Description:
Another attempt at commons-jelly-1.0.1-RC2
Deployer properties:
- "userAgent" = "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_12_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.101 Safari/537.36"
- "userId" = "chtompki"
- "ip" = "199.244.219.39"
Details:
The following artifacts have been staged
/commons-jelly/commons-jelly/1.0.1/commons-jelly-1.0.1-tests.jar.asc
(SHA1: f0117a1f2b32164e1edcd54188ffe232e0304d7f)
/commons-jelly/commons-jelly/1.0.1/commons-jelly-1.0.1-tests.jar
(SHA1: e7f7c80dbb05472fcd211a5c726b554ecab02770)
/commons-jelly/commons-jelly/1.0.1/commons-jelly-1.0.1.jar
(SHA1: da868784b796b2c20e5e645ed2739f38c5b74454)
/commons-jelly/commons-jelly/1.0.1/commons-jelly-1.0.1-sources.jar
(SHA1: 939a76c00db4ea2463fe57e708299a5a989087e2)
/commons-jelly/commons-jelly/1.0.1/commons-jelly-1.0.1-test-sources.jar
(SHA1: b6459e04b66bce00d7b230eef3fa5fefc160ccc1)
/commons-jelly/commons-jelly/1.0.1/commons-jelly-1.0.1.pom.asc
(SHA1: 572e91a206c52ac5c51834e0186a53c9de8246b3)
/commons-jelly/commons-jelly/1.0.1/commons-jelly-1.0.1.jar.asc
(SHA1: f0154dc77befe4f89141a3806e43967869a29ef5)
/commons-jelly/commons-jelly/1.0.1/commons-jelly-1.0.1.pom
(SHA1: 65333d0abdce02b3ae3a54c513c19b7aa04749ba)
/commons-jelly/commons-jelly/1.0.1/commons-jelly-1.0.1-javadoc.jar.asc
(SHA1: ec4465d236ba78415eb6a7aea44b197d5f643934)
/commons-jelly/commons-jelly/1.0.1/commons-jelly-1.0.1-test-sources.jar.asc
(SHA1: ae1175942a746bf3e40176a3089edb2f2fd89e43)
/commons-jelly/commons-jelly/1.0.1/commons-jelly-1.0.1-sources.jar.asc
(SHA1: 2cb35149c8fa3b26af9684abeeb0d7e7655e18f9)
/commons-jelly/commons-jelly/1.0.1/commons-jelly-1.0.1-javadoc.jar
(SHA1: 3f4cfaccff8c8448f216c60c428dbd2eff7b2313)
Action performed by Rob Tompkins (chtompki)