Skip to content
Open
Show file tree
Hide file tree
Changes from all commits
Commits
Show all changes
63 commits
Select commit Hold shift + click to select a range
0b664c8
Create test.yaml
PierreGiraud-MCP Feb 6, 2023
791b87e
Delete test.yaml
PierreGiraud-MCP Feb 6, 2023
4d6f691
Create test.yaml
PierreGiraud-MCP Feb 6, 2023
add780f
Merge pull request #1 from Giraud-Pierre/test
PierreGiraud-MCP Feb 6, 2023
5976a6f
Update test.yaml
PierreGiraud-MCP Feb 6, 2023
bdd650c
Merge pull request #2 from Giraud-Pierre/test
PierreGiraud-MCP Feb 6, 2023
adf7512
v1
cc-ca Feb 6, 2023
d9fe8b9
Merge branch 'main' into celestin
cc-ca Feb 6, 2023
15ba1de
v2
cc-ca Feb 6, 2023
3264ba4
Create CODEOWNERS
PierreGiraud-MCP Feb 6, 2023
fe747a6
v2
cc-ca Feb 6, 2023
c4f0cd0
Update CODEOWNERS
PierreGiraud-MCP Feb 6, 2023
db1dffa
Merge pull request #4 from Giraud-Pierre/celestin
cc-ca Feb 6, 2023
e73f508
v2
cc-ca Feb 6, 2023
adb00e5
Merge pull request #5 from Giraud-Pierre/celestin
cc-ca Feb 6, 2023
987ad27
Merge pull request #6 from Giraud-Pierre/celestin
cc-ca Feb 6, 2023
8916896
Update test.yaml
PierreGiraud-MCP Feb 6, 2023
1b0826d
Merge pull request #10 from Giraud-Pierre/test
PierreGiraud-MCP Feb 6, 2023
92f5b89
[StepSecurity] Apply security best practices
step-security-bot Feb 6, 2023
8aa3967
Merge pull request #11 from step-security-bot/stepsecurity_remediatio…
cc-ca Feb 6, 2023
49a0a68
Create scorecard.yml
PierreGiraud-MCP Feb 6, 2023
937c561
v2
cc-ca Feb 6, 2023
f598fea
Merge branch 'main' into celestin
PierreGiraud-MCP Feb 6, 2023
02c224f
Delete codeql.yml
PierreGiraud-MCP Feb 6, 2023
3dfc968
Delete deploy-pages-action.yml
PierreGiraud-MCP Feb 6, 2023
eacd736
Delete codeql.yml
PierreGiraud-MCP Feb 6, 2023
896a8de
Merge pull request #15 from Giraud-Pierre/celestin
PierreGiraud-MCP Feb 6, 2023
b0649ce
Update test.yaml
cc-ca Feb 6, 2023
c28bc3e
Merge pull request #16 from Giraud-Pierre/celestin
cc-ca Feb 6, 2023
ae23f69
injectioncCorrectedCorrected
PierreGiraud-MCP Feb 13, 2023
db47763
Create injection.yaml
cc-ca Feb 13, 2023
7668de2
Rename injection.yaml to injection.yml
cc-ca Feb 13, 2023
2894d48
[StepSecurity] Apply security best practices
step-security-bot Feb 13, 2023
fe34d89
Merge pull request #17 from step-security-bot/stepsecurity_remediatio…
PierreGiraud-MCP Feb 13, 2023
f1b08e0
Create SecretTest.yaml
PierreGiraud-MCP Feb 13, 2023
e5bdbea
Delete test.yaml
PierreGiraud-MCP Feb 13, 2023
41356ff
Merge pull request #18 from Giraud-Pierre/main
PierreGiraud-MCP Feb 13, 2023
5662281
Merge pull request #19 from Giraud-Pierre/test
PierreGiraud-MCP Feb 13, 2023
35854ce
injectionCorrectedName
PierreGiraud-MCP Feb 13, 2023
83e1697
Delete SecretTest.yaml
PierreGiraud-MCP Feb 13, 2023
b58e3c2
MovingSecretTest
PierreGiraud-MCP Feb 13, 2023
7a6493d
Merge pull request #20 from Giraud-Pierre/test
PierreGiraud-MCP Feb 13, 2023
1893e54
modificationForPR
PierreGiraud-MCP Feb 13, 2023
7cbfd24
FixSecretTest
PierreGiraud-MCP Feb 13, 2023
5241da2
SecretTestFix2
PierreGiraud-MCP Feb 13, 2023
a29c652
Update SecretTest.yaml
PierreGiraud-MCP Feb 13, 2023
b89cfd1
Update SecretTest.yaml
PierreGiraud-MCP Feb 13, 2023
d8a8c1e
Update SecretTest.yaml
PierreGiraud-MCP Feb 13, 2023
e2e4991
Update SecretTest.yaml
PierreGiraud-MCP Feb 13, 2023
e7944a6
Update SecretTest.yaml
PierreGiraud-MCP Feb 13, 2023
e45d0c3
Update SecretTest.yaml
PierreGiraud-MCP Feb 13, 2023
7639698
Delete injection.yml
cc-ca Feb 13, 2023
c0102d9
Create injection.yml
cc-ca Feb 13, 2023
1ce810f
Update SecretTest.yaml
PierreGiraud-MCP Feb 13, 2023
37829e3
Update SecretTest.yaml
PierreGiraud-MCP Feb 13, 2023
dc0d66d
Update SecretTest.yaml
PierreGiraud-MCP Feb 13, 2023
9fa1a9e
Update SecretTest.yaml
PierreGiraud-MCP Feb 13, 2023
8e5f172
Update SecretTest.yaml
PierreGiraud-MCP Feb 13, 2023
fd89462
Update SecretTest.yaml
PierreGiraud-MCP Feb 13, 2023
421881e
Update SecretTest.yaml
PierreGiraud-MCP Feb 13, 2023
57180e5
Update SecretTest.yaml
PierreGiraud-MCP Feb 13, 2023
1f12734
Merge pull request #23 from Giraud-Pierre/test
PierreGiraud-MCP Feb 13, 2023
ea518b2
Merge pull request #24 from Giraud-Pierre/celestin
PierreGiraud-MCP Feb 13, 2023
File filter

