diff --git a/.circleci/config.yml b/.circleci/config.yml new file mode 100644 index 00000000..5f457457 --- /dev/null +++ b/.circleci/config.yml @@ -0,0 +1,32 @@ +# This config was automatically generated from your source code +# Stacks detected: cicd:github-actions:.github/workflows, cicd:jenkins:., deps:java:. + +version: 2.1 + +jobs: + test-java: + docker: + - image: cimg/openjdk:17.0 + environment: + BRIDGE_BLACKDUCK_URL: 'https://demo.blackduck.synopsys.com' + BRIDGE_BLACKDUCK_SCAN_FULL: true + BRIDGE_BLACKDUCK_SCAN_FAILURE_SEVERITIES: 'NONE' + BRIDGECLI_LINUX64: 'https://sig-repo.synopsys.com/artifactory/bds-integrations-release/com/synopsys/integration/synopsys-bridge/latest/synopsys-bridge-linux64.zip' + steps: + - checkout + - run: + name: Install and run Black Duck scan + command: | + set -ex + curl -fLsS -o bridge.zip $BRIDGECLI_LINUX64 + unzip -qo -d ~/repo bridge.zip + rm -f bridge.zip + ~/repo/synopsys-bridge --stage blackduck + +workflows: + version: 2 + build-and-test: + jobs: + - test-java: + context: + - BLACKDUCK diff --git a/.github/workflows/bd.yaml b/.github/workflows/bd.yaml new file mode 100644 index 00000000..a4d50003 --- /dev/null +++ b/.github/workflows/bd.yaml @@ -0,0 +1,53 @@ +name: CI-BlackDuck-SCA-Basic +on: + push: + branches: [ main, master, develop, stage, release ] + pull_request: + branches: [ main, master, develop, stage, release ] + workflow_dispatch: + +jobs: + build: + runs-on: [ ubuntu-latest ] + steps: + - name: Checkout Source + uses: actions/checkout@v3 + - name: Black Duck SCA Scan + id: black-duck-sca-scan + uses: blackduck-inc/black-duck-security-scan@v2.1.1 + + ### Configure DETECT environment variables + env: + DETECT_PROJECT_NAME: ${{ github.event.repository.name }} + DETECT_ACCURACY_REQUIRE: 'NONE' + + with: + ### SCANNING: Required fields + blackducksca_url: ${{ vars.BLACKDUCK_URL }} + blackducksca_token: ${{ secrets.BLACKDUCK_TOKEN }} + + ### SCANNING: Optional fields + # blackducksca_scan_failure_severities: 'BLOCKER,CRITICAL' + + ### FIX PULL REQUEST CREATION: Uncomment below to enable + # blackducksca_fixpr_enabled: true + # github_token: ${{ secrets.GITHUB_TOKEN }} # Required when Fix PRs is enabled + + ### PULL REQUEST COMMENTS: Uncomment below to enable + blackducksca_prcomment_enabled: true + github_token: ${{ secrets.GITHUB_TOKEN }} # Required when PR comments is enabled + + ### SARIF report generation and upload to GitHub Adavanced Security: Uncomment below to enable + # blackducksca_reports_sarif_create: true # Create Black Duck SCA SARIF report and upload it as artifact + # blackducksca_upload_sarif_report: true # Upload Black Duck SCA SARIF report in GitHub Advanced Security tab + # github_token: ${{ secrets.GITHUB_TOKEN }} # Required when blackducksca_upload_sarif_report is set as true + + ### Mark build status if policy violating issues are found + # mark_build_status: 'success' + + ### Uncomment below configuration to add custom logic based on return status + # - name: cmdLine + # id: cmdLine + # run: | + # EXIT_CODE=${{ steps.black-duck-security-scan.outputs.status }} + # echo "Black Duck Security Scan exit status - $EXIT_CODE" diff --git a/pom.xml b/pom.xml index 33310c3b..1d2fdb10 100644 --- a/pom.xml +++ b/pom.xml @@ -58,6 +58,11 @@ 42.3.7 + + org.itadaki + bzip2 + 1.0.8 + mysql @@ -72,4 +77,4 @@ 3.1.0 - \ No newline at end of file + diff --git a/test b/test new file mode 100644 index 00000000..9daeafb9 --- /dev/null +++ b/test @@ -0,0 +1 @@ +test