Skip to content

Commit 57ab9cb

Browse files
Merge pull request #300 from Spring-Framework-Java-Apps/heroku-deployment-tmp
Heroku deployment tmp
2 parents 26f0a11 + 1134bb8 commit 57ab9cb

24 files changed

+370
-264
lines changed

.github/FUNDING.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
# These are supported funding model platforms
22

33
github: # Replace with up to 4 GitHub Sponsors-enabled usernames e.g., [user1, user2]
4-
patreon: # Replace with a single Patreon username
4+
patreon: thomaswoehlke
55
open_collective: # Replace with a single Open Collective username
66
ko_fi: # Replace with a single Ko-fi username
77
tidelift: # Replace with a single Tidelift platform-name/package-name e.g., npm/babel

.github/workflows/codacy-analysis.yml

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -8,11 +8,11 @@
88

99
name: Codacy Security Scan
1010

11-
on:
11+
on:
1212
push:
13-
branches: [ "master", "main" ]
13+
branches: [ 'master', 'heroku-deployment', 'branch-2.3-MVC' ]
1414
pull_request:
15-
branches: [ "master", "main" ]
15+
branches: [ 'master', 'heroku-deployment', 'branch-2.3-MVC' ]
1616

1717
jobs:
1818
codacy-security-scan:
@@ -22,7 +22,7 @@ jobs:
2222
# Checkout the repository to the GitHub Actions runner
2323
- name: Checkout code
2424
uses: actions/checkout@v2
25-
25+
2626
# Execute Codacy Analysis CLI and generate a SARIF output with the security issues identified during the analysis
2727
- name: Run Codacy Analysis CLI
2828
uses: codacy/codacy-analysis-cli-action@1.0.0
@@ -36,7 +36,7 @@ jobs:
3636
# Force 0 exit code to allow SARIF file generation
3737
# This will handover control about PR rejection to the GitHub side
3838
max-allowed-issues: 2147483647
39-
39+
4040
# Upload the SARIF file generated in the previous step
4141
- name: Upload SARIF results file
4242
uses: github/codeql-action/upload-sarif@v1

.github/workflows/codeql-analysis.yml

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -7,10 +7,10 @@ name: "CodeQL"
77

88
on:
99
push:
10-
branches: [master]
10+
branches: [ 'master', 'heroku-deployment', 'branch-2.3-MVC' ]
1111
pull_request:
1212
# The branches below must be a subset of the branches above
13-
branches: [master]
13+
branches: [ 'master', 'heroku-deployment', 'branch-2.3-MVC' ]
1414
schedule:
1515
- cron: '0 19 * * 2'
1616

@@ -47,7 +47,7 @@ jobs:
4747
with:
4848
languages: ${{ matrix.language }}
4949
# If you wish to specify custom queries, you can do so here or in a config file.
50-
# By default, queries listed here will override any specified in a config file.
50+
# By default, queries listed here will override any specified in a config file.
5151
# Prefix the list here with "+" to use these queries and those in the config file.
5252
# queries: ./path/to/local/query, your-org/your-repo/queries@main
5353

.github/workflows/fortify-analysis.yml

Lines changed: 15 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
################################################################################################################################################
1+
################################################################################################################################################
22
# Fortify lets you build secure software fast with an appsec platform that automates testing throughout the DevSecOps pipeline. Fortify static,#
33
# dynamic, interactive, and runtime security testing is available on premises or as a service. To learn more about Fortify, start a free trial #
44
# or contact our sales team, visit microfocus.com/appsecurity. #
@@ -14,17 +14,17 @@
1414
name: Fortify on Demand Scan
1515

