Skip to content
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension


Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
68 changes: 33 additions & 35 deletions .github/workflows/codeql.yml
Original file line number Diff line number Diff line change
Expand Up @@ -12,8 +12,6 @@
name: Vulnerability Scan with CodeQL

on:
push:
branches: [ "main", "release-please--branches--main"]
pull_request:
branches: [ "main" ]
schedule:
Expand Down Expand Up @@ -51,44 +49,44 @@ jobs:
# Learn more about CodeQL language support at https://aka.ms/codeql-docs/language-support

steps:
- name: Checkout repository
uses: actions/checkout@v4.2.2
- name: Checkout repository
uses: actions/checkout@v4.2.2

- name: Setup JDK 17
uses: actions/setup-java@v4.7.0
with:
java-version: '17'
distribution: 'zulu'

# Initializes the CodeQL tools for scanning.
- name: Initialize CodeQL
uses: github/codeql-action/init@v3.28.11
with:
languages: ${{ matrix.language }}
# If you wish to specify custom queries, you can do so here or in a config file.
# By default, queries listed here will override any specified in a config file.
# Prefix the list here with "+" to use these queries and those in the config file.
- name: Setup JDK 17
uses: actions/setup-java@v4.7.0
with:
java-version: '17'
distribution: 'zulu'

# For more details on CodeQL's query packs, refer to: https://docs.github.com/en/code-security/code-scanning/automatically-scanning-your-code-for-vulnerabilities-and-errors/configuring-code-scanning#using-queries-in-ql-packs
queries: security-and-quality
# Initializes the CodeQL tools for scanning.
- name: Initialize CodeQL
uses: github/codeql-action/init@v3.28.11
with:
languages: ${{ matrix.language }}
# If you wish to specify custom queries, you can do so here or in a config file.
# By default, queries listed here will override any specified in a config file.
# Prefix the list here with "+" to use these queries and those in the config file.

# For more details on CodeQL's query packs, refer to: https://docs.github.com/en/code-security/code-scanning/automatically-scanning-your-code-for-vulnerabilities-and-errors/configuring-code-scanning#using-queries-in-ql-packs
queries: security-and-quality

# Autobuild attempts to build any compiled languages (C/C++, C#, Go, Java, or Swift).
# If this step fails, then you should remove it and run the build manually (see below)
- name: Autobuild
uses: github/codeql-action/autobuild@v3.28.11

# ℹ️ Command-line programs to run using the OS shell.
# 📚 See https://docs.github.com/en/actions/using-workflows/workflow-syntax-for-github-actions#jobsjob_idstepsrun
# Autobuild attempts to build any compiled languages (C/C++, C#, Go, Java, or Swift).
# If this step fails, then you should remove it and run the build manually (see below)
- name: Autobuild
uses: github/codeql-action/autobuild@v3.28.11

# If the Autobuild fails above, remove it and uncomment the following three lines.
# modify them (or add more) to build your code if your project, please refer to the EXAMPLE below for guidance.
# ℹ️ Command-line programs to run using the OS shell.
# 📚 See https://docs.github.com/en/actions/using-workflows/workflow-syntax-for-github-actions#jobsjob_idstepsrun

# - run: |
# echo "Run, Build Application using script"
# ./location_of_script_within_repo/buildscript.sh
# If the Autobuild fails above, remove it and uncomment the following three lines.
# modify them (or add more) to build your code if your project, please refer to the EXAMPLE below for guidance.

- name: Perform CodeQL Analysis
uses: github/codeql-action/analyze@v3.28.11
with:
category: "/language:${{matrix.language}}"
# - run: |
# echo "Run, Build Application using script"
# ./location_of_script_within_repo/buildscript.sh

