvnw @@ -0,0 +1,295 @@ +#!/bin/sh +# ---------------------------------------------------------------------------- +# Licensed to the Apache Software Foundation (ASF) under one +# or more contributor license agreements. See the NOTICE file +# distributed with this work for additional information +# regarding copyright ownership. The ASF licenses this file +# to you under the Apache License, Version 2.0 (the +# "License"); you may not use this file except in compliance +# with the License. You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, +# software distributed under the License is distributed on an +# "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY +# KIND, either express or implied. See the License for the +# specific language governing permissions and limitations +# under the License. +# ---------------------------------------------------------------------------- + +# ---------------------------------------------------------------------------- +# Apache Maven Wrapper startup batch script, version 3.3.4 +# +# Optional ENV vars +# ----------------- +# JAVA_HOME - location of a JDK home dir, required when download maven via java source +# MVNW_REPOURL - repo url base for downloading maven distribution +# MVNW_USERNAME/MVNW_PASSWORD - user and password for downloading maven +# MVNW_VERBOSE - true: enable verbose log; debug: trace the mvnw script; others: silence the output +# ---------------------------------------------------------------------------- + +set -euf +[ "${MVNW_VERBOSE-}" != debug ] || set -x + +# OS specific support. +native_path() { printf %s\\n "$1"; } +case "$(uname)" in +CYGWIN* | MINGW*) + [ -z "${JAVA_HOME-}" ] || JAVA_HOME="$(cygpath --unix "$JAVA_HOME")" + native_path() { cygpath --path --windows "$1"; } + ;; +esac + +# set JAVACMD and JAVACCMD +set_java_home() { + # For Cygwin and MinGW, ensure paths are in Unix format before anything is touched + if [ -n "${JAVA_HOME-}" ]; then + if [ -x "$JAVA_HOME/jre/sh/java" ]; then + # IBM's JDK on AIX uses strange locations for the executables + JAVACMD="$JAVA_HOME/jre/sh/java" + JAVACCMD="$JAVA_HOME/jre/sh/javac" + else + JAVACMD="$JAVA_HOME/bin/java" + JAVACCMD="$JAVA_HOME/bin/javac" + + if [ ! -x "$JAVACMD" ] || [ ! -x "$JAVACCMD" ]; then + echo "The JAVA_HOME environment variable is not defined correctly, so mvnw cannot run." >&2 + echo "JAVA_HOME is set to \"$JAVA_HOME\", but \"\$JAVA_HOME/bin/java\" or \"\$JAVA_HOME/bin/javac\" does not exist." >&2 + return 1 + fi + fi + else + JAVACMD="$( + 'set' +e + 'unset' -f command 2>/dev/null + 'command' -v java + )" || : + JAVACCMD="$( + 'set' +e + 'unset' -f command 2>/dev/null + 'command' -v javac + )" || : + + if [ ! -x "${JAVACMD-}" ] || [ ! -x "${JAVACCMD-}" ]; then + echo "The java/javac command does not exist in PATH nor is JAVA_HOME set, so mvnw cannot run." >&2 + return 1 + fi + fi +} + +# hash string like Java String::hashCode +hash_string() { + str="${1:-}" h=0 + while [ -n "$str" ]; do + char="${str%"${str#?}"}" + h=$(((h * 31 + $(LC_CTYPE=C printf %d "'$char")) % 4294967296)) + str="${str#?}" + done + printf %x\\n $h +} + +verbose() { :; } +[ "${MVNW_VERBOSE-}" != true ] || verbose() { printf %s\\n "${1-}"; } + +die() { + printf %s\\n "$1" >&2 + exit 1 +} + +trim() { + # MWRAPPER-139: + # Trims trailing and leading whitespace, carriage returns, tabs, and linefeeds. + # Needed for removing poorly interpreted newline sequences when running in more + # exotic environments such as mingw bash on Windows. + printf "%s" "${1}" | tr -d '[:space:]' +} + +scriptDir="$(dirname "$0")" +scriptName="$(basename "$0")" + +# parse distributionUrl and optional distributionSha256Sum, requires .mvn/wrapper/maven-wrapper.properties +while IFS="=" read -r key value; do + case "${key-}" in + distributionUrl) distributionUrl=$(trim "${value-}") ;; + distributionSha256Sum) distributionSha256Sum=$(trim "${value-}") ;; + esac +done <"$scriptDir/.mvn/wrapper/maven-wrapper.properties" +[ -n "${distributionUrl-}" ] || die "cannot read distributionUrl property in $scriptDir/.mvn/wrapper/maven-wrapper.properties" + +case "${distributionUrl##*/}" in +maven-mvnd-*bin.*) + MVN_CMD=mvnd.sh _MVNW_REPO_PATTERN=/maven/mvnd/ + case "${PROCESSOR_ARCHITECTURE-}${PROCESSOR_ARCHITEW6432-}:$(uname -a)" in + *AMD64:CYGWIN* | *AMD64:MINGW*) distributionPlatform=windows-amd64 ;; + :Darwin*x86_64) distributionPlatform=darwin-amd64 ;; + :Darwin*arm64) distributionPlatform=darwin-aarch64 ;; + :Linux*x86_64*) distributionPlatform=linux-amd64 ;; + *) + echo "Cannot detect native platform for mvnd on $(uname)-$(uname -m), use pure java version" >&2 + distributionPlatform=linux-amd64 + ;; + esac + distributionUrl="${distributionUrl%-bin.*}-$distributionPlatform.zip" + ;; +maven-mvnd-*) MVN_CMD=mvnd.sh _MVNW_REPO_PATTERN=/maven/mvnd/ ;; +*) MVN_CMD="mvn${scriptName#mvnw}" _MVNW_REPO_PATTERN=/org/apache/maven/ ;; +esac + +# apply MVNW_REPOURL and calculate MAVEN_HOME +# maven home pattern: ~/.m2/wrapper/dists/{apache-maven-,maven-mvnd--}/ +[ -z "${MVNW_REPOURL-}" ] || distributionUrl="$MVNW_REPOURL$_MVNW_REPO_PATTERN${distributionUrl#*"$_MVNW_REPO_PATTERN"}" +distributionUrlName="${distributionUrl##*/}" +distributionUrlNameMain="${distributionUrlName%.*}" +distributionUrlNameMain="${distributionUrlNameMain%-bin}" +MAVEN_USER_HOME="${MAVEN_USER_HOME:-${HOME}/.m2}" +MAVEN_HOME="${MAVEN_USER_HOME}/wrapper/dists/${distributionUrlNameMain-}/$(hash_string "$distributionUrl")" + +exec_maven() { + unset MVNW_VERBOSE MVNW_USERNAME MVNW_PASSWORD MVNW_REPOURL || : + exec "$MAVEN_HOME/bin/$MVN_CMD" "$@" || die "cannot exec $MAVEN_HOME/bin/$MVN_CMD" +} + +if [ -d "$MAVEN_HOME" ]; then + verbose "found existing MAVEN_HOME at $MAVEN_HOME" + exec_maven "$@" +fi + +case "${distributionUrl-}" in +*?