Full name:
net.adamcin.oakpal:oakpal-maven-plugin:2.2.2:scan
Description:
Attributes:
Name | Type | Since | Description |
---|---|---|---|
<summaryFile> | File | 0.1.0 | The summary file to read integration test results from. Default value is: ${project.build.directory}/oakpal-plugin/reports/oakpal-summary.json. |
Name | Type | Since | Description |
---|---|---|---|
<blobStorePath> | String | 1.4.0 | Specify a different blob store path. Default value is: ${project.build.directory}/oakpal-plugin/blobs. |
<checklists> | List | 0.6.0 | Specify a list of checklist ids [module/]name to
enforce. |
<checks> | List | 0.5.0 | Specify a list of Checks to locate and load as
ProgressChecks.
Minimally, there are two ways to define a CheckSpec. To load a check from the project's test output directory, you must specify the impl value as a classPath-relative resource name for script checks, or as a fully-qualified class name for Java ProgressCheck implementations. For example, if your script check source is located at src/test/resources/OAKPAL-INF/scripts/acme-vault-enforcer.js: <checks> <check> <impl>OAKPAL-INF/scripts/acme-vault-enforcer.js</impl> </check> </checks> If your impl represents a script check or a ProgressCheckFactory, you can also provide a config element that will be translated to a JsonObject by the JsonConverter via the OakpalComponentConfigurator: <checks> <check> <impl>OAKPAL-INF/scripts/acme-vault-enforcer.js</impl> <config> <apples> <apple>Granny Smith</apple> <apple>Red Delicious</apple> <apple>IIe</apple> </apples> <requirePolicyNode>true</requirePolicyNode> </config> </check> </checks> To reference a check from a specific checklist, available on the plugin or project test-scope classpath, you should not specify the impl property, but instead reference it by name, in one of the following formats, in order of increasing specificity,
For example, the oakpal core library provides some useful checks in the basic checklist, like echo, which prints progress events to System.out: <checks> <check> <name>net.adamcin.oakpal.core/basic/echo</name> </check> </checks> It can also be referenced by shorter forms: <checks> <check> <name>basic/echo</name> </check> </checks> <checks> <check> <name>echo</name> </check> </checks> You can also override the configs defined by a checklist for a given check: <checks> <check> <name>basic/paths</name> <config> <rules> <rule> <pattern>/etc/tags(/.*)?</pattern> <type>deny</type> </rule> <rule> <pattern>/etc/tags/acme(/.*)?</pattern> <type>allow</type> </rule> </rules> <denyAllDeletes>true</denyAllDeletes> </config> </check> </checks> |
<cndNames> | List | 0.4.0 | Specify a list of Compact NodeType Definition (CND) resource names
(to discover in the test-scope classpath) to import before any
packages are installed during the scan. This is usually necessary
for proprietary CRX applications like AEM. Use "Tools - Export Node
Type" in CRX/de lite to export all nodetypes and save it to a file
in your project code base on the test-scope class path (i.e. in
src/main/resources of a common test-scoped dependency,
or under src/test/resources of the referencing
module). |
<deferBuildFailure> | boolean | 1.1.0 | If violations are reported, defer the build failure until a
subsequent verify goal. Set this to true when build has more than
one scan execution, so that all errors can be reported. Otherwise,
the first execution with failure-level violations will fail the
build before the subsequent scan executions have a chance to run.
If this is set to true, be sure the verify goal has been activated for the build, otherwise violations will not be printed and failure-level violations will be implicitly ignored. |
<enablePreInstallHooks> | boolean | 1.4.0 | If this is set to true, InstallHooks in pre-install packages will
be enabled. |
<failOnSeverity> | Severity | 0.1.0 | Specify the minimum violation severity level that will trigger
plugin execution failure. Valid options are
Severity.MINOR, Severity.MAJOR, and
Severity.SEVERE.
