From 10c81914f2f2bcc7e58c3f749220a9a2b3a641d4 Mon Sep 17 00:00:00 2001 From: Rick M Date: Sat, 26 Oct 2024 08:14:07 -0400 Subject: [PATCH] Migrate to single use repo (www-project-vulnerable-web-applications-directory) (#223) * Delete .github/workflows/create_www_update.yml Work only in the www repo now * Update README.md --- .github/workflows/create_www_update.yml | 45 ------------------------- README.md | 12 +++---- 2 files changed, 5 insertions(+), 52 deletions(-) delete mode 100644 .github/workflows/create_www_update.yml diff --git a/.github/workflows/create_www_update.yml b/.github/workflows/create_www_update.yml deleted file mode 100644 index 9e30426..0000000 --- a/.github/workflows/create_www_update.yml +++ /dev/null @@ -1,45 +0,0 @@ -name: Create WWW Update PR - -on: - push: - branches: - - master - paths: - - '**.json' - workflow_dispatch: - -jobs: - create_pr: - name: Create Pull Request - runs-on: ubuntu-latest - steps: - - name: Build Feature Branch and Raise PR - run: | - # Setup git details - export GITHUB_USER=vwadbot - git config --global user.email "62956126+vwadbot@users.noreply.github.com" - git config --global user.name $GITHUB_USER - # Clone repos - git clone -o upstream https://github.com/OWASP/www-project-vulnerable-web-applications-directory.git - git clone https://github.com/OWASP/OWASP-VWAD.git - cd www-project-vulnerable-web-applications-directory - WWW_BASE="$(pwd)" - git remote add origin https://github.com/$GITHUB_USER/www-project-vulnerable-web-applications-directory.git - cd ../OWASP-VWAD - VWAD_BASE="$(pwd)" - # Setup env vars for later - SRC_BASE="OWASP/OWASP-VWAD@"$(git log -1 --format=format:%h) - BRANCH="vwad-update" - SHORT_DATE="$(date +"%Y-%m-%d")" - export GITHUB_TOKEN=${{ secrets.vwad_deploy_token }} - # Build the feature branch - cd $WWW_BASE - git checkout -b $BRANCH - rm _data/collection.json - cp $VWAD_BASE/src/data/collection.json $WWW_BASE/_data/. - git remote set-url origin https://$GITHUB_USER:${{ secrets.vwad_deploy_token }}@github.com/$GITHUB_USER/www-project-vulnerable-web-applications-directory.git - git add . - git commit -m "VWAD Update $SHORT_DATE" -m "Updates based on $SRC_BASE" - git push --set-upstream origin $BRANCH --force - # Open the PR - gh pr create -R OWASP/www-project-vulnerable-web-applications-directory --fill diff --git a/README.md b/README.md index ba25641..bb23931 100644 --- a/README.md +++ b/README.md @@ -1,13 +1,11 @@ # OWASP-VWAD ![OWASP Lab](https://img.shields.io/badge/owasp-lab-yellow.svg) -The OWASP Vulnerable Web Applications Directory Project (VWAD, https://owasp.org/www-project-vulnerable-web-applications-directory/) is a comprehensive and well maintained registry of all known vulnerable web applications currently available. - -The individual collections are available via separate tabs on: [https://owasp.org/www-project-vulnerable-web-applications-directory/](https://owasp.org/www-project-vulnerable-web-applications-directory/) +## 2024-10-26 -## Editing Process +⚠️ This repo is being wound down. Future work should be via [`www-project-vulnerable-web-applications-directory`](https://github.com/OWASP/www-project-vulnerable-web-applications-directory) -Just open a PR modifying the [JSON file](https://github.com/OWASP/OWASP-VWAD/tree/master/src/data). +--- -Please keep the file sorted by `name`. You can use this online tool to assist you: https://codeshack.io/json-sorter/. Entries should conform to the [schema](https://github.com/OWASP/OWASP-VWAD/blob/master/schema.json) and are validated automatically during PR handling. You can also use this [online service](https://www.jsonschemavalidator.net/) to check before submitting. +The OWASP Vulnerable Web Applications Directory Project (VWAD, https://owasp.org/www-project-vulnerable-web-applications-directory/) is a comprehensive and well maintained registry of all known vulnerable web applications currently available. -Since 20200331 they are automatically copied/deployed to the `www-project-vulnerable-web-applications-directory` repo, from which they are rendered on the owasp.org website. +The individual collections are available via separate tabs on: [https://owasp.org/www-project-vulnerable-web-applications-directory/](https://owasp.org/www-project-vulnerable-web-applications-directory/)