-bin.zip | *?maven-mvnd-?*-?*.zip) ;; +*) die "distributionUrl is not valid, must match *-bin.zip or maven-mvnd-*.zip, but found '${distributionUrl-}'" ;; +esac + +# prepare tmp dir +if TMP_DOWNLOAD_DIR="$(mktemp -d)" && [ -d "$TMP_DOWNLOAD_DIR" ]; then + clean() { rm -rf -- "$TMP_DOWNLOAD_DIR"; } + trap clean HUP INT TERM EXIT +else + die "cannot create temp dir" +fi + +mkdir -p -- "${MAVEN_HOME%/*}" + +# Download and Install Apache Maven +verbose "Couldn't find MAVEN_HOME, downloading and installing it ..." +verbose "Downloading from: $distributionUrl" +verbose "Downloading to: $TMP_DOWNLOAD_DIR/$distributionUrlName" + +# select .zip or .tar.gz +if ! command -v unzip >/dev/null; then + distributionUrl="${distributionUrl%.zip}.tar.gz" + distributionUrlName="${distributionUrl##*/}" +fi + +# verbose opt +__MVNW_QUIET_WGET=--quiet __MVNW_QUIET_CURL=--silent __MVNW_QUIET_UNZIP=-q __MVNW_QUIET_TAR='' +[ "${MVNW_VERBOSE-}" != true ] || __MVNW_QUIET_WGET='' __MVNW_QUIET_CURL='' __MVNW_QUIET_UNZIP='' __MVNW_QUIET_TAR=v + +# normalize http auth +case "${MVNW_PASSWORD:+has-password}" in +'') MVNW_USERNAME='' MVNW_PASSWORD='' ;; +has-password) [ -n "${MVNW_USERNAME-}" ] || MVNW_USERNAME='' MVNW_PASSWORD='' ;; +esac + +if [ -z "${MVNW_USERNAME-}" ] && command -v wget >/dev/null; then + verbose "Found wget ... using wget" + wget ${__MVNW_QUIET_WGET:+"$__MVNW_QUIET_WGET"} "$distributionUrl" -O "$TMP_DOWNLOAD_DIR/$distributionUrlName" || die "wget: Failed to fetch $distributionUrl" +elif [ -z "${MVNW_USERNAME-}" ] && command -v curl >/dev/null; then + verbose "Found curl ... using curl" + curl ${__MVNW_QUIET_CURL:+"$__MVNW_QUIET_CURL"} -f -L -o "$TMP_DOWNLOAD_DIR/$distributionUrlName" "$distributionUrl" || die "curl: Failed to fetch $distributionUrl" +elif set_java_home; then + verbose "Falling back to use Java to download" + javaSource="$TMP_DOWNLOAD_DIR/Downloader.java" + targetZip="$TMP_DOWNLOAD_DIR/$distributionUrlName" + cat >"$javaSource" <<-END + public class Downloader extends java.net.Authenticator + { + protected java.net.PasswordAuthentication getPasswordAuthentication() + { + return new java.net.PasswordAuthentication( System.getenv( "MVNW_USERNAME" ), System.getenv( "MVNW_PASSWORD" ).toCharArray() ); + } + public static void main( String[] args ) throws Exception + { + setDefault( new Downloader() ); + java.nio.file.Files.copy( java.net.URI.create( args[0] ).toURL().openStream(), java.nio.file.Paths.get( args[1] ).toAbsolutePath().normalize() ); + } + } + END + # For Cygwin/MinGW, switch paths to Windows format before running javac and java + verbose " - Compiling Downloader.java ..." + "$(native_path "$JAVACCMD")" "$(native_path "$javaSource")" || die "Failed to compile Downloader.java" + verbose " - Running Downloader.java ..." + "$(native_path "$JAVACMD")" -cp "$(native_path "$TMP_DOWNLOAD_DIR")" Downloader "$distributionUrl" "$(native_path "$targetZip")" +fi + +# If specified, validate the SHA-256 sum of the Maven distribution zip file +if [ -n "${distributionSha256Sum-}" ]; then + distributionSha256Result=false + if [ "$MVN_CMD" = mvnd.sh ]; then + echo "Checksum validation is not supported for maven-mvnd." >&2 + echo "Please disable validation by removing 'distributionSha256Sum' from your maven-wrapper.properties." >&2 + exit 1 + elif command -v sha256sum >/dev/null; then + if echo "$distributionSha256Sum $TMP_DOWNLOAD_DIR/$distributionUrlName" | sha256sum -c - >/dev/null 2>&1; then + distributionSha256Result=true + fi + elif command -v shasum >/dev/null; then + if echo "$distributionSha256Sum $TMP_DOWNLOAD_DIR/$distributionUrlName" | shasum -a 256 -c >/dev/null 2>&1; then + distributionSha256Result=true + fi + else + echo "Checksum validation was requested but neither 'sha256sum' or 'shasum' are available." >&2 + echo "Please install either command, or disable validation by removing 'distributionSha256Sum' from your maven-wrapper.properties." >&2 + exit 1 + fi + if [ $distributionSha256Result = false ]; then + echo "Error: Failed to validate Maven distribution SHA-256, your Maven distribution might be compromised." >&2 + echo "If you updated your Maven version, you need to update the specified distributionSha256Sum property." >&2 + exit 1 + fi +fi + +# unzip and move +if command -v unzip >/dev/null; then + unzip ${__MVNW_QUIET_UNZIP:+"$__MVNW_QUIET_UNZIP"} "$TMP_DOWNLOAD_DIR/$distributionUrlName" -d "$TMP_DOWNLOAD_DIR" || die "failed to unzip" +else + tar xzf${__MVNW_QUIET_TAR:+"$__MVNW_QUIET_TAR"} "$TMP_DOWNLOAD_DIR/$distributionUrlName" -C "$TMP_DOWNLOAD_DIR" || die "failed to untar" +fi + +# Find the actual extracted directory name (handles snapshots where filename != directory name) +actualDistributionDir="" + +# First try the expected directory name (for regular distributions) +if [ -d "$TMP_DOWNLOAD_DIR/$distributionUrlNameMain" ]; then + if [ -f "$TMP_DOWNLOAD_DIR/$distributionUrlNameMain/bin/$MVN_CMD" ]; then + actualDistributionDir="$distributionUrlNameMain" + fi +fi + +# If not found, search for any directory with the Maven executable (for snapshots) +if [ -z "$actualDistributionDir" ]; then + # enable globbing to iterate over items + set +f + for dir in "$TMP_DOWNLOAD_DIR"/*; do + if [ -d "$dir" ]; then + if [ -f "$dir/bin/$MVN_CMD" ]; then + actualDistributionDir="$(basename "$dir")" + break + fi + fi + done + set -f +fi + +if [ -z "$actualDistributionDir" ]; then + verbose "Contents of $TMP_DOWNLOAD_DIR:" + verbose "$(ls -la "$TMP_DOWNLOAD_DIR")" + die "Could not find Maven distribution directory in extracted archive" +fi + +verbose "Found extracted Maven distribution directory: $actualDistributionDir" +printf %s\\n "$distributionUrl" >"$TMP_DOWNLOAD_DIR/$actualDistributionDir/mvnw.url" +mv -- "$TMP_DOWNLOAD_DIR/$actualDistributionDir" "$MAVEN_HOME" || [ -d "$MAVEN_HOME" ] || die "fail to move MAVEN_HOME" + +clean || : +exec_maven "$@" diff --git a/mvnw.cmd b/mvnw.cmd new file mode 100644 index 0000000..5761d94 --- /dev/null +++ b/mvnw.cmd @@ -0,0 +1,189 @@ +<# : batch portion +@REM ---------------------------------------------------------------------------- +@REM Licensed to the Apache Software Foundation (ASF) under one +@REM or more contributor license agreements. See the NOTICE file +@REM distributed with this work for additional information +@REM regarding copyright ownership. The ASF licenses this file +@REM to you under the Apache License, Version 2.0 (the +@REM "License"); you may not use this file except in compliance +@REM with the License. You may obtain a copy of the License at +@REM +@REM http://www.apache.org/licenses/LICENSE-2.0 +@REM +@REM Unless required by applicable law or agreed to in writing, +@REM software distributed under the License is distributed on an +@REM "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY +@REM KIND, either express or implied. See the License for the +@REM specific language governing permissions and limitations +@REM under the License. +@REM ---------------------------------------------------------------------------- + +@REM ---------------------------------------------------------------------------- +@REM Apache Maven Wrapper startup batch script, version 3.3.4 +@REM +@REM Optional ENV vars +@REM MVNW_REPOURL - repo url base for downloading maven distribution +@REM MVNW_USERNAME/MVNW_PASSWORD - user and password for downloading maven +@REM MVNW_VERBOSE - true: enable verbose log; others: silence the output +@REM ---------------------------------------------------------------------------- + +@IF "%__MVNW_ARG0_NAME__%"=="" (SET __MVNW_ARG0_NAME__=%~nx0) +@SET __MVNW_CMD__= +@SET __MVNW_ERROR__= +@SET __MVNW_PSMODULEP_SAVE=%PSModulePath% +@SET PSModulePath= +@FOR /F "usebackq tokens=1* delims==" %%A IN (`powershell -noprofile "& {$scriptDir='%~dp0'; $script='%__MVNW_ARG0_NAME__%'; icm -ScriptBlock ([Scriptblock]::Create((Get-Content -Raw '%~f0'))) -NoNewScope}"`) DO @( + IF "%%A"=="MVN_CMD" (set __MVNW_CMD__=%%B) ELSE IF "%%B"=="" (echo %%A) ELSE (echo %%A=%%B) +) +@SET PSModulePath=%__MVNW_PSMODULEP_SAVE% +@SET __MVNW_PSMODULEP_SAVE= +@SET __MVNW_ARG0_NAME__= +@SET MVNW_USERNAME= +@SET MVNW_PASSWORD= +@IF NOT "%__MVNW_CMD__%"=="" ("%__MVNW_CMD__%" %*) +@echo Cannot start maven from wrapper >&2 && exit /b 1 +@GOTO :EOF +: end batch / begin powershell #> + +$ErrorActionPreference = "Stop" +if ($env:MVNW_VERBOSE -eq "true") { + $VerbosePreference = "Continue" +} + +# calculate distributionUrl, requires .mvn/wrapper/maven-wrapper.properties +$distributionUrl = (Get-Content -Raw "$scriptDir/.mvn/wrapper/maven-wrapper.properties" | ConvertFrom-StringData).distributionUrl +if (!$distributionUrl) { + Write-Error "cannot read distributionUrl property in $scriptDir/.mvn/wrapper/maven-wrapper.properties" +} + +switch -wildcard -casesensitive ( $($distributionUrl -replace '^.*/','') ) { + "maven-mvnd-*" { + $USE_MVND = $true + $distributionUrl = $distributionUrl -replace '-bin\.[^.]*$',"-windows-amd64.zip" + $MVN_CMD = "mvnd.cmd" + break + } + default { + $USE_MVND = $false + $MVN_CMD = $script -replace '^mvnw','mvn' + break + } +} + +# apply MVNW_REPOURL and calculate MAVEN_HOME +# maven home pattern: ~/.m2/wrapper/dists/{apache-maven-,maven-mvnd--}/ +if ($env:MVNW_REPOURL) { + $MVNW_REPO_PATTERN = if ($USE_MVND -eq $False) { "/org/apache/maven/" } else { "/maven/mvnd/" } + $distributionUrl = "$env:MVNW_REPOURL$MVNW_REPO_PATTERN$($distributionUrl -replace "^.*$MVNW_REPO_PATTERN",'')" +} +$distributionUrlName = $distributionUrl -replace '^.*/','' +$distributionUrlNameMain = $distributionUrlName -replace '\.[^.]*$','' -replace '-bin$','' + +$MAVEN_M2_PATH = "$HOME/.m2" +if ($env:MAVEN_USER_HOME) { + $MAVEN_M2_PATH = "$env:MAVEN_USER_HOME" +} + +if (-not (Test-Path -Path $MAVEN_M2_PATH)) { + New-Item -Path $MAVEN_M2_PATH -ItemType Directory | Out-Null +} + +$MAVEN_WRAPPER_DISTS = $null +if ((Get-Item $MAVEN_M2_PATH).Target[0] -eq $null) { + $MAVEN_WRAPPER_DISTS = "$MAVEN_M2_PATH/wrapper/dists" +} else { + $MAVEN_WRAPPER_DISTS = (Get-Item $MAVEN_M2_PATH).Target[0] + "/wrapper/dists" +} + +$MAVEN_HOME_PARENT = "$MAVEN_WRAPPER_DISTS/$distributionUrlNameMain" +$MAVEN_HOME_NAME = ([System.Security.Cryptography.SHA256]::Create().ComputeHash([byte[]][char[]]$distributionUrl) | ForEach-Object {$_.ToString("x2")}) -join '' +$MAVEN_HOME = "$MAVEN_HOME_PARENT/$MAVEN_HOME_NAME" + +if (Test-Path -Path "$MAVEN_HOME" -PathType Container) { + Write-Verbose "found existing MAVEN_HOME at $MAVEN_HOME" + Write-Output "MVN_CMD=$MAVEN_HOME/bin/$MVN_CMD" + exit $? +} + +if (! $distributionUrlNameMain -or ($distributionUrlName -eq $distributionUrlNameMain)) { + Write-Error "distributionUrl is not valid, must end with *-bin.zip, but found $distributionUrl" +} + +# prepare tmp dir +$TMP_DOWNLOAD_DIR_HOLDER = New-TemporaryFile +$TMP_DOWNLOAD_DIR = New-Item -Itemtype Directory -Path "$TMP_DOWNLOAD_DIR_HOLDER.dir" +$TMP_DOWNLOAD_DIR_HOLDER.Delete() | Out-Null +trap { + if ($TMP_DOWNLOAD_DIR.Exists) { + try { Remove-Item $TMP_DOWNLOAD_DIR -Recurse -Force | Out-Null } + catch { Write-Warning "Cannot remove $TMP_DOWNLOAD_DIR" } + } +} + +New-Item -Itemtype Directory -Path "$MAVEN_HOME_PARENT" -Force | Out-Null + +# Download and Install Apache Maven +Write-Verbose "Couldn't find MAVEN_HOME, downloading and installing it ..." +Write-Verbose "Downloading from: $distributionUrl" +Write-Verbose "Downloading to: $TMP_DOWNLOAD_DIR/$distributionUrlName" + +$webclient = New-Object System.Net.WebClient +if ($env:MVNW_USERNAME -and $env:MVNW_PASSWORD) { + $webclient.Credentials = New-Object System.Net.NetworkCredential($env:MVNW_USERNAME, $env:MVNW_PASSWORD) +} +[Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12 +$webclient.DownloadFile($distributionUrl, "$TMP_DOWNLOAD_DIR/$distributionUrlName") | Out-Null + +# If specified, validate the SHA-256 sum of the Maven distribution zip file +$distributionSha256Sum = (Get-Content -Raw "$scriptDir/.mvn/wrapper/maven-wrapper.properties" | ConvertFrom-StringData).distributionSha256Sum +if ($distributionSha256Sum) { + if ($USE_MVND) { + Write-Error "Checksum validation is not supported for maven-mvnd. `nPlease disable validation by removing 'distributionSha256Sum' from your maven-wrapper.properties." + } + Import-Module $PSHOME\Modules\Microsoft.PowerShell.Utility -Function Get-FileHash + if ((Get-FileHash "$TMP_DOWNLOAD_DIR/$distributionUrlName" -Algorithm SHA256).Hash.ToLower() -ne $distributionSha256Sum) { + Write-Error "Error: Failed to validate Maven distribution SHA-256, your Maven distribution might be compromised. If you updated your Maven version, you need to update the specified distributionSha256Sum property." + } +} + +# unzip and move +Expand-Archive "$TMP_DOWNLOAD_DIR/$distributionUrlName" -DestinationPath "$TMP_DOWNLOAD_DIR" | Out-Null + +# Find the actual extracted directory name (handles snapshots where filename != directory name) +$actualDistributionDir = "" + +# First try the expected directory name (for regular distributions) +$expectedPath = Join-Path "$TMP_DOWNLOAD_DIR" "$distributionUrlNameMain" +$expectedMvnPath = Join-Path "$expectedPath" "bin/$MVN_CMD" +if ((Test-Path -Path $expectedPath -PathType Container) -and (Test-Path -Path $expectedMvnPath -PathType Leaf)) { + $actualDistributionDir = $distributionUrlNameMain +} + +# If not found, search for any directory with the Maven executable (for snapshots) +if (!$actualDistributionDir) { + Get-ChildItem -Path "$TMP_DOWNLOAD_DIR" -Directory | ForEach-Object { + $testPath = Join-Path $_.FullName "bin/$MVN_CMD" + if (Test-Path -Path $testPath -PathType Leaf) { + $actualDistributionDir = $_.Name + } + } +} + +if (!$actualDistributionDir) { + Write-Error "Could not find Maven distribution directory in extracted archive" +} + +Write-Verbose "Found extracted Maven distribution directory: $actualDistributionDir" +Rename-Item -Path "$TMP_DOWNLOAD_DIR/$actualDistributionDir" -NewName $MAVEN_HOME_NAME | Out-Null +try { + Move-Item -Path "$TMP_DOWNLOAD_DIR/$MAVEN_HOME_NAME" -Destination $MAVEN_HOME_PARENT | Out-Null +} catch { + if (! (Test-Path -Path "$MAVEN_HOME" -PathType Container)) { + Write-Error "fail to move MAVEN_HOME" + } +} finally { + try { Remove-Item $TMP_DOWNLOAD_DIR -Recurse -Force | Out-Null } + catch { Write-Warning "Cannot remove $TMP_DOWNLOAD_DIR" } +} + +Write-Output "MVN_CMD=$MAVEN_HOME/bin/$MVN_CMD" diff --git a/pom.xml b/pom.xml index bcb2993..556bb08 100644 --- a/pom.xml +++ b/pom.xml @@ -1,97 +1,172 @@ - - 4.0.0 + + + 4.0.0 - com.github.multiformats - java-multihash - 1.3.6 - jar + com.github.multiformats + java-multihash + 1.3.7-SNAPSHOT + jar - multihash - https://github.com/multiformats/java-multihash + multibase + https://github.com/multiformats/java-multibase - - https://github.com/multiformats/java-multihash/issues - GitHub Issues - + + + MIT License + https://github.com/multiformats/java-multiaddr/blob/master/LICENSE + repo + + - - https://github.com/multiformats/java-multihash - scm:git:git://github.com/multiformats/java-multihash.git - scm:git:git@github.com:multiformats/java-multihash.git - + + scm:git:git://github.com/multiformats/java-multibase.git + scm:git:git@github.com:multiformats/java-multibase.git + HEAD + https://github.com/multiformats/java-multibase + - - - MIT License - https://github.com/multiformats/java-multiaddr/blob/master/LICENSE - repo - - + + GitHub Issues + https://github.com/multiformats/java-multibase/issues + - - UTF-8 - UTF-8 - 5.11.0 - 3.0 - v1.1.1 - + + 2026-01-20T00:00:00Z + UTF-8 + UTF-8 + 11 + 6.0.2 + 1.3.0 + - - - jitpack.io - https://jitpack.io - - + + + com.github.multiformats + java-multibase + ${version.multibase} + + + org.junit.jupiter + junit-jupiter-api + ${version.junit} + test + + - - - com.github.multiformats - java-multibase - ${version.multibase} - - - org.junit.jupiter - junit-jupiter - ${version.junit} - test - - - org.hamcrest - hamcrest-core - ${version.hamcrest} - test - - + + + jitpack.io + https://jitpack.io + + - - - - org.apache.maven.plugins - maven-compiler-plugin - 3.1 - - 11 - 11 - - - - org.apache.maven.plugins - maven-surefire-plugin - 3.3.1 - - - org.apache.maven.plugins - maven-jar-plugin - 3.0.2 - - - - true - - - - - - + + + + org.apache.maven.plugins + maven-enforcer-plugin + 3.6.2 + + + + 3.9.6 + + + 21 + + + + + + enforce + + enforce + + validate + + + + + com.diffplug.spotless + spotless-maven-plugin + 3.1.0 + + + + 1.33.0 + + + google-java-format + + + + + + false + + true + true + + + + true + + + + + + ${spotless.action} + + process-sources + + + + + org.apache.maven.plugins + maven-compiler-plugin + 3.14.1 + + + org.apache.maven.plugins + maven-surefire-plugin + 3.5.4 + + + org.apache.maven.plugins + maven-jar-plugin + 3.5.0 + + + + true + + + + + + + + + format-check + + + env.CI + + + + check + + + + format + + + !env.CI + + + + apply + + + diff --git a/src/main/java/io/ipfs/multihash/Multihash.java b/src/main/java/io/ipfs/multihash/Multihash.java index fcc2e7d..7894a74 100644 --- a/src/main/java/io/ipfs/multihash/Multihash.java +++ b/src/main/java/io/ipfs/multihash/Multihash.java @@ -1,313 +1,313 @@ package io.ipfs.multihash; -import io.ipfs.multibase.