Solved

Java, does the order in which jar files are specified within a manifest file matter

Posted on 2014-01-14
6
767 Views
Last Modified: 2014-01-15
Ina manifest of a jar file, does the order in which the jars are listed matter.

WHll the former fars be able to acess the later jars.  Will the later jars be able to access the former jars

Thanks
0
Comment
Question by:Los Angeles1
6 Comments
 

Author Comment

by:Los Angeles1
ID: 39780687
To clarify, I mean two jar files referenced with in the Rsrc-Class-Path: of the manifest
0
 
LVL 26

Assisted Solution

by:dpearson
dpearson earned 167 total points
ID: 39780910
The order doesn't matter (unless you had the same class name in two of the jars - which should never happen).  They can all see each other and classes from any one can access classes from any other.

Doug
0
 
LVL 37

Assisted Solution

by:zzynx
zzynx earned 166 total points
ID: 39781565
Order doesn't matter at all.

You can think of it as follows:
- unzip all jars in the same root directory (respecting the sub directories they include)
- all the class files you become in the root directory (and it's subdirectories) this way are now visible for each java program using these jar files.
0
Complete VMware vSphere® ESX(i) & Hyper-V Backup

Capture your entire system, including the host, with patented disk imaging integrated with VMware VADP / Microsoft VSS and RCT. RTOs is as low as 15 seconds with Acronis Active Restore™. You can enjoy unlimited P2V/V2V migrations from any source (even from a different hypervisor)

 
LVL 86

Accepted Solution

by:
CEHJ earned 167 total points
ID: 39782012
I mean two jar files referenced with in the Rsrc-Class-Path: of the manifest
Sounds like a custom header. The normal one is Class-Path, in which order is irrelevant
0
 
LVL 86

Expert Comment

by:CEHJ
ID: 39782759
:)
0
 
LVL 37

Expert Comment

by:zzynx
ID: 39784655
Thanx 4 axxepting
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Introduction This article is the first of three articles that explain why and how the Experts Exchange QA Team does test automation for our web site. This article explains our test automation goals. Then rationale is given for the tools we use to a…
Java functions are among the best things for programmers to work with as Java sites can be very easy to read and prepare. Java especially simplifies many processes in the coding industry as it helps integrate many forms of technology and different d…
The viewer will learn how to implement Singleton Design Pattern in Java.
Connecting to an Amazon Linux EC2 Instance from Windows Using PuTTY.

932 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

10 Experts available now in Live!

Get 1:1 Help Now