This is an automated email from the ASF dual-hosted git repository.

git-site-role pushed a commit to branch asf-staging
in repository https://gitbox.apache.org/repos/asf/jena-site.git


The following commit(s) were added to refs/heads/asf-staging by this push:
     new 7c1de524d Staged site from formatting-event-handler 
(6abb715e38208c5c622f64644b7193a709c6fde6)
7c1de524d is described below

commit 7c1de524db8ac11ba0b36ed43960b1036f21ca6d
Author: jenkins <[email protected]>
AuthorDate: Tue Jun 6 19:18:00 2023 +0000

    Staged site from formatting-event-handler 
(6abb715e38208c5c622f64644b7193a709c6fde6)
---
 content/about_jena/security-advisories.html        | 26 ++++++++++----
 .../documentation/notes/event-handler-howto.html   | 40 ++++++++++------------
 .../documentation/query/javascript-functions.html  |  3 ++
 content/download/index.html                        | 36 +++++++++----------
 content/index.json                                 |  2 +-
 content/sitemap.xml                                | 14 ++++----
 6 files changed, 67 insertions(+), 54 deletions(-)

diff --git a/content/about_jena/security-advisories.html 
b/content/about_jena/security-advisories.html
index 977053521..00da06cd1 100644
--- a/content/about_jena/security-advisories.html
+++ b/content/about_jena/security-advisories.html
@@ -183,6 +183,7 @@
   </ul>
 
   <ul>
+    <li><a 
href="#cve-2023-22665---exposure-of-arbitrary-execution-in-script-engine-expressions">CVE-2023-22665
 - Exposure of arbitrary execution in script engine expressions.</a></li>
     <li><a 
href="#cve-2022-45136---jdbc-serialisation-in-apache-jena-sdb">CVE-2022-45136 - 
JDBC Serialisation in Apache Jena SDB</a></li>
     <li><a href="#cve-2022-28890---processing-external-dtds">CVE-2022-28890 - 
Processing External DTDs</a></li>
     <li><a 
href="#cve-2021-39239---xml-external-entity-xxe-vulnerability">CVE-2021-39239 - 
XML External Entity (XXE) Vulnerability</a></li>
@@ -225,23 +226,33 @@ appropriate to the severity of the issue.</p>
 <p>The following CVEs specifically relate to the Jena codebase itself and have 
been addressed by the project. Per our
 policy above we advise users to always utilise the latest Jena release 
available.</p>
 <p>Please refer to the individual CVE links for further details and 
mitigations.</p>
+<h2 
id="cve-2023-22665---exposure-of-arbitrary-execution-in-script-engine-expressions">CVE-2023-22665
 - Exposure of arbitrary execution in script engine expressions.</h2>
+<p><a href="https://www.cve.org/CVERecord?id=CVE-2023-22665";>CVE-2023</a> 
affects Jena 3.7.0 through 4.7.0 and relates to the
+<a 
href="https://jena.apache.org/documentation/query/javascript-functions.html";>Javascript
 SPARQL Functions</a> feature of our ARQ
+SPARQL engine.</p>
+<p>From Jena 4.8.0 onwards this feature <strong>MUST</strong> be explicitly 
enabled by end users, and on newer JVMs (Java 17 onwards) a
+JavaScript script engine <strong>MUST</strong> be explicitly added to the 
environment.</p>
+<p>However, when enabled this feature does expose the majority of the 
underlying scripting engine directly to SPARQL
+queries so may provide a vector for arbitrary code execution.  Therefore, it 
is recommended that this feature remain
+disabled for any publicly accessible deployment that utilises the ARQ query 
engine.</p>
+<p>Users should upgrade to latest Jena 4.x <a href="../download/">release</a> 
available.</p>
 <h2 id="cve-2022-45136---jdbc-serialisation-in-apache-jena-sdb">CVE-2022-45136 
- JDBC Serialisation in Apache Jena SDB</h2>
-<p><a 
href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45136";>CVE-2022-45136</a>
 affects all versions of <a href="../documentation/archive/sdb/">Jena
+<p><a 
href="https://www.cve.org/CVERecord?id=CVE-2022-45136";>CVE-2022-45136</a> 
affects all versions of <a href="../documentation/archive/sdb/">Jena
