Readme.txt - fbug - Project Hosting on Google Code.
Il s'agit d'une version évoluée et plus complexe (envoyé par mail par JohnJBarton : qui avait déjà réalisé signontheline pour mccoy) – uglycharly
Using JConsole to Monitor Applications. Oracle Oracle Oracle Technology Network > Java New Java ME Embedded 8.2 Release Posted 09/17/15 // Tags: Java, Small Devices, Java ME // Headlines Archive Software Downloads View All Downloads Top Downloads New Downloads What's New Java in the Cloud: Rapidly develop and deploy Java business applications in the cloud.
Je n'ai pas réussi à installer moi-meme l'extension de Johnjbarton pour mccoy, il me conseille de debugger en jconsole pour comprendre pourquoi le GUI de SignOnTheLine s'ouvre malgré la ligne de commande et les arguments passés – uglycharly
Essential Links Developer Spotlight Blogs Technologies Integrated Cloud Applications and Platform Services.
Automation using ANT - Replacing tokens in a file - rajesh. Description Replace is a directory based task for replacing the occurrence of a given string with another string in selected file.
If you want to replace a text that crosses line boundaries, you must use a nested <replacetoken> element. The output file is only written if it differs from the existing file. This prevents spurious rebuilds based on unchanged files which have been regenerated by this task. McCoy - MDC. I find this page insufficient to teach me what I need to do.
I have themes for Firefox hosted on AMO. I have been trying to use McCoy to make them secure in anticipation of fx3. I have installed and run McCoy. I have used McCoy to install an update code to one of my themes. But now what? How does one test a theme's security? This test theme is sitting in its directory. Bottom line here: you need to have both a themer and an extension developer go through the process of securing a theme, and then provide the rest of us with step-by-step directions. I find the discussion on updates.rdf, for example, to be entirely unhelpful. Ed Hume (SphereGnome, etc.) Right now, I build my xpi files using an ANT build process. Lars Mortenson Alternate instructions (updated to make it more clear, hopefully): Install McCoy Run McCoy, ignore the security warning, publisher cannot be verified -> not so good for a security product!
The menu items are Keys Extension Update Help Additional requirements: Mozilla Mccoy tool from the command line - Techno barje. We have seen in the previous post how to build an headless xulrunner application.
My first use case was enabling the Mozilla Mccoy application to launch from command line. That allows me to build a bash script which create nightly builds of a firefox extension automatically updated by Firefox every day!. Here is the resulting Mccoy version : Linux i686 patched build of Mccoy: mccoy-0.5-command-line.tar.gzPatch based on 0.5 official release: mccoy-0.5-command-line.patch Now, a summary of each command line arguments : # Create a new named public/private key $ .
McCoy. McCoy is a simple XULRunner based application that enables add-on authors to provide secure updates to their users.
Specifically it focuses on the process of digitally signing update manifests so the client applications can verify the integrity of a manifest retrieved over normally insecure channels. The goal of McCoy is to enable the secure hosting of add-on updates in as convenient a manner as possible. The primary target audience of McCoy is add-on developers who for whatever reason SSL based hosting is not an option. Primarily we focus on single developers (teams generally being more likely to have access to funding to use SSL based security).
Below are the release versions of McCoy. User Interface The user interface guidelines give an overview of how the application is structured and what additional widgets are available. Bugs Any bugs or feature enhancements should be filed in bugzilla. Source Code McCoy is available from Mozilla's Mercurial repository. Hg clone. McCoy - MDC. McCoy is an application that allows add-on authors to provide secure updates to their users.
Applications periodically look for and install updates to their add-ons. It's important that the update information retrieved has not been tampered with since being written by the add-on author. Specifically, it focuses on the process of digitally signing update manifests so the applications can verify the integrity of a manifest retrieved over normally insecure channels.
If you want to learn about the technical details of McCoy then visit the project wiki. Fireclipse - Revision 283: /trunk/FireclipseExtensions/chromebug/mccoy/signOnTheLine.