FYI: FileVault Importer errors are reported as MAJOR by default. Default value is: MAJOR. |
<forcedRoots> | List | 0.2.0 | Specify a list of paths with associated primaryType and mixinTypes
values to create in the repository before installing any packages
for the scan. This should only be necessary for packages that you
are pre-installing and do not have the ability to adjust to ensure
that they contain the necessary DocView XML files to ensure content
structure nodetype dependencies are self-contained in the package
that depends on them.
For example, to ensure that /home/users/system is created as a rep:AuthorizableFolder, you would add a forcedRoot element with a path of "/home/users/system" and a primaryType of "rep:AuthorizableFolder". <forcedRoots> <forcedRoot> <path>/home/users/system</path> <primaryType>rep:AuthorizableFolder</primaryType> <mixinTypes> <mixinType>rep:AccessControllable</mixinType> </mixinTypes> </forcedRoot> </forcedRoots> |
<installHookPolicy> | InstallHookPolicy | 1.4.0 | Specify a policy for InstallHooks in scanned packages. The possible
values are:
|
<jcrNamespaces> | List | 0.2.0 | Specify a list of additional JCR namespaces to register before
installing any packages for the scan.
For example: <jcrNamespaces> <jcrNamespace> <prefix>crx</prefix> <uri>http://www.day.com/crx/1.0</uri> </jcrNamespace> </jcrNamespaces> |
<jcrPrivileges> | List | 0.2.0 | Specify a list of additional JCR privileges to register before
installing any packages for the scan.
For example: <jcrPrivileges> <jcrPrivilege>crx:replicate</jcrPrivilege> </jcrPrivileges> |
<preInstallArtifacts> | List | 0.2.0 | Specify a list of content-package artifacts to download and
pre-install before the scanned packages.
For example: <preInstallArtifacts> <preInstallArtifact> <groupId>com.adobe.acs</groupId> <artifactId>acs-aem-commons-content</artifactId> <version>3.9.0</version> <type>zip</type> </preInstallArtifact> </preInstallArtifacts> |
<preInstallFiles> | List | 0.2.0 | Specify a list of content package files by path to pre-install,
which have already been built or downloaded in a previous phase. |
<repoInit> | String | 2.1.0 | Specify an inline repoinit script. This will be applied after all
other state initialization parameters, including
repoInitFiles. See
https://sling.apache.org/documentation/bundles/repository-initialization.html
.
Examples: <repoInit> create path /apps create path (sling:Folder) /content/dam </repoInit> <repoInit> <![CDATA[ register nodetypes <<=== <'sling'='http://sling.apache.org/jcr/sling/1.0'> [sling:Folder] > nt:folder, nt:unstructured ===>> ]]> </repoInit> User property is: repoInit. |
<repoInitFiles> | List | 2.1.0 | Specify a list of file paths to repoinit scripts. These will be
applied in the configured order prior to any instructions specified
in the inline repoInit parameter, but only after
applying all the other state initialization parameters like
jcrNamespaces, jcrPrivileges,
preInstallArtifacts, etc. See
https://sling.apache.org/documentation/bundles/repository-initialization.html
. User property is: repoInitFiles. |
<runModes> | List | 2.2.0 | Specify a list of Sling run modes to simulate for installation of
embedded filevault packages and RepositoryInitializer factory
configs that provide repoinit scripts. See
https://sling.apache.org/documentation/bundles/repository-initialization.html
. See
https://sling.apache.org/documentation/bundles/repository-initialization.html
. User property is: runModes. |
<silenceAllSubpackages> | boolean | 1.5.0 | Set to true to suppress progress check events generated by
subpackage installation (and the resulting violations) during the
scan. Subpackages will still be installed, and fatal package
exceptions will still fail the scan. |
<skip> | boolean | 0.1.0 | Specifically skip this plugin's execution. User property is: oakpal.scan.skip. |
<skipITs> | boolean | 0.1.0 | Conventional switch to skip integration-test phase goals. User property is: skipITs. |
<skipTests> | boolean | 0.1.0 | Conventional switch to skip test and integration-test phase goals. User property is: skipTests. |
<slingNodeTypes> | boolean | 0.4.0 | Enable automatic discovery and installation of CND files referenced
in Sling-Nodetypes Manifest headers in the plugin
dependencies or the project's test-scope dependencies. |
<storeBlobs> | boolean | 1.4.1 | Set to true to disable the blob store configured by
blobStorePath. This forces the blobs to exist in the
memory node store, which should run faster, but can more easily
exhaust heap with larger packages. User property is: storeBlobs. |
Minimally, there are two ways to define a CheckSpec. To load a check from the project's test output directory, you must specify the impl value as a classPath-relative resource name for script checks, or as a fully-qualified class name for Java ProgressCheck implementations.