- name: Perform CodeQL Analysis
uses: github/codeql-action/analyze@v3.28.11
with:
category: "/language:${{matrix.language}}"
73 changes: 35 additions & 38 deletions .github/workflows/detekt.yml
Original file line number Diff line number Diff line change
Expand Up @@ -18,13 +18,10 @@
name: Vulnerability Scan with Detekt

on:
# Triggers the workflow on push or pull request events but only for default and protected branches
push:
branches: [ "main", "release-please--branches--main"]
pull_request:
branches: [ "main" ]
schedule:
- cron: '25 6 * * 1'
- cron: '25 6 * * 1'
# Allows you to run this workflow manually from the Actions tab
workflow_dispatch:
# Triggers the workflow on call from another workflow
Expand All @@ -48,44 +45,44 @@ jobs:

# Steps represent a sequence of tasks that will be executed as part of the job
steps:
# Sets up JDK as a prerequisite to run Gradle
- name: Setup Java
uses: actions/setup-java@v4.7.0
with:
java-version: '17'
distribution: 'zulu'
# Sets up JDK as a prerequisite to run Gradle
- name: Setup Java
uses: actions/setup-java@v4.7.0
with:
java-version: '17'
distribution: 'zulu'

# Sets up the reviewdog cli
- name: Setup reviewdog
uses: reviewdog/action-setup@v1.3.0
# Sets up the reviewdog cli
- name: Setup reviewdog
uses: reviewdog/action-setup@v1.3.0

- name: Show reviewdog version
run: reviewdog -version
- name: Show reviewdog version
run: reviewdog -version

# Checks-out your repository under $GITHUB_WORKSPACE, so your job can access it
- name: Checkout repository
uses: actions/checkout@v4.2.2
# Checks-out your repository under $GITHUB_WORKSPACE, so your job can access it
- name: Checkout repository
uses: actions/checkout@v4.2.2

# Sets up Gradle as a prerequisite to run Detekt
- name: Setup Gradle
uses: gradle/actions/setup-gradle@v4.3.0
with:
gradle-home-cache-cleanup: true
# Sets up Gradle as a prerequisite to run Detekt
- name: Setup Gradle
uses: gradle/actions/setup-gradle@v4.3.0
with:
gradle-home-cache-cleanup: true

# Performs analysis using Detekt via Gradle and outputs a Sarif Report
- name: Run Detekt
run: ./gradlew detektRelease detektTest detektReportMergeSarif --continue
# Performs analysis using Detekt via Gradle and outputs a Sarif Report
- name: Run Detekt
run: ./gradlew detektRelease detektTest detektReportMergeSarif --continue

# Uploads Sarif Report to GitHub
- name: Upload SARIF to GitHub
uses: github/codeql-action/upload-sarif@v3.28.11
if: success() || failure()
with:
sarif_file: build/reports/detekt/merge.sarif.json
# Uploads Sarif Report to GitHub
- name: Upload SARIF to GitHub
uses: github/codeql-action/upload-sarif@v3.28.11
if: success() || failure()
with:
sarif_file: build/reports/detekt/merge.sarif.json

# Process Sarif Report file from Detekt with reviewdog cli
- name: Run reviewdog
if: success() || failure()
env:
REVIEWDOG_GITHUB_API_TOKEN: ${{ secrets.GITHUB_TOKEN }}
run: reviewdog -f=sarif -diff="git diff FETCH_HEAD" -name="detekt" -reporter=github-pr-check < build/reports/detekt/merge.sarif.json
# Process Sarif Report file from Detekt with reviewdog cli
- name: Run reviewdog
if: success() || failure()
env:
REVIEWDOG_GITHUB_API_TOKEN: ${{ secrets.GITHUB_TOKEN }}
run: reviewdog -f=sarif -diff="git diff FETCH_HEAD" -name="detekt" -reporter=github-pr-check < build/reports/detekt/merge.sarif.json
Original file line number Diff line number Diff line change
Expand Up @@ -9,9 +9,6 @@
name: E2E Test with latest FusionAuth

on:
# Triggers the workflow on push or pull request events but only for default and protected branches
push:
branches: [ "release-please--branches--main"]
# Triggers the workflow on pull request events but only for default and protected branches
pull_request:
branches: [ "main" ]
Expand Down
3 changes: 0 additions & 3 deletions .github/workflows/lint.yml
Original file line number Diff line number Diff line change
Expand Up @@ -14,9 +14,6 @@
name: Check Code Quality with Android Lint