1616
# TODO: Customize trigger events based on your DevSecOps processes and typical FoD SAST scan time
17-
on:
17+
on:
1818
workflow_dispatch:
1919
push:
20-
branches: [master]
20+
branches: [ 'master', 'heroku-deployment', 'branch-2.3-MVC' ]
2121
pull_request:
2222
# The branches below must be a subset of the branches above
23-
branches: [master]
24-
23+
branches: [ 'master', 'heroku-deployment', 'branch-2.3-MVC' ]
24+
2525
jobs:
2626
FoD-SAST-Scan:
27-
# Use the appropriate runner for building your source code.
27+
# Use the appropriate runner for building your source code.
2828
# TODO: Use a Windows runner for .NET projects that use msbuild. Additional changes to RUN commands will be required to switch to Windows syntax.
2929
runs-on: ubuntu-latest
3030

@@ -37,27 +37,27 @@ jobs:
3737
fetch-depth: 2
3838
# If this run was triggered by a pull request event, then checkout the head of the pull request instead of the merge commit.
3939
- run: git checkout HEAD^2
40-
if: ${{ github.event_name == 'pull_request' }}
40+
if: ${{ github.event_name == 'pull_request' }}
4141
# Java 8 required by ScanCentral Client and FoD Uploader(Univeral CI Tool)
4242
- name: Setup Java
4343
uses: actions/setup-java@v1
4444
with:
45-
java-version: 13
46-
45+
java-version: 15
46+
4747
# Prepare source+dependencies for upload. The default example is for a Maven project that uses pom.xml.
4848
# TODO: Update PACKAGE_OPTS based on the ScanCentral Client documentation for your project's included tech stack(s). Helpful hints:
4949
# ScanCentral Client will download dependencies for maven (-bt mvn) and gradle (-bt gradle).
5050
# ScanCentral Client can download dependencies for msbuild projects (-bt msbuild); however, you must convert the workflow to use a Windows runner.
5151
# ScanCentral has additional options that should be set for PHP and Python projects
5252
# For other build tools, add your build commands to download necessary dependencies and prepare according to Fortify on Demand Packaging documentation.
53-
# ScanCentral Client documentation is located at https://www.microfocus.com/documentation/fortify-software-security-center/
53+
# ScanCentral Client documentation is located at https://www.microfocus.com/documentation/fortify-software-security-center/
5454
- name: Download Fortify ScanCentral Client
5555
uses: fortify/gha-setup-scancentral-client@v1
5656
- name: Package Code + Dependencies
5757
run: scancentral package $PACKAGE_OPTS -o package.zip
5858
env:
5959
PACKAGE_OPTS: "-bt mvn"
60-
60+
6161
# Start Fortify on Demand SAST scan and wait until results complete. For more information on FoDUploader commands, see https://github.com/fod-dev/fod-uploader-java
6262
# TODO: Update ENV variables for your application and create the necessary GitHub Secrets. Helpful hints:
6363
# Credentials and release ID should be obtained from your FoD tenant (either Personal Access Token or API Key can be used).
@@ -66,16 +66,16 @@ jobs:
6666
uses: fortify/gha-setup-fod-uploader@v1
6767
- name: Perform SAST Scan
6868
run: java -jar $FOD_UPLOAD_JAR -z package.zip -aurl $FOD_API_URL -purl $FOD_URL -rid "$FOD_RELEASE_ID" -tc "$FOD_TENANT" -uc "$FOD_USER" "$FOD_PAT" $FOD_UPLOADER_OPTS -n "$FOD_UPLOADER_NOTES"
69-
env:
70-
FOD_TENANT: ${{ secrets.FOD_TENANT }}
69+
env:
70+
FOD_TENANT: ${{ secrets.FOD_TENANT }}
7171
FOD_USER: ${{ secrets.FOD_USER }}
7272
FOD_PAT: ${{ secrets.FOD_PAT }}
7373
FOD_RELEASE_ID: ${{ secrets.FOD_RELEASE_ID }}
7474
FOD_URL: "https://ams.fortify.com/"
7575
FOD_API_URL: "https://api.ams.fortify.com/"
7676
FOD_UPLOADER_OPTS: "-ep 2 -pp 0 -I 1 -apf"
7777
FOD_UPLOADER_NOTES: 'Triggered by GitHub Actions (${{ github.server_url }}/${{ github.repository }}/actions/runs/${{ github.run_id }})'
78-
78+
7979
# Once scan completes, pull SAST issues from Fortify on Demand and generate SARIF output.
8080
# TODO: Review Action inputs. For most users, these will be the same as used in the Perform SAST Scan step.
8181
- name: Download Results
@@ -87,7 +87,7 @@ jobs:
8787
password: ${{ secrets.FOD_PAT }}
8888
release-id: ${{ secrets.FOD_RELEASE_ID }}
8989
output: ./sarif/output.sarif
90-
90+
9191
# Import Fortify on Demand results to GitHub Security Code Scanning
9292
- name: Import Results
9393
uses: github/codeql-action/upload-sarif@v1