*; - -import java.io.*; +import io.ipfs.multibase.Base16; +import io.ipfs.multibase.Base58; +import io.ipfs.multibase.Multibase; +import java.io.ByteArrayInputStream; +import java.io.ByteArrayOutputStream; +import java.io.EOFException; +import java.io.IOException; +import java.io.InputStream; +import java.io.OutputStream; import java.util.Arrays; import java.util.HashMap; import java.util.Map; public class Multihash { - public static final int MAX_IDENTITY_HASH_LENGTH = 1024*1024; - - // From https://github.com/multiformats/multicodec/blob/master/table.csv - public enum Type { - id(0, -1), - md5(0xd5, 16), - sha1(0x11, 20), - sha2_256(0x12, 32), - sha2_512(0x13, 64), - dbl_sha2_256(0x56, 32), - sha3_224(0x17, 24), - sha3_256(0x16, 32), - sha3_512(0x14, 64), - shake_128(0x18, 32), - shake_256(0x19, 64), - keccak_224(0x1a, 24), - keccak_256(0x1b, 32), - keccak_384(0x1c, 48), - keccak_512(0x1d, 64), - blake3(0x1e, 32), - murmur3(0x22, 4), - - // blake2b (64 codes) - blake2b_8(0xb201, 1), - blake2b_16(0xb202, 2), - blake2b_24(0xb203, 3), - blake2b_32(0xb204, 4), - blake2b_40(0xb205, 5), - blake2b_48(0xb206, 6), - blake2b_56(0xb207, 7), - blake2b_64(0xb208, 8), - blake2b_72(0xb209, 9), - blake2b_80(0xb20a, 10), - blake2b_88(0xb20b, 11), - blake2b_96(0xb20c, 12), - blake2b_104(0xb20d, 13), - blake2b_112(0xb20e, 14), - blake2b_120(0xb20f, 15), - blake2b_128(0xb210, 16), - blake2b_136(0xb211, 17), - blake2b_144(0xb212, 18), - blake2b_152(0xb213, 19), - blake2b_160(0xb214, 20), - blake2b_168(0xb215, 21), - blake2b_176(0xb216, 22), - blake2b_184(0xb217, 23), - blake2b_192(0xb218, 24), - blake2b_200(0xb219, 25), - blake2b_208(0xb21a, 26), - blake2b_216(0xb21b, 27), - blake2b_224(0xb21c, 28), - blake2b_232(0xb21d, 29), - blake2b_240(0xb21e, 30), - blake2b_248(0xb21f, 31), - blake2b_256(0xb220, 32), - blake2b_264(0xb221, 33), - blake2b_272(0xb222, 34), - blake2b_280(0xb223, 35), - blake2b_288(0xb224, 36), - blake2b_296(0xb225, 37), - blake2b_304(0xb226, 38), - blake2b_312(0xb227, 39), - blake2b_320(0xb228, 40), - blake2b_328(0xb229, 41), - blake2b_336(0xb22a, 42), - blake2b_344(0xb22b, 43), - blake2b_352(0xb22c, 44), - blake2b_360(0xb22d, 45), - blake2b_368(0xb22e, 46), - blake2b_376(0xb22f, 47), - blake2b_384(0xb230, 48), - blake2b_392(0xb231, 49), - blake2b_400(0xb232, 50), - blake2b_408(0xb233, 51), - blake2b_416(0xb234, 52), - blake2b_424(0xb235, 53), - blake2b_432(0xb236, 54), - blake2b_440(0xb237, 55), - blake2b_448(0xb238, 56), - blake2b_456(0xb239, 57), - blake2b_464(0xb23a, 58), - blake2b_472(0xb23b, 59), - blake2b_480(0xb23c, 60), - blake2b_488(0xb23d, 61), - blake2b_496(0xb23e, 62), - blake2b_504(0xb23f, 63), - blake2b_512(0xb240, 64), - - // blake2s (32 codes) - blake2s_8(0xb241, 1), - blake2s_16(0xb242, 2), - blake2s_24(0xb243, 3), - blake2s_32(0xb244, 4), - blake2s_40(0xb245, 5), - blake2s_48(0xb246, 6), - blake2s_56(0xb247, 7), - blake2s_64(0xb248, 8), - blake2s_72(0xb249, 9), - blake2s_80(0xb24a, 10), - blake2s_88(0xb24b, 11), - blake2s_96(0xb24c, 12), - blake2s_104(0xb24d, 13), - blake2s_112(0xb24e, 14), - blake2s_120(0xb24f, 15), - blake2s_128(0xb250, 16), - blake2s_136(0xb251, 17), - blake2s_144(0xb252, 18), - blake2s_152(0xb253, 19), - blake2s_160(0xb254, 20), - blake2s_168(0xb255, 21), - blake2s_176(0xb256, 22), - blake2s_184(0xb257, 23), - blake2s_192(0xb258, 24), - blake2s_200(0xb259, 25), - blake2s_208(0xb25a, 26), - blake2s_216(0xb25b, 27), - blake2s_224(0xb25c, 28), - blake2s_232(0xb25d, 29), - blake2s_240(0xb25e, 30), - blake2s_248(0xb25f, 31), - blake2s_256(0xb260, 32), - - // Murmur - murmur3_x64_64(0x22, 8), - murmur3_x64_128(0x1022, 16); // DRAFT status - - public final int index, length; - - Type(final int index, final int length) { - this.index = index; - this.length = length; - } - - private static Map lookup = new HashMap<>(); - static { - for (Type t: Type.values()) - lookup.put(t.index, t); - } - - public static Type lookup(int t) { - Type type = lookup.get(t); - if (type == null) - throw new IllegalStateException(String.format("Unknown Multihash type: 0x%x", t)); - return type; - } - + public static final int MAX_IDENTITY_HASH_LENGTH = 1024 * 1024; + + // From https://github.com/multiformats/multicodec/blob/master/table.csv + public enum Type { + id(0, -1), + md5(0xd5, 16), + sha1(0x11, 20), + sha2_256(0x12, 32), + sha2_512(0x13, 64), + dbl_sha2_256(0x56, 32), + sha3_224(0x17, 24), + sha3_256(0x16, 32), + sha3_512(0x14, 64), + shake_128(0x18, 32), + shake_256(0x19, 64), + keccak_224(0x1a, 24), + keccak_256(0x1b, 32), + keccak_384(0x1c, 48), + keccak_512(0x1d, 64), + blake3(0x1e, 32), + murmur3(0x22, 4), + + // blake2b (64 codes) + blake2b_8(0xb201, 1), + blake2b_16(0xb202, 2), + blake2b_24(0xb203, 3), + blake2b_32(0xb204, 