Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Test Change commit #41628

Closed
wants to merge 55 commits into from
Closed
Show file tree
Hide file tree
Changes from all commits
Commits
Show all changes
55 commits
Select commit Hold shift + click to select a range
cab3dc7
Add files via upload
RxChin Sep 2, 2023
3774ef3
Update CliInstallationApplication.php
RxChin Sep 2, 2023
e457134
Update and rename travis.yml to .travis.yml
RxChin Sep 2, 2023
f76d719
Create docker-publish.yml
RxChin Sep 2, 2023
d969490
Create Dockerfile
RxChin Sep 3, 2023
3045c37
Update Dockerfile
RxChin Sep 3, 2023
96d640d
Update Dockerfile
RxChin Sep 3, 2023
9a7525e
Update Dockerfile
RxChin Sep 3, 2023
9af2264
Create codeql.yml
RxChin Sep 3, 2023
869b702
Create aws.yml
RxChin Sep 3, 2023
084d6e7
Create sonarcloud.yml
RxChin Sep 3, 2023
0ea6f4e
Update ResultTest.php
RxChin Sep 3, 2023
1a70149
Create deploy.yml
RxChin Sep 3, 2023
1c667c9
Update sonarcloud.yml
RxChin Sep 3, 2023
b0a233a
Update .travis.yml
RxChin Sep 3, 2023
69b276a
Update aws.yml
RxChin Sep 3, 2023
c17b7c7
Update aws.yml
RxChin Sep 3, 2023
b33b851
Update aws.yml
RxChin Sep 3, 2023
ef2ee6a
Create codescan.yml
RxChin Sep 3, 2023
3f2d8a9
Create sonarqube.yml
RxChin Sep 3, 2023
d9f695f
Update sonarqube.yml
RxChin Sep 3, 2023
b3287fc
Update aws.yml
RxChin Sep 3, 2023
a830320
Update sonarqube.yml
RxChin Sep 4, 2023
144bbcd
Update sonarqube.yml
RxChin Sep 4, 2023
2105d0b
Update sonarqube.yml
RxChin Sep 4, 2023
0cb607d
Update .travis.yml
RxChin Sep 4, 2023
68410ce
Add something inside
RxChin Sep 5, 2023
99c6b4b
Add or update the Azure App Service build and deployment workflow config
RxChin Sep 5, 2023
1e592c8
Add or update the Azure App Service build and deployment workflow config
RxChin Sep 5, 2023
620d102
Update 4.3-dev_joomla-deploy.yml
RxChin Sep 5, 2023
b91a947
Update 4.3-dev_joomla-deployment.yml
RxChin Sep 5, 2023
4cb8bb0
Create azure-container-webapp.yml
RxChin Sep 5, 2023
deed4a8
Delete .github/workflows/4.3-dev_joomla-deployment.yml
RxChin Sep 5, 2023
1d20387
Create testpage.html
RxChin Sep 5, 2023
5054daf
Delete testpage.html
RxChin Sep 5, 2023
18cc8aa
Merge branch 'joomla:4.3-dev' into 4.3-dev
RxChin Sep 5, 2023
2c61a11
Create azure-webapps-php.yml
RxChin Sep 5, 2023
6ffc26b
Delete .github/workflows/azure-container-webapp.yml
RxChin Sep 7, 2023
d5949a8
Update .travis.yml
RxChin Sep 7, 2023
eb2688e
Delete .github/workflows/aws.yml
RxChin Sep 7, 2023
768b19c
Delete .github/workflows/codescan.yml
RxChin Sep 7, 2023
09a06d3
Delete .github/workflows/sonarqube.yml
RxChin Sep 7, 2023
8180d48
Update ResultTest.php
Kx1742 Sep 7, 2023
26ddf10
Merge pull request #2 from Kx1742/patch-1
RxChin Sep 7, 2023
aaaf25b
Create build.yml
RxChin Sep 7, 2023
254d795
Create sonar-project.properties
RxChin Sep 7, 2023
acdf36d
added test case for console testing
Kx1742 Sep 7, 2023
03328c5
Test change commit
Sep 7, 2023
ff0801b
add language test to kx-branch
Kx1742 Sep 7, 2023
e6dc47b
Merge branch 'main' of https://github.com/RxChin/joomla-cms into feat…
Kx1742 Sep 7, 2023
c0af3fc
Update azure-webapps-php.yml
RxChin Sep 7, 2023
ecad89d
Delete .github/workflows/deploy.yml
RxChin Sep 7, 2023
5201a5a
Merge pull request #3 from RxChin/main
RxChin Sep 7, 2023
390053e
'modified'
domo12 Sep 7, 2023
922bd0f
Merge pull request #1 from RxChin/testing
RxChin Sep 7, 2023
File filter

Filter by extension

Filter by extension


Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
64 changes: 64 additions & 0 deletions .github/workflows/4.3-dev_joomla-deploy.yml
Original file line number Diff line number Diff line change
@@ -0,0 +1,64 @@
# Docs for the Azure Web Apps Deploy action: https://github.com/Azure/webapps-deploy
# More GitHub Actions for Azure: https://github.com/Azure/actions

name: Build and deploy ASP app to Azure Web App - Joomla-Deploy

on:
push:
branches:
- 4.3-dev
workflow_dispatch:

jobs:
build:
runs-on: windows-latest

steps:
- uses: actions/checkout@v2

- name: Setup MSBuild path
uses: microsoft/[email protected]

- name: Setup NuGet
uses: NuGet/[email protected]

- name: Restore NuGet packages
run: nuget restore

- name: Publish to folder
run: msbuild /nologo /verbosity:m /t:Build /t:pipelinePreDeployCopyAllFilesToOneFolder /p:_PackageTempDir="\published\"