on:
# Triggers the workflow on push or pull request events but only for default and protected branches
push:
branches: [ "main", "release-please--branches--main"]
pull_request:
branches: [ "main" ]
# Allows you to run this workflow manually from the Actions tab
Expand Down
2 changes: 0 additions & 2 deletions .github/workflows/mobsf.yml
Original file line number Diff line number Diff line change
Expand Up @@ -6,8 +6,6 @@
name: Vulnerability Scan with MobSF

on:
push:
branches: [ "main", "release-please--branches--main"]
pull_request:
branches: [ "main" ]
schedule:
Expand Down
46 changes: 23 additions & 23 deletions .github/workflows/prerelease-publish-local.yml
Original file line number Diff line number Diff line change
Expand Up @@ -37,26 +37,26 @@ jobs:

# Steps represent a sequence of tasks that will be executed as part of the job
steps:
# Sets up JDK as a prerequisite to run Gradle
- name: Setup Java
uses: actions/setup-java@v4.7.0
with:
java-version: '17'
distribution: 'zulu'

# Checks-out your repository under $GITHUB_WORKSPACE, so your job can access it
- name: Checkout repository
uses: actions/checkout@v4.2.2

# Sets up Gradle as a prerequisite to run Maven Pre-Release
- name: Setup Gradle
uses: gradle/actions/setup-gradle@v4.3.0
with:
gradle-home-cache-cleanup: true

# Performs a Local Maven Pre-Release
- name: Run Maven Local Pre-Release
env:
ORG_GRADLE_PROJECT_signingKey: ${{ secrets.GPG_SIGNING_KEY }}
ORG_GRADLE_PROJECT_signingPassword: ${{ secrets.GPG_SIGNING_PASSWORD }}
run: ./gradlew publishReleasePublicationToMavenLocal
# Sets up JDK as a prerequisite to run Gradle
- name: Setup Java
uses: actions/setup-java@v4.7.0
with:
java-version: '17'
distribution: 'zulu'

# Checks-out your repository under $GITHUB_WORKSPACE, so your job can access it
- name: Checkout repository
uses: actions/checkout@v4.2.2

# Sets up Gradle as a prerequisite to run Maven Pre-Release
- name: Setup Gradle
uses: gradle/actions/setup-gradle@v4.3.0
with:
gradle-home-cache-cleanup: true

# Performs a Local Maven Pre-Release
- name: Run Maven Local Pre-Release
env:
ORG_GRADLE_PROJECT_signingKey: ${{ secrets.GPG_SIGNING_KEY }}
ORG_GRADLE_PROJECT_signingPassword: ${{ secrets.GPG_SIGNING_PASSWORD }}
run: ./gradlew publishReleasePublicationToMavenLocal
66 changes: 33 additions & 33 deletions .github/workflows/release-publish-ossrh.yml
Original file line number Diff line number Diff line change
Expand Up @@ -48,50 +48,50 @@ jobs:
runs-on: ubuntu-latest

# Requires the staging_profile_id and e2e-test job
needs: [create_staging_repository,e2e-test]
needs: [ create_staging_repository,e2e-test ]

# Steps represent a sequence of tasks that will be executed as part of the job
steps:
# Sets up JDK as a prerequisite to run Gradle
- name: Setup Java
uses: actions/setup-java@v4.7.0
with:
java-version: '17'
distribution: 'zulu'
# Sets up JDK as a prerequisite to run Gradle
- name: Setup Java
uses: actions/setup-java@v4.7.0
with:
java-version: '17'
distribution: 'zulu'

# Checks-out your repository under $GITHUB_WORKSPACE, so your job can access it
- name: Checkout repository
uses: actions/checkout@v4.2.2
# Checks-out your repository under $GITHUB_WORKSPACE, so your job can access it
- name: Checkout repository
uses: actions/checkout@v4.2.2