.github/workflows/maven.yml

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -5,9 +5,9 @@ name: Java CI with Maven
55

66
on:
77
push:
8-
branches: [ master ]
8+
branches: [ 'master', 'heroku-deployment', 'branch-2.3-MVC' ]
99
pull_request:
10-
branches: [ master ]
10+
branches: [ 'master', 'heroku-deployment', 'branch-2.3-MVC' ]
1111

1212
jobs:
1313
build:
@@ -16,9 +16,9 @@ jobs:
1616

1717
steps:
1818
- uses: actions/checkout@v2
19-
- name: Set up JDK 13
19+
- name: Set up JDK 15
2020
uses: actions/setup-java@v1
2121
with:
22-
java-version: 13
22+
java-version: 15
2323
- name: Build with Maven
2424
run: ./mvnw -B -DskipTests clean dependency:purge-local-repository dependency:resolve dependency:resolve-plugins dependency:sources dependency:tree package spring-boot:repackage site --file pom.xml

.github/workflows/ossar-analysis.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -5,9 +5,9 @@ name: OSSAR
55

66
on:
77
push:
8-
branches: [ master ]
8+
branches: [ 'master', 'heroku-deployment', 'branch-2.3-MVC' ]
99
pull_request:
10-
branches: [ master ]
10+
branches: [ 'master', 'heroku-deployment', 'branch-2.3-MVC' ]
1111

1212
jobs:
1313
OSSAR-Scan:

.github/workflows/veracode-analysis.yml

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -6,9 +6,9 @@ name: Veracode Static Analysis Pipeline Scan
66
# events but only for the master branch
77
on:
88
push:
9-
branches: [ master ]
9+
branches: [ 'master', 'heroku-deployment', 'branch-2.3-MVC' ]
1010
pull_request:
11-
branches: [ master ]
11+
branches: [ 'master', 'heroku-deployment', 'branch-2.3-MVC' ]
1212