 SDB</a> up to and including the final <code>3.17.0</code> release.</p>
 <p>Apache Jena SDB has been EOL since December 2020 and we recommend any 
remaining users migrate to <a href="../documentation/tdb2/">Jena TDB
 2</a> or other 3rd party vendor alternatives.</p>
 <p>Apache Jena would like to thank Crilwa &amp; LaNyer640 for reporting this 
issue</p>
 <h2 id="cve-2022-28890---processing-external-dtds">CVE-2022-28890 - Processing 
External DTDs</h2>
-<p><a 
href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28890";>CVE-2022-28890</a>
 affects the RDF/XML parser in Jena 4.4.0
+<p><a 
href="https://www.cve.org/CVERecord?id=CVE-2022-28890";>CVE-2022-28890</a> 
affects the RDF/XML parser in Jena 4.4.0
 only.</p>
 <p>Users should upgrade to latest Jena 4.x <a href="../download/">release</a> 
available.</p>
 <p>Apache Jena would like to thank Feras Daragma, Avishag Shapira &amp; Amit 
Laish (GE Digital, Cyber Security Lab) for their
 report.</p>
 <h2 id="cve-2021-39239---xml-external-entity-xxe-vulnerability">CVE-2021-39239 
- XML External Entity (XXE) Vulnerability</h2>
-<p><a 
href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39239";>CVE-2021-39239</a>
 affects XML parsing up to and including the Jena <code>4.1.0</code> 
release.</p>
+<p><a 
href="https://www.cve.org/CVERecord?id=CVE-2021-39239";>CVE-2021-39239</a> 
affects XML parsing up to and including the Jena <code>4.1.0</code> release.</p>
 <p>Users should upgrade to latest Jena 4.x <a href="../download/">release</a> 
available.</p>
 <h2 
id="cve-2021-33192---display-information-ui-xss-in-apache-jena-fuseki">CVE-2021-33192
 - Display information UI XSS in Apache Jena Fuseki</h2>
-<p><a 
href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33192";>CVE-2021-33192</a>
 affected
+<p><a 
href="https://www.cve.org/CVERecord?id=CVE-2021-33192";>CVE-2021-33192</a> 
affected
 <a href="../documentation/fuseki2/">Fuseki</a> versions <code>2.0.0</code> 
through <code>4.0.0</code>.</p>
 <p>Users should upgrade to latest Jena 4.x <a href="../download/">release</a> 
available.</p>
 <h1 id="cves-in-jena-dependencies">CVEs in Jena Dependencies</h1>
@@ -249,9 +260,9 @@ report.</p>
 standard <a href="#security-issue-policy">Security Issue Policy</a> applies 
and any necessary dependency updates, dependency API
 and/or configuration changes have been adopted and released as soon as 
appropriate.</p>
 <h2 id="log4shell">log4shell</h2>
-<p><a 
href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45046";>CVE-2021-45105</a>,
-<a 
href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45105";>CVE-2021-45105</a>
 and
-<a 
href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44832";>CVE-2021-44832</a>,
 collectively known as
+<p><a 
href="https://www.cve.org/CVERecord?id=CVE-2021-45046";>CVE-2021-45105</a>,
+<a href="https://www.cve.org/CVERecord?id=CVE-2021-45105";>CVE-2021-45105</a> 
and
+<a href="https://www.cve.org/CVERecord?id=CVE-2021-44832";>CVE-2021-44832</a>, 
collectively known as
 <a href="https://en.wikipedia.org/wiki/Log4Shell";>log4shell</a> were several 
vulnerabilities identified in the <a 
href="https://logging.apache.org/log4j/2.x/index.html";>Apache
 Log4j</a> project that Jena uses as the concrete logging implementation
 for <a href="../documentation/fuseki2/">Fuseki</a> and our command line 
tools.</p>
@@ -272,6 +283,7 @@ for <a href="../documentation/fuseki2/">Fuseki</a> and our 
command line tools.</
   </ul>
 
   <ul>
+    <li><a 
href="#cve-2023-22665---exposure-of-arbitrary-execution-in-script-engine-expressions">CVE-2023-22665
 - Exposure of arbitrary execution in script engine expressions.</a></li>
     <li><a 
href="#cve-2022-45136---jdbc-serialisation-in-apache-jena-sdb">CVE-2022-45136 - 
JDBC Serialisation in Apache Jena SDB</a></li>
     <li><a href="#cve-2022-28890---processing-external-dtds">CVE-2022-28890 - 