Filter by extension

Filter by extension


Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
4 changes: 4 additions & 0 deletions .github/CODEOWNERS
Original file line number Diff line number Diff line change
@@ -0,0 +1,4 @@
#Define code owners for the branches
#Approval from code owners should be requested before each pull request not made by a code owner

* @Giraud-Pierre
116 changes: 116 additions & 0 deletions .github/dependabot.yml
Original file line number Diff line number Diff line change
@@ -0,0 +1,116 @@
version: 2
updates:
- package-ecosystem: github-actions
directory: /
schedule:
interval: daily

- package-ecosystem: npm
directory: /
schedule:
interval: daily

- package-ecosystem: npm
directory: /pw/pw-csp-nonce/client
schedule:
interval: daily

- package-ecosystem: maven
directory: /pw/pw-csp-nonce/server
schedule:
interval: daily

- package-ecosystem: docker
directory: /pw/pw-csp-nonce/server/src/main/docker
schedule:
interval: daily

- package-ecosystem: npm
directory: /pw/pw-csp/client
schedule:
interval: daily

- package-ecosystem: maven
directory: /pw/pw-csp/server
schedule:
interval: daily

- package-ecosystem: docker
directory: /pw/pw-csp/server/src/main/docker
schedule:
interval: daily

- package-ecosystem: npm
directory: /pw/pw-csrf/client
schedule:
interval: daily

- package-ecosystem: maven
directory: /pw/pw-csrf/server
schedule:
interval: daily

- package-ecosystem: docker
directory: /pw/pw-csrf/server/src/main/docker
schedule:
interval: daily

- package-ecosystem: npm
directory: /pw/pw-jsonp/client
schedule:
interval: daily

- package-ecosystem: maven
directory: /pw/pw-jsonp/server
schedule:
interval: daily

- package-ecosystem: docker
directory: /pw/pw-jsonp/server/src/main/docker
schedule:
interval: daily

- package-ecosystem: npm
directory: /pw/pw-jwt-oauth/client
schedule:
interval: daily

- package-ecosystem: maven
directory: /pw/pw-jwt-oauth/server
schedule:
interval: daily

- package-ecosystem: docker
directory: /pw/pw-jwt-oauth/server/src/main/docker
schedule:
interval: daily

- package-ecosystem: npm
directory: /pw/pw-sca/client
schedule:
interval: daily

- package-ecosystem: maven
directory: /pw/pw-sca/server
schedule:
interval: daily

- package-ecosystem: docker
directory: /pw/pw-sca/server/src/main/docker
schedule:
interval: daily

- package-ecosystem: npm
directory: /pw/pw-xss/client
schedule:
interval: daily

- package-ecosystem: maven
directory: /pw/pw-xss/server
schedule:
interval: daily

