diff --git a/pom.xml b/pom.xml
index 37ef221d7..f32439732 100644
--- a/pom.xml
+++ b/pom.xml
@@ -35,11 +35,11 @@ along with DependencyCheck. If not, see .
jeremy.long@gmail.com
-
- scm:git:git@github.com:jeremylong/DependencyCheck.git
- scm:git:git@github.com:jeremylong/DependencyCheck.git
- scm:git:git@github.com:jeremylong/DependencyCheck.git
-
+
+ scm:git:git@github.com:jeremylong/DependencyCheck.git
+ https://github.com/jeremylong/DependencyCheck.git
+ scm:git:git@github.com:jeremylong/DependencyCheck.git
+
GNU General Public License version 3
@@ -70,6 +70,11 @@ along with DependencyCheck. If not, see .
+
+ org.apache.maven.plugins
+ maven-release-plugin
+ 2.3.2
+
org.apache.maven.plugins
maven-javadoc-plugin
diff --git a/src/main/java/org/codesecure/dependencycheck/utils/CliParser.java b/src/main/java/org/codesecure/dependencycheck/utils/CliParser.java
index 485264a83..ae2738c75 100644
--- a/src/main/java/org/codesecure/dependencycheck/utils/CliParser.java
+++ b/src/main/java/org/codesecure/dependencycheck/utils/CliParser.java
@@ -20,14 +20,6 @@ package org.codesecure.dependencycheck.utils;
import java.io.File;
import java.io.FileNotFoundException;
-import java.io.IOException;
-import java.io.InputStream;
-import java.net.URL;
-import java.net.URLClassLoader;
-import java.util.jar.Attributes;
-import java.util.jar.Manifest;
-import java.util.logging.Level;
-import java.util.logging.Logger;
import org.apache.commons.cli.CommandLine;
import org.apache.commons.cli.CommandLineParser;
import org.apache.commons.cli.HelpFormatter;
@@ -231,9 +223,9 @@ public final class CliParser {
public void printHelp() {
HelpFormatter formatter = new HelpFormatter();
formatter.printHelp(Settings.getString("application.name", "DependencyCheck"),
- "\n" + Settings.getString("application.name", "DependencyCheck") +
- " can be used to identify if there are any known CVE vulnerabilities in libraries utillized by an application." +
- " " + Settings.getString("application.name", "DependencyCheck") + " will automatically update required data from the Internet, such as the CVE and CPE data files from nvd.nist.gov.\n",
+ "\n" + Settings.getString("application.name", "DependencyCheck")
+ + " can be used to identify if there are any known CVE vulnerabilities in libraries utillized by an application. "
+ + Settings.getString("application.name", "DependencyCheck") + " will automatically update required data from the Internet, such as the CVE and CPE data files from nvd.nist.gov.\n",
options, "", true);
}
diff --git a/src/main/java/org/codesecure/dependencycheck/utils/Settings.java b/src/main/java/org/codesecure/dependencycheck/utils/Settings.java
index 992472ee5..a53ddba99 100644
--- a/src/main/java/org/codesecure/dependencycheck/utils/Settings.java
+++ b/src/main/java/org/codesecure/dependencycheck/utils/Settings.java
@@ -94,12 +94,12 @@ public class Settings {
*/
public static String getString(String key, String defaultValue) {
String str = System.getProperty(key, instance.props.getProperty(key));
- if (str==null) {
+ if (str == null) {
str = defaultValue;
}
return str;
}
-
+
/**
* Returns a value from the properties file. If the value was specified as a
* system property or passed in via the -Dprop=value argument - this method
diff --git a/src/site/site.xml b/src/site/site.xml
index f8c2019f9..b6ebf8b99 100644
--- a/src/site/site.xml
+++ b/src/site/site.xml
@@ -3,8 +3,6 @@
DependencyCheck
-
-