mount -t cifs -o username=xxx,password=xxx,workgroup=xx,iocharset=utf8 //share.domain/folder /localfolder
Read Morepublic class NameRuleTest { @Rule public TestName name = new TestName(); @Test public void testA() { assertEquals("testA", name.getMethodName()); } @Test public void testB() { assertEquals("testB", name.getMethodName()); }}
Read MoreP2 install wizard firstly query the repository to find out the root installable unit(as well as top installable). Then p2 recalculate the dependency and try to search the requirements in all available repositories after user submits their installation request. Go to the license agreement page if all the dependencies …
Read MoreSetup SSH without password. a) execute "ssh-keygen -t rsa" under your linux/unix login to get the RSA keys. (press Enter for all) You will get 2 files uner ~/.ssh/, id_rsa and id_rsa.pub b) Put the public key id_rsa.pub to your remote host: ~/.ssh/authorized_keys If the remote host share the same nfs, just try " cat …
Read MoreI wrote a plug-in to simplify the process to install the same plug-ins in different platform or different workstation. Anyone is interested in it, pls follow below guide to freely use it. http://code.google.com/p/kane-toolkit/wiki/P2Replication Enjoy it.
Read MoreHow Equinox load bundles Equinox launcher is responsible to start OSGi framework. The system bundle would be created and marked as installed when initializing the framework. Equinox also tries to install the installed bundles if finding them in persistence data during the initializing period. Of course there is no …
Read MoreLearn p2 step by step See this link for detail Learn P2 step by step p2 concept p2 install p2 install practice p2 repository publish customized p2 touchpoint p2 repository publish practice Example Code Reference p2 concept 首先来理解p2引入的几个概念[1] p2 / Agent The provisioning infrastructure on client machines Installable Unit …
Read Moressh -qTfnN -D LocalPort remotehost All the added options are for a ssh session that's used for tunneling. -q :- be very quite, we are acting only as a tunnel. -T :- Do not allocate a pseudo tty, we are only acting a tunnel. -f :- move the ssh process to background, as we don't want to interact with this ssh session …
Read More