- package-ecosystem: docker
directory: /pw/pw-xss/server/src/main/docker
schedule:
interval: daily
21 changes: 21 additions & 0 deletions .github/workflows/SecretTest.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,21 @@
name: SecretTest.
run-name: ${{ github.actor }} is learning GitHub Actions
on: [pull_request]
jobs:
default-env-variables:
runs-on: ubuntu-latest
steps:
- name: Test secret
env :
title: ${{ github.event.pull_request.title }}

run: |

echo ${{secrets.MYFIRSTSECRET}} #Get the secret and try to show it but you can't because it is encrypted
if [ $title == ${{secrets.MYFIRSTSECRET}} ]; then #compare the secret to the pull request title. It is not supposed to be used like that but just to show what you can do.
echo "You got the secret !"
exit 0
else
echo "Secret error!"
exit 1
fi
78 changes: 78 additions & 0 deletions .github/workflows/codeql.yml
Original file line number Diff line number Diff line change
@@ -0,0 +1,78 @@
# For most projects, this workflow file will not need changing; you simply need
# to commit it to your repository.
#
# You may wish to alter this file to override the set of languages analyzed,
# or to provide custom queries or build logic.
#
# ******** NOTE ********
# We have attempted to detect the languages in your repository. Please check
# the `language` matrix defined below to confirm you have the correct set of
# supported CodeQL languages.
#
name: "CodeQL"

on:
push:
branches: ["main"]
pull_request:
# The branches below must be a subset of the branches above
branches: ["main"]
schedule:
- cron: "0 0 * * 1"

permissions:
contents: read

jobs:
analyze:
name: Analyze
runs-on: ubuntu-latest
permissions:
actions: read
contents: read
security-events: write

strategy:
fail-fast: false
matrix:
language: ["java", "javascript", "typescript"]
# CodeQL supports [ $supported-codeql-languages ]
# Learn more about CodeQL language support at https://aka.ms/codeql-docs/language-support

steps:
- name: Harden Runner
uses: step-security/harden-runner@18bf8ad2ca49c14cbb28b91346d626ccfb00c518 # v2.1.0
with:
egress-policy: audit # TODO: change to 'egress-policy: block' after couple of runs

- name: Checkout repository
uses: actions/checkout@ac593985615ec2ede58e132d2e21d2b1cbd6127c # v3.3.0

# Initializes the CodeQL tools for scanning.
- name: Initialize CodeQL
uses: github/codeql-action/init@17573ee1cc1b9d061760f3a006fc4aac4f944fd5 # v2.2.4
with:
languages: ${{ matrix.language }}
# If you wish to specify custom queries, you can do so here or in a config file.
# By default, queries listed here will override any specified in a config file.
# Prefix the list here with "+" to use these queries and those in the config file.

# Autobuild attempts to build any compiled languages (C/C++, C#, or Java).
# If this step fails, then you should remove it and run the build manually (see below)
- name: Autobuild
uses: github/codeql-action/autobuild@17573ee1cc1b9d061760f3a006fc4aac4f944fd5 # v2.2.4

# ℹ️ Command-line programs to run using the OS shell.
# 📚 See https://docs.github.com/en/actions/using-workflows/workflow-syntax-for-github-actions#jobsjob_idstepsrun

# If the Autobuild fails above, remove it and uncomment the following three lines.
# modify them (or add more) to build your code if your project, please refer to the EXAMPLE below for guidance.

# - run: |
# echo "Run, Build Application using script"
# ./location_of_script_within_repo/buildscript.sh

- name: Perform CodeQL Analysis
uses: github/codeql-action/analyze@17573ee1cc1b9d061760f3a006fc4aac4f944fd5 # v2.2.4
with:
category: "/language:${{matrix.language}}"
25 changes: 25 additions & 0 deletions .github/workflows/dependency-review.yml
Original file line number Diff line number Diff line change
@@ -0,0 +1,25 @@
# Dependency Review Action
#
# This Action will scan dependency manifest files that change as part of a Pull Request, surfacing known-vulnerable versions of the packages declared or updated in the PR. Once installed, if the workflow run is marked as required, PRs introducing known-vulnerable packages will be blocked from merging.
#
# Source repository: https://github.com/actions/dependency-review-action
# Public documentation: https://docs.github.com/en/code-security/supply-chain-security/understanding-your-software-supply-chain/about-dependency-review#dependency-review-enforcement
name: 'Dependency Review'
on: [pull_request]

permissions:
contents: read

jobs:
dependency-review:
runs-on: ubuntu-latest
steps:
- name: Harden Runner
uses: step-security/harden-runner@18bf8ad2ca49c14cbb28b91346d626ccfb00c518 # v2.1.0
with:
egress-policy: audit # TODO: change to 'egress-policy: block' after couple of runs

- name: 'Checkout Repository'
uses: actions/checkout@ac593985615ec2ede58e132d2e21d2b1cbd6127c # v3.3.0
- name: 'Dependency Review'
uses: actions/dependency-review-action@0efb1d1d84fc9633afcdaad14c485cbbc90ef46c # v2.5.1
25 changes: 0 additions & 25 deletions .github/workflows/deploy-pages-action.yml

This file was deleted.