For example, if your script check source is located at src/test/resources/OAKPAL-INF/scripts/acme-vault-enforcer.js:
<checks> <check> <impl>OAKPAL-INF/scripts/acme-vault-enforcer.js</impl> </check> </checks>
If your impl represents a script check or a ProgressCheckFactory, you can also provide a config element that will be translated to a JsonObject by the JsonConverter via the OakpalComponentConfigurator:
<checks> <check> <impl>OAKPAL-INF/scripts/acme-vault-enforcer.js</impl> <config> <apples> <apple>Granny Smith</apple> <apple>Red Delicious</apple> <apple>IIe</apple> </apples> <requirePolicyNode>true</requirePolicyNode> </config> </check> </checks>
To reference a check from a specific checklist, available on the plugin or project test-scope classpath, you should not specify the impl property, but instead reference it by name, in one of the following formats, in order of increasing specificity,
For example, the oakpal core library provides some useful checks in the basic checklist, like echo, which prints progress events to System.out:
<checks> <check> <name>net.adamcin.oakpal.core/basic/echo</name> </check> </checks>
It can also be referenced by shorter forms:
<checks> <check> <name>basic/echo</name> </check> </checks>
<checks> <check> <name>echo</name> </check> </checks>
You can also override the configs defined by a checklist for a given check:
<checks> <check> <name>basic/paths</name> <config> <rules> <rule> <pattern>/etc/tags(/.*)?</pattern> <type>deny</type> </rule> <rule> <pattern>/etc/tags/acme(/.*)?</pattern> <type>allow</type> </rule> </rules> <denyAllDeletes>true</denyAllDeletes> </config> </check> </checks>
If this is set to true, be sure the verify goal has been activated for the build, otherwise violations will not be printed and failure-level violations will be implicitly ignored.
FYI: FileVault Importer errors are reported as MAJOR by default.
For example, to ensure that /home/users/system is created as a rep:AuthorizableFolder, you would add a forcedRoot element with a path of "/home/users/system" and a primaryType of "rep:AuthorizableFolder".
<forcedRoots> <forcedRoot> <path>/home/users/system</path> <primaryType>rep:AuthorizableFolder</primaryType> <mixinTypes> <mixinType>rep:AccessControllable</mixinType> </mixinTypes> </forcedRoot> </forcedRoots>
For example:
<jcrNamespaces> <jcrNamespace> <prefix>crx</prefix> <uri>http://www.day.com/crx/1.0</uri> </jcrNamespace> </jcrNamespaces>
For example:
<jcrPrivileges> <jcrPrivilege>crx:replicate</jcrPrivilege> </jcrPrivileges>
For example:
<preInstallArtifacts> <preInstallArtifact> <groupId>com.adobe.acs</groupId> <artifactId>acs-aem-commons-content</artifactId> <version>3.9.0</version> <type>zip</type> </preInstallArtifact> </preInstallArtifacts>
Examples:
<repoInit> create path /apps create path (sling:Folder) /content/dam </repoInit>
<repoInit> <![CDATA[ register nodetypes <<=== <'sling'='http://sling.apache.org/jcr/sling/1.0'> [sling:Folder] > nt:folder, nt:unstructured ===>> ]]> </repoInit>