You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
@@ -179,16 +179,16 @@ In this case, it is necessary to provide the absolute path of the agent:
179
179
The agent has options which are currently experimental and might be enabled in future releases, but can also be changed or removed entirely.
180
180
See the [ExperimentalAgentOptions.md](ExperimentalAgentOptions.md) guide.
181
181
182
-
## Native Image Configure Tool
182
+
## Native Image Utils Tool
183
183
184
184
When using the agent in multiple processes at the same time as described in the previous section, `config-output-dir` is a safe option, but it results in multiple sets of configuration files.
185
-
The `native-image-configure` tool can be used to merge these configuration files:
185
+
The `native-image-utils` tool can be used to merge these configuration files:
This command reads one set of configuration files from `/path/to/config-dir-0/` and another from `/path/to/config-dir-1/` and then writes a set of configuration files that contains both of their information to `/path/to/merged-config-dir/`.
191
-
An arbitrary number of `--input-dir` arguments with sets of configuration files can be specified. See `native-image-configure help` for all options.
191
+
An arbitrary number of `--input-dir` arguments with sets of configuration files can be specified. See `native-image-utils help` for all options.
Copy file name to clipboardExpand all lines: docs/reference-manual/native-image/ExperimentalAgentOptions.md
+3-4Lines changed: 3 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -63,11 +63,10 @@ To further filter the generated configuration, you can use `conditional-config-c
63
63
### Generating Conditional Configuration From Multiple Agent Runs
64
64
65
65
Conditional configuration can be generated from multiple agent runs that reach different code paths in the application.
66
-
Each agent run produces configuration with metadata. `native-image-configure` is then used to merge the collected data and produce a conditional configuration.
67
-
To run the agent in this mode, add `experimental-conditional-config-part` to the agent's command line.
68
-
Once all the agent runs have finished, you can generate a conditional configuration by invoking:
66
+
Each agent run produces configuration with metadata. After all agent runs have finished, you can use `native-image-utils` is then used to merge the collected data and produce a conditional configuration.
The Native Image Inspect Tool extracts embedded Software Bill of Materials (SBOM) from native executables. The functionality for extracting class-level metadata is no longer supported.
The PGO infrastructure enables you to combine multiple profiles into a single one using the [Native Image Configure Tool](AutomaticMetadataCollection.md#native-image-configure-tool).
10
+
The PGO infrastructure enables you to combine multiple profiles into a single one using the [Native Image Utils Tool](AutomaticMetadataCollection.md#native-image-utils-tool).
11
11
Merging profiles implies that the resulting profile will contain the union of all types, methods, and profile entries from the provided profiles.
12
12
13
13
## Usage
14
14
15
15
To merge two profiles, _profile_1.iprof_ and _profile_2.iprof_, into a single file named _output_profile.iprof_, use the following command:
To take it further, you can submit the SBOM to any available vulnerability scanner, and check if the recorded libraries have known security vulnerabilities.
Copy file name to clipboardExpand all lines: docs/security/Obfuscation.md
+4-4Lines changed: 4 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -108,10 +108,10 @@ Obfuscated names are non-deterministic and may vary between builds.
108
108
109
109
### Deobfuscating Stack Traces
110
110
111
-
To debug an obfuscated stack trace, save the stack trace to a file (for example, `obfuscated-stacktrace.log`) and use `native-image-configure` with the mapping file:
111
+
To debug an obfuscated stack trace, save the stack trace to a file (for example, `obfuscated-stacktrace.log`) and use `native-image-utils` with the mapping file:
Exception in thread "main" java.lang.RuntimeException: Something bad happened!
117
117
at com.obfuscation.SecretClass.secretAlgorithm(SecretClass.java:14)
@@ -121,7 +121,7 @@ Exception in thread "main" java.lang.RuntimeException: Something bad happened!
121
121
This restores the original names for debugging the issue, while keeping your distributed binary obfuscated.
122
122
Log file lines not part of the stack trace remain unchanged.
123
123
124
-
You can locate the `native-image-configure` tool in the same `bin` directory as `native-image`.
124
+
You can locate the `native-image-utils` tool in the same `bin` directory as `native-image`.
125
125
126
126
## What Gets Obfuscated
127
127
@@ -149,7 +149,7 @@ JUnit-related code is automatically preserved for testing compatibility.
149
149
## Understanding the Mapping File
150
150
151
151
When you use `export-mapping`, Native Image generates a JSON file named _\<image-name\>.obfuscation-mapping.json_ in your build artifacts.
152
-
This file maps original symbol names to their obfuscated versions, allowing `native-image-configure deobfuscate` to reverse the process.
152
+
This file maps original symbol names to their obfuscated versions, allowing `native-image-utils deobfuscate` to reverse the process.
153
153
Mappings can change per build, so associate mapping files with specific build versions or IDs for reliable deobfuscation.
154
154
155
155
The mapping file lists the `[original, obfuscated]` name pairs of modules, packages, source files, types (classes, records, interfaces, enums), and methods.
@@ -137,9 +137,9 @@ It also integrates with GitHub Actions, GitLab, and Jenkins Pipelines.
137
137
138
138
Another popular command-line scanner is `grype`, part of the [Anchore software supply chain management platform](https://anchore.com/){:target="_blank"}.
139
139
With `grype`, you can check whether the libraries listed in your SBOMs have known vulnerabilities documented in Anchore's database.
140
-
The output of the `native-image-configure` tool can be fed directly into `grype` to scan for vulnerable libraries using the following command:
140
+
The output of the `native-image-utils` tool can be fed directly into `grype` to scan for vulnerable libraries using the following command:
0 commit comments