4), + blake2b_40(0xb205, 5), + blake2b_48(0xb206, 6), + blake2b_56(0xb207, 7), + blake2b_64(0xb208, 8), + blake2b_72(0xb209, 9), + blake2b_80(0xb20a, 10), + blake2b_88(0xb20b, 11), + blake2b_96(0xb20c, 12), + blake2b_104(0xb20d, 13), + blake2b_112(0xb20e, 14), + blake2b_120(0xb20f, 15), + blake2b_128(0xb210, 16), + blake2b_136(0xb211, 17), + blake2b_144(0xb212, 18), + blake2b_152(0xb213, 19), + blake2b_160(0xb214, 20), + blake2b_168(0xb215, 21), + blake2b_176(0xb216, 22), + blake2b_184(0xb217, 23), + blake2b_192(0xb218, 24), + blake2b_200(0xb219, 25), + blake2b_208(0xb21a, 26), + blake2b_216(0xb21b, 27), + blake2b_224(0xb21c, 28), + blake2b_232(0xb21d, 29), + blake2b_240(0xb21e, 30), + blake2b_248(0xb21f, 31), + blake2b_256(0xb220, 32), + blake2b_264(0xb221, 33), + blake2b_272(0xb222, 34), + blake2b_280(0xb223, 35), + blake2b_288(0xb224, 36), + blake2b_296(0xb225, 37), + blake2b_304(0xb226, 38), + blake2b_312(0xb227, 39), + blake2b_320(0xb228, 40), + blake2b_328(0xb229, 41), + blake2b_336(0xb22a, 42), + blake2b_344(0xb22b, 43), + blake2b_352(0xb22c, 44), + blake2b_360(0xb22d, 45), + blake2b_368(0xb22e, 46), + blake2b_376(0xb22f, 47), + blake2b_384(0xb230, 48), + blake2b_392(0xb231, 49), + blake2b_400(0xb232, 50), + blake2b_408(0xb233, 51), + blake2b_416(0xb234, 52), + blake2b_424(0xb235, 53), + blake2b_432(0xb236, 54), + blake2b_440(0xb237, 55), + blake2b_448(0xb238, 56), + blake2b_456(0xb239, 57), + blake2b_464(0xb23a, 58), + blake2b_472(0xb23b, 59), + blake2b_480(0xb23c, 60), + blake2b_488(0xb23d, 61), + blake2b_496(0xb23e, 62), + blake2b_504(0xb23f, 63), + blake2b_512(0xb240, 64), + + // blake2s (32 codes) + blake2s_8(0xb241, 1), + blake2s_16(0xb242, 2), + blake2s_24(0xb243, 3), + blake2s_32(0xb244, 4), + blake2s_40(0xb245, 5), + blake2s_48(0xb246, 6), + blake2s_56(0xb247, 7), + blake2s_64(0xb248, 8), + blake2s_72(0xb249, 9), + blake2s_80(0xb24a, 10), + blake2s_88(0xb24b, 11), + blake2s_96(0xb24c, 12), + blake2s_104(0xb24d, 13), + blake2s_112(0xb24e, 14), + blake2s_120(0xb24f, 15), + blake2s_128(0xb250, 16), + blake2s_136(0xb251, 17), + blake2s_144(0xb252, 18), + blake2s_152(0xb253, 19), + blake2s_160(0xb254, 20), + blake2s_168(0xb255, 21), + blake2s_176(0xb256, 22), + blake2s_184(0xb257, 23), + blake2s_192(0xb258, 24), + blake2s_200(0xb259, 25), + blake2s_208(0xb25a, 26), + blake2s_216(0xb25b, 27), + blake2s_224(0xb25c, 28), + blake2s_232(0xb25d, 29), + blake2s_240(0xb25e, 30), + blake2s_248(0xb25f, 31), + blake2s_256(0xb260, 32), + + // Murmur + murmur3_x64_64(0x22, 8), + murmur3_x64_128(0x1022, 16); // DRAFT status + public final int index, length; + + Type(final int index, final int length) { + this.index = index; + this.length = length; } - private final Type type; - private final byte[] hash; + private static Map lookup = new HashMap<>(); - public Multihash(Type type, byte[] hash) { - if (hash.length > 127 && type != Type.id) - throw new IllegalStateException("Unsupported hash size: "+hash.length); - if (hash.length > MAX_IDENTITY_HASH_LENGTH) - throw new IllegalStateException("Unsupported hash size: "+hash.length); - if (hash.length != type.length && type != Type.id) - throw new IllegalStateException("Incorrect hash length: " + hash.length + " != "+type.length); - this.type = type; - this.hash = hash; + static { + for (Type t : Type.values()) lookup.put(t.index, t); } - public Multihash(Multihash toClone) { - this(toClone.type, toClone.hash); // N.B. despite being a byte[], hash is immutable + public static Type lookup(int t) { + Type type = lookup.get(t); + if (type == null) + throw new IllegalStateException(String.format("Unknown Multihash type: 0x%x", t)); + return type; } - - public byte[] toBytes() { - try { - ByteArrayOutputStream res = new ByteArrayOutputStream(); - putUvarint(res, type.index); - putUvarint(res, hash.length); - res.write(hash); - return res.toByteArray(); - } catch (IOException e) { - throw new RuntimeException(e); - } + } + + private final Type type; + private final byte[] hash; + + public Multihash(Type type, byte[] hash) { + if (hash.length > 127 && type != Type.id) + throw new IllegalStateException("Unsupported hash size: " + hash.length); + if (hash.length > MAX_IDENTITY_HASH_LENGTH) + throw new IllegalStateException("Unsupported hash size: " + hash.length); + if (hash.length != type.length && type != Type.id) + throw new IllegalStateException( + "Incorrect hash length: " + hash.length + " != " + type.length); + this.type = type; + this.hash = hash; + } + + public Multihash(Multihash toClone) { + this(toClone.type, toClone.hash); // N.B. despite being a byte[], hash is immutable + } + + public byte[] toBytes() { + try { + ByteArrayOutputStream res = new ByteArrayOutputStream(); + putUvarint(res, type.index); + putUvarint(res, hash.length); + res.write(hash); + return res.toByteArray(); + } catch (IOException e) { + throw new RuntimeException(e); } - - public Type getType() { - return type; + } + + public Type getType() { + return type; + } + + public byte[] getHash() { + return Arrays.copyOf(hash, hash.length); + } + + public void serialize(OutputStream out) { + try { + putUvarint(out, type.index); + putUvarint(out, hash.length); + out.write(hash); + } catch (IOException e) { + throw new RuntimeException(e); } - - public byte[] getHash() { - return Arrays.copyOf(hash, hash.length); + } + + public Multihash bareMultihash() { + return this; + } + + public static Multihash deserialize(InputStream din) throws IOException { + int type = (int) readVarint(din); + int len = (int) readVarint(din); + Type t = Type.lookup(type); + byte[] hash = new byte[len]; + int total = 0; + while (total < len) { + int read = din.read(hash); + if (read < 0) throw new EOFException(); + else total += read; } - - public void serialize(OutputStream out) { - try { - putUvarint(out, type.index); - putUvarint(out, hash.length); - out.write(hash); - } catch (IOException e) { - throw new RuntimeException(e); - } + return new Multihash(t, hash); + } + + public static Multihash deserialize(byte[] raw) { + try { + return deserialize(new ByteArrayInputStream(raw)); + } catch (IOException e) { + throw new RuntimeException(e); } - - public Multihash bareMultihash() { - return this; + } + + /** + * @param encoded A multibase encoded serialization of a Multihash + * @return + * @throws IOException + */ + public static Multihash decode(String encoded) { + if (encoded.length() == 46 && encoded.startsWith("Qm")) + return deserialize(Base58.decode(encoded)); + return deserialize(Multibase.decode(encoded)); + } + + @Override + public String toString() { + return toBase58(); + } + + @Override + public boolean equals(Object o) { + if (!(o instanceof Multihash)) return false; + return type == ((Multihash) o).type && Arrays.equals(hash, ((Multihash) o).hash); + } + + @Override + public int hashCode() { + return Arrays.hashCode(hash) ^ type.hashCode(); + } + + public String toHex() { + return Base16.encode(toBytes()); + } + + public String toBase58() { + return Base58.encode(toBytes()); + } + + public static Multihash fromHex(String hex) { + if (hex.length() % 2 != 0) throw new IllegalStateException("Odd number of hex digits!"); + + try (ByteArrayOutputStream bout = new ByteArrayOutputStream()) { + for (int i = 0; i < hex.length() - 1; i += 2) + bout.write(Integer.valueOf(hex.substring(i, i + 2), 16)); + return Multihash.deserialize(bout.toByteArray()); + } catch (IOException e) { + throw new IllegalStateException("Unable to handle Multihash conversion to Hex properly"); } - - public static Multihash deserialize(InputStream din) throws IOException { - int type = (int)readVarint(din); - int len = (int)readVarint(din); - Type t = Type.lookup(type); - byte[] hash = new byte[len]; - int total = 0; - while (total < len) { - int read = din.read(hash); - if (read < 0) - throw new EOFException(); - else - total += read; - } - return new Multihash(t, hash); - } - - public static Multihash deserialize(byte[] raw) { - try { - return deserialize(new ByteArrayInputStream(raw)); - } catch (IOException e) { - throw new RuntimeException(e); + } + + public static Multihash fromBase58(String base58) { + return Multihash.deserialize(Base58.decode(base58)); + } + + public static long readVarint(InputStream in) throws IOException { + long x = 0; + int s = 0; + for (int i = 0; i < 10; i++) { + int b = in.read(); + if (b < 0x80) { + if (i == 9 && b > 1) { + throw new IllegalStateException("Overflow reading varint!"); } + return x | (((long) b) << s); + } + x |= ((long) b & 0x7f) << s; + s += 7; } + throw new IllegalStateException("Varint too long!"); + } - /** - * - * @param encoded A multibase encoded serialization of a Multihash - * @return - * @throws IOException - */ - public static Multihash decode(String encoded) { - if (encoded.length() == 46 && encoded.startsWith("Qm")) - return deserialize(Base58.decode(encoded)); - return deserialize(Multibase.decode(encoded)); - } - - @Override - public String toString() { - return toBase58(); - } - - @Override - public boolean equals(Object o) { - if (!(o instanceof Multihash)) - return false; - return type == ((Multihash) o).type && Arrays.equals(hash, ((Multihash) o).hash); - } - - @Override - public int hashCode() { - return Arrays.hashCode(hash) ^ type.hashCode(); - } - - public String toHex() { - return Base16.encode(toBytes()); - } - - public String toBase58() { - return Base58.encode(toBytes()); - } - - public static Multihash fromHex(String hex) { - if (hex.length() % 2 != 0) - throw new IllegalStateException("Odd number of hex digits!"); - - try (ByteArrayOutputStream bout = new ByteArrayOutputStream()) { - for (int i = 0; i < hex.length() - 1; i += 2) - bout.write(Integer.valueOf(hex.substring(i, i + 2), 16)); - return Multihash.deserialize(bout.toByteArray()); - } catch (IOException e) { - throw new IllegalStateException("Unable to handle Multihash conversion to Hex properly"); - } - } - - public static Multihash fromBase58(String base58) { - return Multihash.deserialize(Base58.decode(base58)); - } - - public static long readVarint(InputStream in) throws IOException { - long x = 0; - int s=0; - for (int i=0; i < 10; i++) { - int b = in.read(); - if (b < 0x80) { - if (i == 9 && b > 1) { - throw new IllegalStateException("Overflow reading varint!"); - } - return x | (((long)b) << s); - } - x |= ((long)b & 0x7f) << s; - s += 7; - } - throw new IllegalStateException("Varint too long!"); - } - - public static void putUvarint(OutputStream out, long x) throws IOException { - while (x >= 0x80) { - out.write((byte)(x | 0x80)); - x >>= 7; - } - out.write((byte)x); + public static void putUvarint(OutputStream out, long x) throws IOException { + while (x >= 0x80) { + out.write((byte) (x | 0x80)); + x >>= 7; } + out.write((byte) x); + } } diff --git a/src/main/java/module-info.java b/src/main/java/module-info.java new file mode 100644 index 0000000..9c5db32 --- /dev/null +++ b/src/main/java/module-info.java @@ -0,0 +1,5 @@ +module io.ipfs.multihash { + requires io.ipfs.multibase; + + exports io.ipfs.multihash; +} diff --git a/src/test/java/io/ipfs/multihash/MultihashTest.java b/src/test/java/io/ipfs/multihash/MultihashTest.java index b4050da..6e98449 100755 --- a/src/test/java/io/ipfs/multihash/MultihashTest.java +++ b/src/test/java/io/ipfs/multihash/MultihashTest.java @@ -1,83 +1,97 @@ package io.ipfs.multihash; -import io.ipfs.multibase.