1313
# A workflow run is made up of one or more jobs that can run sequentially or in parallel
1414
jobs:
@@ -17,7 +17,7 @@ jobs:
1717
# The type of runner that the job will run on
1818
runs-on: ubuntu-latest
1919
steps:
20-
20+
2121
# Checks-out your repository under $GITHUB_WORKSPACE, so your job can access it and copies all sources into ZIP file for submitting for analysis. Replace this section with your applications build steps
2222
- uses: actions/checkout@v2
2323
with:
@@ -28,28 +28,28 @@ jobs:
2828
files: /
2929
recursive: true
3030
dest: veracode-pipeline-scan-results-to-sarif.zip
31-
31+
3232
- uses: actions/upload-artifact@v1
3333
with:
3434
name: my-artifact
3535
path: veracode-pipeline-scan-results-to-sarif.zip
36-
36+
3737
# download the Veracode Static Analysis Pipeline scan jar
3838
- uses: wei/curl@master
3939
with:
4040
args: -O https://downloads.veracode.com/securityscan/pipeline-scan-LATEST.zip
4141
- run: unzip -o pipeline-scan-LATEST.zip
42-
42+
4343
- uses: actions/setup-java@v1
4444
with:
45-
java-version: 13
45+
java-version: 15
4646
- run: java -jar pipeline-scan.jar --veracode_api_id "${{secrets.VERACODE_API_ID}}" --veracode_api_key "${{secrets.VERACODE_API_KEY}}" --fail_on_severity="Very High, High" --file veracode-pipeline-scan-results-to-sarif.zip
4747
continue-on-error: true
4848
- uses: actions/upload-artifact@v1
4949
with:
5050
name: ScanResults
5151
path: results.json
52-
- name: Convert pipeline scan output to SARIF format
52+
- name: Convert pipeline scan output to SARIF format
5353
id: convert
5454
uses: veracode/veracode-pipeline-scan-results-to-sarif@master
5555
with:
Lines changed: 86 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,86 @@
1+
# This workflow downloads and installs the latest version of Xanitizer, builds your project, runs a Xanitizer security analysis on it,
2+
# and then archives the findings list reports and uploads the findings into the GitHub code scanning alert section of your repository.
3+
#
4+
# Documentation for the `RIGS-IT/xanitizer-action` is located here: https://github.com/RIGS-IT/xanitizer-action
5+
#
6+
# To use this basic workflow, you will need to complete the following setup steps:
7+
#
8+
# 1. The underlying Xanitizer, used in this workflow, needs a separate license file.
9+
# Licenses are free of charge for open source projects and for educational usage.
10+
# To get more information about the Xanitizer licenses and how to obtain a license file,
11+
# please consult https://www.xanitizer.com/xanitizer-pricing/.
12+
#
13+
# 2. The content of the license file has to be stored as a GitHub secret (e.g. XANITIZER_LICENSE) on this repository.
14+
# Please consult https://docs.github.com/en/actions/configuring-and-managing-workflows/creating-and-storing-encrypted-secrets for details.
15+
#
16+
# 3. Reference the GitHub secret in the step using the `RIGS-IT/xanitizer-action` GitHub action.
17+
# Example:
18+
# - name: Xanitizer Security Analysis
19+
# uses: RIGS-IT/xanitizer-action@v1
20+
# with:
21+
# license: ${{ secrets.XANITIZER_LICENSE }}
22+
#
23+
# 4. As a static application security testing (SAST) tool,
24+
# Xanitizer requires that all dependencies of the artifacts being analyzed can be resolved successfully.
25+
# So you have to install all used libraries and build your project before running the security analysis,
26+
# e.g. via `mvn compile` for Java or `npm install` for JavaScript
27+
28+
name: "Xanitizer Security Analysis"
29+
30+
on:
31+
# Run the workflow on each push
32+
push:
33+
# Run the workflow each day at 5 am
34+
# schedule:
35+
# - cron: '0 5 * * *'
36+
# Run the workflow manually
37+
workflow_dispatch:
38+
39+
jobs:
40+
xanitizer-security-analysis:
41+
# Xanitizer runs on ubuntu-latest and windows-latest.
42+
runs-on: ubuntu-latest
43+
44+
steps:
45+
# Check out the repository
46+
- name: Checkout
47+
uses: actions/checkout@v2
48+
49+
# Set up the correct Java version for your project
50+
# Please comment out, if your project does not contain Java source code.
51+
- name: Set up JDK 15
52+
uses: actions/setup-java@v1
53+
with:
54+
java-version: 15
55+
56+
# Compile the code for Java projects and get all libraries, e.g. via Maven
57+
# Please adapt, if your project uses another build system to compile Java source code.
58+
# Please comment out, if your project does not contain Java source code.
59+
- name: Compile Java code
60+
run: ./mvnw -B -DskipTests clean dependency:purge-local-repository dependency:resolve dependency:resolve-plugins dependency:sources dependency:tree package spring-boot:repackage site --file pom.xml
61+
62+
# Install all dependent libraries for JavaScript/TypeScript projects, e.g. via npm
63+
# Please adapt to run `npm install` in the correct directories.
64+
# Please adapt, if your project uses another package manager for getting JavaScript libraries.
65+
# Please comment out, if your project does not use a package manager for getting JavaScript libraries.
66+
#- name: Install JavaScript libraries
67+
# run: npm install
68+
69+
# Run the security analysis with default settings
70+
- name: Xanitizer Security Analysis
71+
uses: RIGS-IT/xanitizer-action@v1
72+
with:
73+
license: ${{ secrets.XANITIZER_LICENSE }}
74+
75+
# Archiving the findings list reports
76+
- uses: actions/upload-artifact@v2
77+
with:
78+
name: Xanitizer-Reports
79+
path: |
80+
*-Findings-List.pdf
81+
*-Findings-List.sarif
82+
83+
# Uploads the findings into the GitHub code scanning alert section using the upload-sarif action
84+
- uses: github/codeql-action/upload-sarif@v1
85+
with:
86+
sarif_file: Xanitizer-Findings-List.sarif