# Sets up Gradle as a prerequisite to run Maven Release
- name: Setup Gradle
uses: gradle/actions/setup-gradle@v4.3.0
with:
gradle-home-cache-cleanup: true
# Sets up Gradle as a prerequisite to run Maven Release
- name: Setup Gradle
uses: gradle/actions/setup-gradle@v4.3.0
with:
gradle-home-cache-cleanup: true

# Performs a Local Maven Release
- name: Run Maven Local Release
env:
ORG_GRADLE_PROJECT_signingKey: ${{ secrets.GPG_SIGNING_KEY }}
ORG_GRADLE_PROJECT_signingPassword: ${{ secrets.GPG_SIGNING_PASSWORD }}
run: ./gradlew publishReleasePublicationToMavenLocal
# Performs a Local Maven Release
- name: Run Maven Local Release
env:
ORG_GRADLE_PROJECT_signingKey: ${{ secrets.GPG_SIGNING_KEY }}
ORG_GRADLE_PROJECT_signingPassword: ${{ secrets.GPG_SIGNING_PASSWORD }}
run: ./gradlew publishReleasePublicationToMavenLocal

# Performs a Maven Release to oss.sonatype.org
- name: Run Maven Release to OSSRH
env:
ossrhUsername: ${{ secrets.NXRM_TOKEN_USERNAME }}
ossrhPassword: ${{ secrets.NXRM_TOKEN_PASSWORD }}
ORG_GRADLE_PROJECT_ossrhUsername: ${{ secrets.NXRM_TOKEN_USERNAME }}
ORG_GRADLE_PROJECT_ossrhPassword: ${{ secrets.NXRM_TOKEN_PASSWORD }}
ORG_GRADLE_PROJECT_signingKey: ${{ secrets.GPG_SIGNING_KEY }}
ORG_GRADLE_PROJECT_signingPassword: ${{ secrets.GPG_SIGNING_PASSWORD }}
SONATYPE_REPOSITORY_ID: ${{ needs.create_staging_repository.outputs.repository_id }}
run: ./gradlew clean publishReleasePublicationToOSSRHRepository
# Performs a Maven Release to oss.sonatype.org
- name: Run Maven Release to OSSRH
env:
ossrhUsername: ${{ secrets.NXRM_TOKEN_USERNAME }}
ossrhPassword: ${{ secrets.NXRM_TOKEN_PASSWORD }}
ORG_GRADLE_PROJECT_ossrhUsername: ${{ secrets.NXRM_TOKEN_USERNAME }}
ORG_GRADLE_PROJECT_ossrhPassword: ${{ secrets.NXRM_TOKEN_PASSWORD }}
ORG_GRADLE_PROJECT_signingKey: ${{ secrets.GPG_SIGNING_KEY }}
ORG_GRADLE_PROJECT_signingPassword: ${{ secrets.GPG_SIGNING_PASSWORD }}
SONATYPE_REPOSITORY_ID: ${{ needs.create_staging_repository.outputs.repository_id }}
run: ./gradlew clean publishReleasePublicationToOSSRHRepository

# The finalize job checks for the success for failure of previous jobs and then either discards or releases the published build
finalize:
runs-on: ubuntu-latest
needs: [create_staging_repository,publish,e2e-test]
needs: [ create_staging_repository,publish,e2e-test ]
if: ${{ always() && needs.create_staging_repository.result == 'success' }}
steps:
- name: Discard
Expand Down
2 changes: 2 additions & 0 deletions .github/workflows/release.yml
Original file line number Diff line number Diff line change
Expand Up @@ -71,6 +71,7 @@ jobs:
with:
config-file: ".github/prerelease-config.json"
manifest-file: ".github/prerelease-manifest.json"
token: ${{ secrets.RELEASE_WORKFLOW_TOKEN }}

# This job runs tests before the creation of the prerelease
prerelease-test:
Expand Down Expand Up @@ -107,6 +108,7 @@ jobs:
with:
config-file: ".github/release-config.json"
manifest-file: ".github/release-manifest.json"
token: ${{ secrets.RELEASE_WORKFLOW_TOKEN }}

post-prerelease:
name: Post Prerelease Steps
Expand Down