*; -import org.junit.jupiter.api.Test; - -import java.io.*; +import io.ipfs.multibase.Base58; +import java.io.IOException; import java.security.MessageDigest; import java.util.Arrays; import java.util.List; - -import static org.junit.jupiter.api.Assertions.*; +import org.junit.jupiter.api.Assertions; +import org.junit.jupiter.api.Test; class MultihashTest { - @Test - void base58Test() { - List examples = Arrays.asList("QmPZ9gcCEpqKTo6aq61g2nXGUhM4iCL3ewB6LDXZCtioEB", - "QmatmE9msSfkKxoffpHwNLNKgwZG8eT9Bud6YoPab52vpy"); - for (String example: examples) { - byte[] output = Base58.decode(example); - String encoded = Base58.encode(output); - assertEquals(example, encoded); - } + @Test + void base58Test() { + List examples = + Arrays.asList( + "QmPZ9gcCEpqKTo6aq61g2nXGUhM4iCL3ewB6LDXZCtioEB", + "QmatmE9msSfkKxoffpHwNLNKgwZG8eT9Bud6YoPab52vpy"); + for (String example : examples) { + byte[] output = Base58.decode(example); + String encoded = Base58.encode(output); + Assertions.assertEquals(example, encoded); } + } - @Test - void decodeTest() throws IOException { - List base58 = Arrays.asList( - "QmPZ9gcCEpqKTo6aq61g2nXGUhM4iCL3ewB6LDXZCtioEB", - "QmatmE9msSfkKxoffpHwNLNKgwZG8eT9Bud6YoPab52vpy" - ); - List base36 = Arrays.asList( - "kmue2y4illvr0m3lt8x6z8iwghtxlzdmkjh957p5rr5cdr9243ugc", - "kmuia3qyasz2z5cnz848bag5n5wfc7gzi35cz2npamtmkyifd5anu"); - for (int i=0; i < base58.size(); i++) { - Multihash b58 = Multihash.decode(base58.get(i)); - Multihash b36 = Multihash.decode(base36.get(i)); - assertEquals(b58, b36); - } + @Test + void decodeTest() throws IOException { + List base58 = + Arrays.asList( + "QmPZ9gcCEpqKTo6aq61g2nXGUhM4iCL3ewB6LDXZCtioEB", + "QmatmE9msSfkKxoffpHwNLNKgwZG8eT9Bud6YoPab52vpy"); + List base36 = + Arrays.asList( + "kmue2y4illvr0m3lt8x6z8iwghtxlzdmkjh957p5rr5cdr9243ugc", + "kmuia3qyasz2z5cnz848bag5n5wfc7gzi35cz2npamtmkyifd5anu"); + for (int i = 0; i < base58.size(); i++) { + Multihash b58 = Multihash.decode(base58.get(i)); + Multihash b36 = Multihash.decode(base36.get(i)); + Assertions.assertEquals(b58, b36); } + } - @Test - void multihashTest() { - Object[][] examples = new Object[][]{ - {Multihash.Type.id, "ID", "13hC12xCn", "hello"}, - {Multihash.Type.id, "ID", "11", ""}, - {Multihash.Type.md5, "MD5", "fzhnUYo18W8ewDBzLuzLqc9Twp", "hello world"}, - {Multihash.Type.sha1, "SHA-1", "5drNu81uhrFLRiS4bxWgAkpydaLUPW", "hello world"}, - {Multihash.Type.sha2_256, "SHA-256", "QmaozNR7DZHQK1ZcU9p7QdrshMvXqWK6gpu5rmrkPdT3L4", "hello world"}, - {Multihash.Type.sha2_512, "SHA-512", "8Vtkv2tdQ43bNGdWN9vNx9GVS9wrbXHk4ZW8kmucPmaYJwwedXir52kti9wJhcik4HehyqgLrQ1hBuirviLhxgRBNv", "hello world"}, - {Multihash.Type.sha3_512, "SHA3-512", "8tWhXW5oUwtPd9d3FnjuLP1NozN3vc45rmsoWEEfrZL1L6gi9dqi1YkZu5iHb2HJ8WbZaaKAyNWWRAa8yaxMkGKJmX", "hello world"} + @Test + void multihashTest() { + Object[][] examples = + new Object[][] { + {Multihash.Type.id, "ID", "13hC12xCn", "hello"}, + {Multihash.Type.id, "ID", "11", ""}, + {Multihash.Type.md5, "MD5", "fzhnUYo18W8ewDBzLuzLqc9Twp", "hello world"}, + {Multihash.Type.sha1, "SHA-1", "5drNu81uhrFLRiS4bxWgAkpydaLUPW", "hello world"}, + { + Multihash.Type.sha2_256, + "SHA-256", + "QmaozNR7DZHQK1ZcU9p7QdrshMvXqWK6gpu5rmrkPdT3L4", + "hello world" + }, + { + Multihash.Type.sha2_512, + "SHA-512", + "8Vtkv2tdQ43bNGdWN9vNx9GVS9wrbXHk4ZW8kmucPmaYJwwedXir52kti9wJhcik4HehyqgLrQ1hBuirviLhxgRBNv", + "hello world" + }, + { + Multihash.Type.sha3_512, + "SHA3-512", + "8tWhXW5oUwtPd9d3FnjuLP1NozN3vc45rmsoWEEfrZL1L6gi9dqi1YkZu5iHb2HJ8WbZaaKAyNWWRAa8yaxMkGKJmX", + "hello world" + } }; - for(Object[] ex: examples) { - try { - byte[] digest; - if (ex[0] != Multihash.Type.id) { - MessageDigest md = MessageDigest.getInstance((String) ex[1]); - assertNotNull(md); - md.update(((String) ex[3]).getBytes("UTF-8")); - digest = md.digest(); - } else - digest = ((String) ex[3]).getBytes("UTF-8"); - // Test constructor - Multihash m2 = new Multihash((Multihash.Type)ex[0], digest); - Multihash m = Multihash.fromBase58((String)ex[2]); - // Test comparison - assertEquals(m, m2); - // Test conversions - assertEquals(m.toBase58(), m2.toBase58()); - assertEquals(m.toBase58(), ex[2]); - // Test fromHex and toHex - Multihash m3 = Multihash.fromHex(m.toHex()); - assertEquals(m, m3); - } - catch (Exception e){ - System.out.println(e.getMessage()); - assertTrue(false); - } - } + for (Object[] ex : examples) { + try { + byte[] digest; + if (ex[0] != Multihash.Type.id) { + MessageDigest md = MessageDigest.getInstance((String) ex[1]); + Assertions.assertNotNull(md); + md.update(((String) ex[3]).getBytes("UTF-8")); + digest = md.digest(); + } else digest = ((String) ex[3]).getBytes("UTF-8"); + // Test constructor + Multihash m2 = new Multihash((Multihash.Type) ex[0], digest); + Multihash m = Multihash.fromBase58((String) ex[2]); + // Test comparison + Assertions.assertEquals(m, m2); + // Test conversions + Assertions.assertEquals(m.toBase58(), m2.toBase58()); + Assertions.assertEquals(m.toBase58(), ex[2]); + // Test fromHex and toHex + Multihash m3 = Multihash.fromHex(m.toHex()); + Assertions.assertEquals(m, m3); + } catch (Exception e) { + System.out.println(e.getMessage()); + Assertions.assertTrue(false); + } } - + } }