Processing External DTDs</a></li>
     <li><a 
href="#cve-2021-39239---xml-external-entity-xxe-vulnerability">CVE-2021-39239 - 
XML External Entity (XXE) Vulnerability</a></li>
diff --git a/content/documentation/notes/event-handler-howto.html 
b/content/documentation/notes/event-handler-howto.html
index 10afdacfb..5bc622699 100644
--- a/content/documentation/notes/event-handler-howto.html
+++ b/content/documentation/notes/event-handler-howto.html
@@ -202,28 +202,26 @@ refine or reduce the implementation as more experience is 
gained with
 it.</p>
 <p>To monitor a Model, you must <em>register</em> a 
<em>ModelChangedListener</em>
 with that Model:</p>
-<pre><code>    Model m = ModelFactory.createDefaultModel();
-    ModelChangedListener L = new MyListener();
-    m.register( L );
-</code></pre>
-<p><em>MyListener</em> must be an implementation of 
<em>ModelChangedListener</em>,
+<div class="highlight"><pre tabindex="0" 
style="background-color:#f8f8f8;-moz-tab-size:4;-o-tab-size:4;tab-size:4;"><code
 class="language-java" data-lang="java"><span style="display:flex;"><span>Model 
m <span style="color:#666">=</span> ModelFactory<span 
style="color:#666">.</span><span 
style="color:#b44">createDefaultModel</span><span style="color:#666">();</span>
+</span></span><span style="display:flex;"><span>ModelChangedListener L <span 
style="color:#666">=</span> <span 
style="color:#a2f;font-weight:bold">new</span> MyListener<span 
style="color:#666">();</span>
+</span></span><span style="display:flex;"><span>m<span 
style="color:#666">.</span><span style="color:#b44">register</span><span 
style="color:#666">(</span> L <span style="color:#666">);</span>
+</span></span></code></pre></div><p><em>MyListener</em> must be an 
implementation of <em>ModelChangedListener</em>,
 for example:</p>
-<pre><code>    class MyListener implements ModelChangedListener
-        {
-        public void addedStatement( Statement s )
-            { System.out.println( &quot;&gt;&gt; added statement &quot; + s ); 
}
-        public void addedStatements( Statement [] statements ) {}
-        public void addedStatements( List statements ) {}
-        public void addedStatements( StmtIterator statements ) {}
-        public void addedStatements( Model m ) {}
-        public void removedStatement( Statement s ) {}
-        public void removedStatements( Statement [] statements ) {}
-        public void removedStatements( List statements ) {}
-        public void removedStatements( StmtIterator statements ) {}
-        public void removedStatements( Model m ) {}
-        }
-</code></pre>
-<p>This listener ignores everything except the addition of single
+<div class="highlight"><pre tabindex="0" 
style="background-color:#f8f8f8;-moz-tab-size:4;-o-tab-size:4;tab-size:4;"><code
 class="language-java" data-lang="java"><span style="display:flex;"><span><span 
style="color:#a2f;font-weight:bold">class</span> <span 
style="color:#00f">MyListener</span> <span 
style="color:#a2f;font-weight:bold">implements</span> ModelChangedListener
+</span></span><span style="display:flex;"><span><span 
style="color:#666">{</span>
+</span></span><span style="display:flex;"><span>    <span 
style="color:#a2f;font-weight:bold">public</span> <span 
style="color:#0b0;font-weight:bold">void</span> <span 
style="color:#00a000">addedStatement</span><span style="color:#666">(</span> 
Statement s <span style="color:#666">)</span>
+</span></span><span style="display:flex;"><span>        <span 
style="color:#666">{</span> System<span style="color:#666">.</span><span 
style="color:#b44">out</span><span style="color:#666">.</span><span 
style="color:#b44">println</span><span style="color:#666">(</span> <span 
style="color:#b44">&#34;&gt;&gt; added statement &#34;</span> <span 
style="color:#666">+</span> s <span style="color:#666">);</span> <span 
