diff --git a/.circleci/config.yml b/.circleci/config.yml
new file mode 100644
index 00000000..5f457457
--- /dev/null
+++ b/.circleci/config.yml
@@ -0,0 +1,32 @@
+# This config was automatically generated from your source code
+# Stacks detected: cicd:github-actions:.github/workflows, cicd:jenkins:., deps:java:.
+
+version: 2.1
+
+jobs:
+ test-java:
+ docker:
+ - image: cimg/openjdk:17.0
+ environment:
+ BRIDGE_BLACKDUCK_URL: 'https://demo.blackduck.synopsys.com'
+ BRIDGE_BLACKDUCK_SCAN_FULL: true
+ BRIDGE_BLACKDUCK_SCAN_FAILURE_SEVERITIES: 'NONE'
+ BRIDGECLI_LINUX64: 'https://sig-repo.synopsys.com/artifactory/bds-integrations-release/com/synopsys/integration/synopsys-bridge/latest/synopsys-bridge-linux64.zip'
+ steps:
+ - checkout
+ - run:
+ name: Install and run Black Duck scan
+ command: |
+ set -ex
+ curl -fLsS -o bridge.zip $BRIDGECLI_LINUX64
+ unzip -qo -d ~/repo bridge.zip
+ rm -f bridge.zip
+ ~/repo/synopsys-bridge --stage blackduck
+
+workflows:
+ version: 2
+ build-and-test:
+ jobs:
+ - test-java:
+ context:
+ - BLACKDUCK
diff --git a/.github/workflows/bd.yaml b/.github/workflows/bd.yaml
new file mode 100644
index 00000000..a4d50003
--- /dev/null
+++ b/.github/workflows/bd.yaml
@@ -0,0 +1,53 @@
+name: CI-BlackDuck-SCA-Basic
+on:
+ push:
+ branches: [ main, master, develop, stage, release ]
+ pull_request:
+ branches: [ main, master, develop, stage, release ]
+ workflow_dispatch:
+
+jobs:
+ build:
+ runs-on: [ ubuntu-latest ]
+ steps:
+ - name: Checkout Source
+ uses: actions/checkout@v3
+ - name: Black Duck SCA Scan
+ id: black-duck-sca-scan
+ uses: blackduck-inc/black-duck-security-scan@v2.1.1
+
+ ### Configure DETECT environment variables
+ env:
+ DETECT_PROJECT_NAME: ${{ github.event.repository.name }}
+ DETECT_ACCURACY_REQUIRE: 'NONE'
+
+ with:
+ ### SCANNING: Required fields
+ blackducksca_url: ${{ vars.BLACKDUCK_URL }}
+ blackducksca_token: ${{ secrets.BLACKDUCK_TOKEN }}
+
+ ### SCANNING: Optional fields
+ # blackducksca_scan_failure_severities: 'BLOCKER,CRITICAL'
+
+ ### FIX PULL REQUEST CREATION: Uncomment below to enable
+ # blackducksca_fixpr_enabled: true
+ # github_token: ${{ secrets.GITHUB_TOKEN }} # Required when Fix PRs is enabled
+
+ ### PULL REQUEST COMMENTS: Uncomment below to enable
+ blackducksca_prcomment_enabled: true
+ github_token: ${{ secrets.GITHUB_TOKEN }} # Required when PR comments is enabled
+
+ ### SARIF report generation and upload to GitHub Adavanced Security: Uncomment below to enable
+ # blackducksca_reports_sarif_create: true # Create Black Duck SCA SARIF report and upload it as artifact
+ # blackducksca_upload_sarif_report: true # Upload Black Duck SCA SARIF report in GitHub Advanced Security tab
+ # github_token: ${{ secrets.GITHUB_TOKEN }} # Required when blackducksca_upload_sarif_report is set as true
+
+ ### Mark build status if policy violating issues are found
+ # mark_build_status: 'success'
+
+ ### Uncomment below configuration to add custom logic based on return status
+ # - name: cmdLine
+ # id: cmdLine
+ # run: |
+ # EXIT_CODE=${{ steps.black-duck-security-scan.outputs.status }}
+ # echo "Black Duck Security Scan exit status - $EXIT_CODE"
diff --git a/pom.xml b/pom.xml
index 33310c3b..1d2fdb10 100644
--- a/pom.xml
+++ b/pom.xml
@@ -58,6 +58,11 @@
42.3.7
+
+ org.itadaki
+ bzip2
+ 1.0.8
+
mysql
@@ -72,4 +77,4 @@
3.1.0
-
\ No newline at end of file
+
diff --git a/test b/test
new file mode 100644
index 00000000..9daeafb9
--- /dev/null
+++ b/test
@@ -0,0 +1 @@
+test