Add unit tests for Blind SQL Injection Vulnerability levels 1, 2, and… #328
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
# This workflow will build a Java project with Gradle, create repository tag, and push a new docker image to docker hub | |
name: Create Tag and Push Image to DockerHub | |
on: | |
push: | |
branches: [ master ] | |
jobs: | |
login: | |
runs-on: ubuntu-latest | |
steps: | |
- | |
name: Login to DockerHub | |
uses: docker/login-action@v1 | |
with: | |
username: ${{ secrets.DOCKER_USERNAME }} | |
password: ${{ secrets.DOCKER_PASSWORD }} | |
- | |
name: Checkout new changes | |
uses: actions/checkout@v2 | |
with: | |
java-version: 1.8 | |
fetch-depth: 0 | |
- | |
name: Setup GitVersion action | |
uses: gittools/actions/gitversion/[email protected] | |
with: | |
versionSpec: '5.x' | |
- | |
name: Execute GitVersion action | |
id: gitversion | |
uses: gittools/actions/gitversion/[email protected] | |
- | |
name: Create tag for GitHub | |
uses: tvdias/[email protected] | |
with: | |
repo-token: "${{ secrets.GITHUB_TOKEN }}" | |
tag: '${{ steps.gitversion.outputs.semver }}' | |
- | |
name: Grant execute permission for gradlew | |
run: chmod +x gradlew | |
- | |
name: Build with Gradle and Push | |
run: | | |
./gradlew jib \ | |
-Djib.to.image=sasanlabs/owasp-vulnerableapp:unreleased \ | |
-Djib.to.tags=$GITVERSION_SEMVER |