style="color:#666">}</span>
+</span></span><span style="display:flex;"><span>    <span 
style="color:#a2f;font-weight:bold">public</span> <span 
style="color:#0b0;font-weight:bold">void</span> <span 
style="color:#00a000">addedStatements</span><span style="color:#666">(</span> 
Statement <span style="color:#666">[]</span> statements <span 
style="color:#666">)</span> <span style="color:#666">{}</span>
+</span></span><span style="display:flex;"><span>    <span 
style="color:#a2f;font-weight:bold">public</span> <span 
style="color:#0b0;font-weight:bold">void</span> <span 
style="color:#00a000">addedStatements</span><span style="color:#666">(</span> 
List statements <span style="color:#666">)</span> <span 
style="color:#666">{}</span>
+</span></span><span style="display:flex;"><span>    <span 
style="color:#a2f;font-weight:bold">public</span> <span 
style="color:#0b0;font-weight:bold">void</span> <span 
style="color:#00a000">addedStatements</span><span style="color:#666">(</span> 
StmtIterator statements <span style="color:#666">)</span> <span 
style="color:#666">{}</span>
+</span></span><span style="display:flex;"><span>    <span 
style="color:#a2f;font-weight:bold">public</span> <span 
style="color:#0b0;font-weight:bold">void</span> <span 
style="color:#00a000">addedStatements</span><span style="color:#666">(</span> 
Model m <span style="color:#666">)</span> <span style="color:#666">{}</span>
+</span></span><span style="display:flex;"><span>    <span 
style="color:#a2f;font-weight:bold">public</span> <span 
style="color:#0b0;font-weight:bold">void</span> <span 
style="color:#00a000">removedStatement</span><span style="color:#666">(</span> 
Statement s <span style="color:#666">)</span> <span style="color:#666">{}</span>
+</span></span><span style="display:flex;"><span>    <span 
style="color:#a2f;font-weight:bold">public</span> <span 
style="color:#0b0;font-weight:bold">void</span> <span 
style="color:#00a000">removedStatements</span><span style="color:#666">(</span> 
Statement <span style="color:#666">[]</span> statements <span 
style="color:#666">)</span> <span style="color:#666">{}</span>
+</span></span><span style="display:flex;"><span>    <span 
style="color:#a2f;font-weight:bold">public</span> <span 
style="color:#0b0;font-weight:bold">void</span> <span 
style="color:#00a000">removedStatements</span><span style="color:#666">(</span> 
List statements <span style="color:#666">)</span> <span 
style="color:#666">{}</span>
+</span></span><span style="display:flex;"><span>    <span 
style="color:#a2f;font-weight:bold">public</span> <span 
style="color:#0b0;font-weight:bold">void</span> <span 
style="color:#00a000">removedStatements</span><span style="color:#666">(</span> 
StmtIterator statements <span style="color:#666">)</span> <span 
style="color:#666">{}</span>
+</span></span><span style="display:flex;"><span>    <span 
style="color:#a2f;font-weight:bold">public</span> <span 
style="color:#0b0;font-weight:bold">void</span> <span 
style="color:#00a000">removedStatements</span><span style="color:#666">(</span> 
Model m <span style="color:#666">)</span> <span style="color:#666">{}</span>
+</span></span><span style="display:flex;"><span><span 
style="color:#666">}</span>
+</span></span></code></pre></div><p>This listener ignores everything except 
the addition of single
 statements to <em>m</em>; those it prints out. The listener has a method
 for each of the ways that statements can be added to a Model:</p>
 <ul>
diff --git a/content/documentation/query/javascript-functions.html 
b/content/documentation/query/javascript-functions.html
index 4d3116eb0..bce078be2 100644
--- a/content/documentation/query/javascript-functions.html
+++ b/content/documentation/query/javascript-functions.html
@@ -241,6 +241,9 @@ sparql --set arq:js-library=SomeFile.js --data ... --query 
...
