Skip to content

Blind sql injection vulnerabilities secure implementations (#477) #329

Blind sql injection vulnerabilities secure implementations (#477)

Blind sql injection vulnerabilities secure implementations (#477) #329

Workflow file for this run

# This workflow will build a Java project with Gradle, create repository tag, and push a new docker image to docker hub
name: Create Tag and Push Image to DockerHub
on:
push:
branches: [ master ]
jobs:
login:
runs-on: ubuntu-latest
steps:
-
name: Login to DockerHub
uses: docker/login-action@v1
with:
username: ${{ secrets.DOCKER_USERNAME }}
password: ${{ secrets.DOCKER_PASSWORD }}
-
name: Checkout new changes
uses: actions/checkout@v2
with:
java-version: 1.8
fetch-depth: 0
-
name: Setup GitVersion action
uses: gittools/actions/gitversion/[email protected]
with:
versionSpec: '5.x'
-
name: Execute GitVersion action
id: gitversion
uses: gittools/actions/gitversion/[email protected]
-
name: Create tag for GitHub
uses: tvdias/[email protected]
with:
repo-token: "${{ secrets.GITHUB_TOKEN }}"
tag: '${{ steps.gitversion.outputs.semver }}'
-
name: Grant execute permission for gradlew
run: chmod +x gradlew
-
name: Build with Gradle and Push
run: |
./gradlew jib \
-Djib.to.image=sasanlabs/owasp-vulnerableapp:unreleased \
-Djib.to.tags=$GITVERSION_SEMVER