17 changes: 17 additions & 0 deletions .github/workflows/injection.yml
Original file line number Diff line number Diff line change
@@ -0,0 +1,17 @@
name: test-action
run-name: ${{ github.actor }} is learning GitHub Actions
on: [pull_request]
jobs:
check-bats-version:
runs-on: ubuntu-latest
steps:
- name: Check PR title
run: |
title="${{ github.event.pull_request.title }}"
if [[ $title =~ ^test ]]; then
echo $title
exit 0
else
echo "Pas content"
exit 1
fi
18 changes: 18 additions & 0 deletions .github/workflows/injection_corrected.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,18 @@
name: injection_corrected
run-name: ${{ github.actor }} is learning GitHub Actions
on: [pull_request]
jobs:
check-bats-version:
runs-on: ubuntu-latest
steps:
- name: injection_corrected
env :
title: "${{ github.event.pull_request.title }}" #le titre est mis en tant que variable d'environement!
run: |
if [[ $title =~ ^test ]]; then
echo $title
exit 0
else
echo "Pas content"
exit 1
fi
77 changes: 77 additions & 0 deletions .github/workflows/scorecard.yml
Original file line number Diff line number Diff line change
@@ -0,0 +1,77 @@
# This workflow uses actions that are not certified by GitHub. They are provided
# by a third-party and are governed by separate terms of service, privacy
# policy, and support documentation.

name: Scorecard supply-chain security
on:
# For Branch-Protection check. Only the default branch is supported. See
# https://github.com/ossf/scorecard/blob/main/docs/checks.md#branch-protection
branch_protection_rule:
# To guarantee Maintained check is occasionally updated. See
# https://github.com/ossf/scorecard/blob/main/docs/checks.md#maintained
schedule:
- cron: '28 10 * * 0'
push:
branches: [ "main" ]

# Declare default permissions as read only.
permissions: read-all

jobs:
analysis:
name: Scorecard analysis
runs-on: ubuntu-latest
permissions:
# Needed to upload the results to code-scanning dashboard.
security-events: write
# Needed to publish results and get a badge (see publish_results below).
id-token: write
# Uncomment the permissions below if installing in a private repository.
# contents: read
# actions: read

steps:
- name: Harden Runner
uses: step-security/harden-runner@18bf8ad2ca49c14cbb28b91346d626ccfb00c518 # v2.1.0
with:
egress-policy: audit # TODO: change to 'egress-policy: block' after couple of runs

- name: "Checkout code"
uses: actions/checkout@93ea575cb5d8a053eaa0ac8fa3b40d7e05a33cc8 # v3.1.0
with:
persist-credentials: false

- name: "Run analysis"
uses: ossf/scorecard-action@99c53751e09b9529366343771cc321ec74e9bd3d # v2.0.6
with:
results_file: results.sarif
results_format: sarif
# (Optional) "write" PAT token. Uncomment the `repo_token` line below if:
# - you want to enable the Branch-Protection check on a *public* repository, or
# - you are installing Scorecard on a *private* repository
# To create the PAT, follow the steps in https://github.com/ossf/scorecard-action#authentication-with-pat.
# repo_token: ${{ secrets.SCORECARD_TOKEN }}

# Public repositories:
# - Publish results to OpenSSF REST API for easy access by consumers
# - Allows the repository to include the Scorecard badge.
# - See https://github.com/ossf/scorecard-action#publishing-results.
# For private repositories:
# - `publish_results` will always be set to `false`, regardless
# of the value entered here.
publish_results: true

# Upload the results as artifacts (optional). Commenting out will disable uploads of run results in SARIF
# format to the repository Actions tab.
- name: "Upload artifact"
uses: actions/upload-artifact@3cea5372237819ed00197afe530f5a7ea3e805c8 # v3.1.0
with:
name: SARIF file
path: results.sarif
retention-days: 5

# Upload the results to GitHub's code scanning dashboard.
- name: "Upload to code-scanning"
uses: github/codeql-action/upload-sarif@807578363a7869ca324a79039e6db9c843e0e100 # v2.1.27
with:
sarif_file: results.sarif
2 changes: 1 addition & 1 deletion pw/pw-csp-nonce/server/src/main/docker/Dockerfile
Original file line number Diff line number Diff line change
@@ -1,4 +1,4 @@
FROM openjdk:8-jre-alpine
FROM openjdk:8-jre-alpine@sha256:f362b165b870ef129cbe730f29065ff37399c0aa8bcab3e44b51c302938c9193

ENV SPRING_OUTPUT_ANSI_ENABLED=ALWAYS \
JHIPSTER_SLEEP=0
Expand Down
Loading