 &ldquo;SomeFile.js&rdquo; available.</p>
 <p>JavaScript functions can also be set from a string directly from within 
Java using constant
 <code>ARQ.symJavaScriptFunctions</code> (&ldquo;<a 
href="http://jena.apache.org/ARQ#js-functions%22)">http://jena.apache.org/ARQ#js-functions&quot;)</a>.</p>
+<p><strong>WARNING:</strong> Enabling this feature exposes the majority of the 
underlying scripting engine directly to SPARQL queries so
+may provide a vector for arbitrary code execution.  Therefore it is 
recommended that this feature remain disabled for
+any publicly accessible deployment that utilises the ARQ query engine.</p>
 <h2 id="using-javascript-functions">Using JavaScript functions</h2>
 <p>SPARQL functions implemented in JavaScript are automatically called when a
 URI starting &ldquo;<a 
href="http://jena.apache.org/ARQ/jsFunction#%22";>http://jena.apache.org/ARQ/jsFunction#&quot;</a>
 used.</p>
diff --git a/content/download/index.html b/content/download/index.html
index c074de923..1b8c11b71 100644
--- a/content/download/index.html
+++ b/content/download/index.html
@@ -208,9 +208,9 @@
 </thead>
 <tbody>
 <tr>
-<td><a 
href="[preferred]jena/source/jena-4.7.0-source-release.zip">jena-4.7.0-source-release.zip</a></td>
-<td style="text-align:center"><a 
href="https://downloads.apache.org/jena/source/jena-4.7.0-source-release.zip.sha512";>SHA512</a></td>
-<td style="text-align:center"><a 
href="https://downloads.apache.org/jena/source/jena-4.7.0-source-release.zip.asc";>PGP</a></td>
+<td><a 
href="[preferred]jena/source/jena-4.8.0-source-release.zip">jena-4.8.0-source-release.zip</a></td>
+<td style="text-align:center"><a 
href="https://downloads.apache.org/jena/source/jena-4.8.0-source-release.zip.sha512";>SHA512</a></td>
+<td style="text-align:center"><a 
href="https://downloads.apache.org/jena/source/jena-4.8.0-source-release.zip.asc";>PGP</a></td>
 </tr>
 </tbody>
 </table>
@@ -226,14 +226,14 @@
 </thead>
 <tbody>
 <tr>
-<td><a 
href="[preferred]jena/binaries/apache-jena-fuseki-4.7.0.tar.gz">apache-jena-fuseki-4.7.0.tar.gz</a></td>
-<td style="text-align:center"><a 
href="https://downloads.apache.org/jena/binaries/apache-jena-fuseki-4.7.0.tar.gz.sha512";>SHA512</a></td>
-<td style="text-align:center"><a 
href="https://downloads.apache.org/jena/binaries/apache-jena-fuseki-4.7.0.tar.gz.asc";>PGP</a></td>
+<td><a 
href="[preferred]jena/binaries/apache-jena-fuseki-4.8.0.tar.gz">apache-jena-fuseki-4.8.0.tar.gz</a></td>
+<td style="text-align:center"><a 
href="https://downloads.apache.org/jena/binaries/apache-jena-fuseki-4.8.0.tar.gz.sha512";>SHA512</a></td>
+<td style="text-align:center"><a 
href="https://downloads.apache.org/jena/binaries/apache-jena-fuseki-4.8.0.tar.gz.asc";>PGP</a></td>
 </tr>
 <tr>
-<td><a 
href="[preferred]jena/binaries/apache-jena-fuseki-4.7.0.zip">apache-jena-fuseki-4.7.0.zip</a></td>
-<td style="text-align:center"><a 
href="https://downloads.apache.org/jena/binaries/apache-jena-fuseki-4.7.0.zip.sha512";>SHA512</a></td>
-<td style="text-align:center"><a 
href="https://downloads.apache.org/jena/binaries/apache-jena-fuseki-4.7.0.zip.asc";>PGP</a></td>
+<td><a 
href="[preferred]jena/binaries/apache-jena-fuseki-4.8.0.zip">apache-jena-fuseki-4.8.0.zip</a></td>
+<td style="text-align:center"><a 
