I've been trying to get a server running on my Raspberry Pi, but run.sh won't function properly! I've used chmod, but it fails every time I try to run it. Here's the output:
pi@raspberrypi:~/🅱️orge $ sudo chmod +x run.sh
pi@raspberrypi:~/🅱️orge $ ./run.sh
Exception in thread "main" java.lang.ExceptionInInitializerError
at cpw.mods.securejarhandler@1.0.3/cpw.mods.jarhandling.SecureJar.from(SecureJar.java:58)
at cpw.mods.securejarhandler@1.0.3/cpw.mods.jarhandling.SecureJar.from(SecureJar.java:50)
at cpw.mods.securejarhandler@1.0.3/cpw.mods.jarhandling.SecureJar.from(SecureJar.java:42)
at cpw.mods.bootstraplauncher@1.0.0/cpw.mods.bootstraplauncher.BootstrapLauncher.main(BootstrapLauncher.java:93)
Caused by: java.lang.IllegalArgumentException: Error decoding percent encoded characters
at java.base/sun.net.www.ParseUtil.decode(ParseUtil.java:218)
at java.base/jdk.internal.loader.URLClassPath$FileLoader.<init>(URLClassPath.java:1219)
at java.base/jdk.internal.loader.URLClassPath$3.run(URLClassPath.java:488)
at java.base/jdk.internal.loader.URLClassPath$3.run(URLClassPath.java:482)
at java.base/java.security.AccessController.doPrivileged(AccessController.java:712)
at java.base/jdk.internal.loader.URLClassPath.getLoader(URLClassPath.java:481)
at java.base/jdk.internal.loader.URLClassPath.getLoader(URLClassPath.java:449)
at java.base/jdk.internal.loader.URLClassPath$1.next(URLClassPath.java:345)
at java.base/jdk.internal.loader.URLClassPath$1.hasMoreElements(URLClassPath.java:356)
at java.base/jdk.internal.loader.BuiltinClassLoader$1.hasNext(BuiltinClassLoader.java:408)
at java.base/jdk.internal.loader.BuiltinClassLoader$1.hasMoreElements(BuiltinClassLoader.java:416)
at java.base/java.lang.CompoundEnumeration.next(ClassLoader.java:2725)
at java.base/java.lang.CompoundEnumeration.hasMoreElements(ClassLoader.java:2734)
at java.base/java.util.ServiceLoader$LazyClassPathLookupIterator.nextProviderClass(ServiceLoader.java:1210)
at java.base/java.util.ServiceLoader$LazyClassPathLookupIterator.hasNextService(ServiceLoader.java:1228)
at java.base/java.util.ServiceLoader$LazyClassPathLookupIterator.hasNext(ServiceLoader.java:1273)
at java.base/java.util.ServiceLoader$2.hasNext(ServiceLoader.java:1309)
at java.base/java.util.ServiceLoader$3.hasNext(ServiceLoader.java:1393)
at java.base/java.nio.file.spi.FileSystemProvider.loadInstalledProviders(FileSystemProvider.java:156)
at java.base/java.nio.file.spi.FileSystemProvider$1.run(FileSystemProvider.java:207)
at java.base/java.nio.file.spi.FileSystemProvider$1.run(FileSystemProvider.java:204)
at java.base/java.security.AccessController.doPrivileged(AccessController.java:318)
at java.base/java.nio.file.spi.FileSystemProvider.installedProviders(FileSystemProvider.java:204)
at cpw.mods.securejarhandler@1.0.3/cpw.mods.jarhandling.impl.Jar.<clinit>(Jar.java:29)
... 4 more
(Yes, the 🅱️s are intentional)