.idea/compiler.xml

Lines changed: 7 additions & 1 deletion
Some generated files are not rendered by default. Learn more about customizing how changed files appear on GitHub.

.mvn/wrapper/maven-wrapper.properties

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,2 +1,2 @@
1-
distributionUrl=https://repo.maven.apache.org/maven2/org/apache/maven/apache-maven/3.6.3/apache-maven-3.6.3-bin.zip
1+
distributionUrl=https://repo.maven.apache.org/maven2/org/apache/maven/apache-maven/3.6.2/apache-maven-3.6.2-bin.zip
22
wrapperUrl=https://repo.maven.apache.org/maven2/io/takari/maven-wrapper/0.5.6/maven-wrapper-0.5.6.jar

.travis.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
dist: bionic
22
language: java
3-
jdk: openjdk13
3+
jdk: openjdk15
44
services:
55
- docker
66
env:

README.md

Lines changed: 2 additions & 17 deletions
Original file line numberDiff line numberDiff line change
@@ -13,26 +13,11 @@ SimpleWorklist is not affiliated with or endorsed by the David Allen Company.
1313
* [Functional Requirements](etc/requirements/Requirements.md)
1414
* [Nonfunctional Requirements](etc/requirements/Nonfunctional_Requirements.md)
1515

16-
### Github Shortcuts
17-
* [Projects](https://github.com/Spring-Framework-Java-Apps/simpleworklist/projects)
18-
* [Milestones](https://github.com/Spring-Framework-Java-Apps/simpleworklist/milestones)
19-
* [Issues](https://github.com/Spring-Framework-Java-Apps/simpleworklist/issues)
20-
* [Releases](https://github.com/Spring-Framework-Java-Apps/simpleworklist/releases)
21-
* [Branches](https://github.com/Spring-Framework-Java-Apps/simpleworklist/branches)
22-
* [CI](https://github.com/Spring-Framework-Java-Apps/simpleworklist/actions)
23-
* [spring-framework-java-apps.github.io/simpleworklist](http://spring-framework-java-apps.github.io/simpleworklist/)
24-
2516
## Development
26-
* [Requirements](src/site/markdown/Requirements.md)
17+
* [Requirements](src/site/markdown/REQUIREMENTS_FUNCTIONAL.md)
2718
* [Nonfunctional_Requirements](src/site/markdown/Nonfunctional_Requirements.md)
28-
* [HOWTO](etc/development/HOWTO.md)
29-
* [Maven_Plugins](etc/development/Maven_Plugins.md)
30-
* [Primesfaces_JSF](etc/development/Primesfaces_JSF.md)
19+
* [HOWTO](src/site/markdown/TODO.md)
3120

3221
## URLs:
3322
* Heroku Deployment: [simpleworklist.herokuapp.com/](https://simpleworklist.herokuapp.com/)
3423
* For Developers: [localhost:8080](http://localhost:8080/)
35-
36-
## Up and Running - Deployment
37-
* A Java Web App, which can easily be deployed to Heroku.
38-
* [![Deploy to Heroku](https://www.herokucdn.com/deploy/button.png)](https://heroku.com/deploy)

0 commit comments

Comments
 (0)