href="https://downloads.apache.org/jena/binaries/apache-jena-fuseki-4.8.0.zip.sha512";>SHA512</a></td>
+<td style="text-align:center"><a 
href="https://downloads.apache.org/jena/binaries/apache-jena-fuseki-4.8.0.zip.asc";>PGP</a></td>
 </tr>
 </tbody>
 </table>
@@ -249,14 +249,14 @@ The binary distribution of libraries contains the APIs, 
SPARQL engine, the TDB n
 </thead>
 <tbody>
 <tr>
-<td><a 
href="[preferred]jena/binaries/apache-jena-4.7.0.tar.gz">apache-jena-4.7.0.tar.gz</a></td>
-<td style="text-align:center"><a 
href="https://downloads.apache.org/jena/binaries/apache-jena-4.7.0.tar.gz.sha512";>SHA512</a></td>
-<td style="text-align:center"><a 
href="https://downloads.apache.org/jena/binaries/apache-jena-4.7.0.tar.gz.asc";>PGP</a></td>
+<td><a 
href="[preferred]jena/binaries/apache-jena-4.8.0.tar.gz">apache-jena-4.8.0.tar.gz</a></td>
+<td style="text-align:center"><a 
href="https://downloads.apache.org/jena/binaries/apache-jena-4.8.0.tar.gz.sha512";>SHA512</a></td>
+<td style="text-align:center"><a 
href="https://downloads.apache.org/jena/binaries/apache-jena-4.8.0.tar.gz.asc";>PGP</a></td>
 </tr>
 <tr>
-<td><a 
href="[preferred]jena/binaries/apache-jena-4.7.0.zip">apache-jena-4.7.0.zip</a></td>
-<td style="text-align:center"><a 
href="https://downloads.apache.org/jena/binaries/apache-jena-4.7.0.zip.sha512";>SHA512</a></td>
-<td style="text-align:center"><a 
href="https://downloads.apache.org/jena/binaries/apache-jena-4.7.0.zip.asc";>PGP</a></td>
+<td><a 
href="[preferred]jena/binaries/apache-jena-4.8.0.zip">apache-jena-4.8.0.zip</a></td>
+<td style="text-align:center"><a 
href="https://downloads.apache.org/jena/binaries/apache-jena-4.8.0.zip.sha512";>SHA512</a></td>
+<td style="text-align:center"><a 
href="https://downloads.apache.org/jena/binaries/apache-jena-4.8.0.zip.asc";>PGP</a></td>
 </tr>
 </tbody>
 </table>
@@ -272,9 +272,9 @@ The binary distribution of Fuseki as a WAR file:
 </thead>
 <tbody>
 <tr>
-<td><a 
href="[preferred]jena/binaries/jena-fuseki-war-4.7.0.war">jena-fuseki-war-4.7.0.war</a></td>
-<td style="text-align:center"><a 
href="https://downloads.apache.org/jena/binaries/jena-fuseki-war-4.7.0.war.sha512";>SHA512</a></td>
-<td style="text-align:center"><a 
href="https://downloads.apache.org/jena/binaries/jena-fuseki-war-4.7.0.war.asc";>PGP</a></td>
+<td><a 
href="[preferred]jena/binaries/jena-fuseki-war-4.8.0.war">jena-fuseki-war-4.8.0.war</a></td>
+<td style="text-align:center"><a 
href="https://downloads.apache.org/jena/binaries/jena-fuseki-war-4.8.0.war.sha512";>SHA512</a></td>
+<td style="text-align:center"><a 
href="https://downloads.apache.org/jena/binaries/jena-fuseki-war-4.8.0.war.asc";>PGP</a></td>
 </tr>
 </tbody>
 </table>
diff --git a/content/index.json b/content/index.json
index 0fea9bfb5..2225c7766 100644
--- a/content/index.json
+++ b/content/index.json
@@ -1 +1 @@
-[{"categories":null,"contents":"This page is historical \u0026ldquo;for 
information only\u0026rdquo; - there is no Apache release of Eyeball and the 
code has not been updated for Jena3.\nThe original source code is available. So 
you\u0026rsquo;ve got Eyeball installed and you\u0026rsquo;ve run it on one of 
your files, and Eyeball doesn\u0026rsquo;t like it. You\u0026rsquo;re not sure 
why, or what to do about it. Here\u0026rsquo;s what\u0026rsquo;s going 
on.\nEyeball inspects your model a [...]
\ No newline at end of file
+[{"categories":null,"contents":"This page is historical \u0026ldquo;for 
information only\u0026rdquo; - there is no Apache release of Eyeball and the 
code has not been updated for Jena3.\nThe original source code is available. So 
you\u0026rsquo;ve got Eyeball installed and you\u0026rsquo;ve run it on one of 
your files, and Eyeball doesn\u0026rsquo;t like it. You\u0026rsquo;re not sure 
why, or what to do about it. Here\u0026rsquo;s what\u0026rsquo;s going 
on.\nEyeball inspects your model a [...]
\ No newline at end of file
diff --git a/content/sitemap.xml b/content/sitemap.xml
index 494109e49..3c6df8739 100644
--- a/content/sitemap.xml
+++ b/content/sitemap.xml
@@ -6,7 +6,7 @@
     <lastmod>2020-06-28T16:59:07+01:00</lastmod>
   </url><url>
     <loc>https://jena.apache.org/about_jena.html</loc>
-    <lastmod>2023-04-10T10:11:44+01:00</lastmod>
+    <lastmod>2023-04-26T11:32:32+01:00</lastmod>
   </url><url>
     <loc>https://jena.apache.org/documentation/permissions/example.html</loc>
     <lastmod>2022-01-12T17:24:53+00:00</lastmod>
@@ -51,7 +51,7 @@
     <lastmod>2020-02-28T13:09:12+01:00</lastmod>
   </url><url>
     <loc>https://jena.apache.org/download/</loc>
-    <lastmod>2022-12-20T17:21:05+00:00</lastmod>
+    <lastmod>2023-04-16T17:26:15+01:00</lastmod>
   </url><url>
     <loc>https://jena.apache.org/documentation/archive/sdb/</loc>
     <lastmod>2022-11-09T14:16:56+00:00</lastmod>
@@ -114,7 +114,7 @@
     <lastmod>2021-11-05T08:11:46+00:00</lastmod>
   </url><url>
     
<loc>https://jena.apache.org/documentation/query/javascript-functions.html</loc>
-    <lastmod>2023-02-19T09:28:48+00:00</lastmod>
+    <lastmod>2023-04-26T11:23:47+01:00</lastmod>
   </url><url>
     <loc>https://jena.apache.org/documentation/query/lateral-join.html</loc>
     <lastmod>2023-02-26T22:14:57+01:00</lastmod>
@@ -201,13 +201,13 @@
     <lastmod>2023-04-09T15:11:22+02:00</lastmod>
   </url><url>
     <loc>https://jena.apache.org/documentation.html</loc>
-    <lastmod>2023-04-10T12:49:33+02:00</lastmod>
+    <lastmod>2023-06-06T21:08:29+02:00</lastmod>
   </url><url>
     <loc>https://jena.apache.org/download.html</loc>
-    <lastmod>2022-12-21T14:55:40+01:00</lastmod>
+    <lastmod>2023-04-16T17:26:15+01:00</lastmod>
   </url><url>
     
<loc>https://jena.apache.org/documentation/notes/event-handler-howto.html</loc>
-    <lastmod>2020-02-28T13:09:12+01:00</lastmod>
+    <lastmod>2023-06-06T21:08:29+02:00</lastmod>
   </url><url>
     <loc>https://jena.apache.org/documentation/query/explain.html</loc>
     <lastmod>2023-02-26T22:14:57+01:00</lastmod>
@@ -375,7 +375,7 @@
     <lastmod>2020-05-01T11:11:56+12:00</lastmod>
   </url><url>
     <loc>https://jena.apache.org/about_jena/security-advisories.html</loc>
-    <lastmod>2022-11-21T09:42:05+00:00</lastmod>
+    <lastmod>2023-04-26T11:32:32+01:00</lastmod>
   </url><url>
     <loc>https://jena.apache.org/documentation/txn/</loc>
     <lastmod>2020-02-28T13:09:12+01:00</lastmod>

Reply via email to