- name: Upload artifact for deployment job
uses: actions/upload-artifact@v2
with:
name: ASP-app
path: '/published/**'

- script: |
echo "Current directory: $(pwd)"
ls -l
nuget restore
displayName: 'Debugging NuGet Restore'


deploy:
runs-on: windows-latest
needs: build
environment:
name: 'Production'
url: ${{ steps.deploy-to-webapp.outputs.webapp-url }}

steps:
- name: Download artifact from build job
uses: actions/download-artifact@v2
with:
name: ASP-app

- name: Deploy to Azure Web App
id: deploy-to-webapp
uses: azure/webapps-deploy@v2
with:
app-name: 'Joomla-Deploy'
slot-name: 'Production'
publish-profile: ${{ secrets.AZUREAPPSERVICE_PUBLISHPROFILE_384A838872D34BF688DD82E709DA0410 }}
package: .
99 changes: 99 additions & 0 deletions .github/workflows/azure-webapps-php.yml
Original file line number Diff line number Diff line change
@@ -0,0 +1,99 @@
# This workflow will build and push a PHP application to an Azure Web App when a commit is pushed to your default branch.
#
# This workflow assumes you have already created the target Azure App Service web app.
# For instructions see https://docs.microsoft.com/en-us/azure/app-service/quickstart-php?pivots=platform-linux
#
# To configure this workflow:
#
# 1. Download the Publish Profile for your Azure Web App. You can download this file from the Overview page of your Web App in the Azure Portal.
# For more information: https://docs.microsoft.com/en-us/azure/app-service/deploy-github-actions?tabs=applevel#generate-deployment-credentials
#
# 2. Create a secret in your repository named AZURE_WEBAPP_PUBLISH_PROFILE, paste the publish profile contents as the value of the secret.
# For instructions on obtaining the publish profile see: https://docs.microsoft.com/azure/app-service/deploy-github-actions#configure-the-github-secret
#
# 3. Change the value for the AZURE_WEBAPP_NAME. Optionally, change the AZURE_WEBAPP_PACKAGE_PATH and PHP_VERSION environment variables below.
#
# For more information on GitHub Actions for Azure: https://github.com/Azure/Actions
# For more information on the Azure Web Apps Deploy action: https://github.com/Azure/webapps-deploy
# For more samples to get started with GitHub Action workflows to deploy to Azure: https://github.com/Azure/actions-workflow-samples

name: Build and deploy PHP app to Azure Web App

on:
push:
branches: [ "4.3-dev" ]
workflow_dispatch:

env:
AZURE_WEBAPP_NAME: Joomla-Deploy # set this to your application's name
AZURE_WEBAPP_PACKAGE_PATH: '.' # set this to the path to your web app project, defaults to the repository root
PHP_VERSION: '8.x' # set this to the PHP version to use

permissions:
contents: read

jobs:
build:
runs-on: ubuntu-latest

steps:
- uses: actions/checkout@v3

- name: Setup PHP
uses: shivammathur/setup-php@7c0b4c8c8ebed23eca9ec2802474895d105b11bc
with:
php-version: ${{ env.PHP_VERSION }}

- name: Check if composer.json exists
id: check_files
uses: andstor/file-existence-action@87d74d4732ddb824259d80c8a508c0124bf1c673
with:
files: 'composer.json'

- name: Get Composer Cache Directory
id: composer-cache
if: steps.check_files.outputs.files_exists == 'true'
run: |
echo "dir=$(composer config cache-files-dir)" >> $GITHUB_OUTPUT

- name: Set up dependency caching for faster installs
uses: actions/cache@v3
if: steps.check_files.outputs.files_exists == 'true'
with:
path: ${{ steps.composer-cache.outputs.dir }}
key: ${{ runner.os }}-composer-${{ hashFiles('**/composer.lock') }}
restore-keys: |
${{ runner.os }}-composer-

- name: Run composer install if composer.json exists
if: steps.check_files.outputs.files_exists == 'true'
run: composer validate --no-check-publish && composer install --prefer-dist --no-progress

- name: Upload artifact for deployment job
uses: actions/upload-artifact@v3
with:
name: php-app
path: .

deploy:
permissions:
contents: none
runs-on: ubuntu-latest
needs: build
environment:
name: 'Development'
url: ${{ steps.deploy-to-webapp.outputs.webapp-url }}

steps:
- name: Download artifact from build job
uses: actions/download-artifact@v3
with:
name: php-app

- name: 'Deploy to Azure Web App'
id: deploy-to-webapp
uses: azure/webapps-deploy@v2
with:
app-name: ${{ env.AZURE_WEBAPP_NAME }}
publish-profile: ${{ secrets.AZURE_WEBAPP_PUBLISH_PROFILE }}
package: .
20 changes: 20 additions & 0 deletions .github/workflows/build.yml
Original file line number Diff line number Diff line change
@@ -0,0 +1,20 @@
name: Build
on:
push:
branches:
- 4.3-dev
pull_request:
types: [opened, synchronize, reopened]
jobs:
sonarcloud:
name: SonarCloud
runs-on: ubuntu-latest
steps:
- uses: actions/checkout@v3
with:
fetch-depth: 0 # Shallow clones should be disabled for a better relevancy of analysis
- name: SonarCloud Scan
uses: SonarSource/sonarcloud-github-action@master
env:
GITHUB_TOKEN: ${{ secrets.GITHUB_TOKEN }} # Needed to get PR information, if any
SONAR_TOKEN: ${{ secrets.SONAR_TOKEN }}
82 changes: 82 additions & 0 deletions .github/workflows/codeql.yml
Original file line number Diff line number Diff line change
@@ -0,0 +1,82 @@
# For most projects, this workflow file will not need changing; you simply need
# to commit it to your repository.
#
# You may wish to alter this file to override the set of languages analyzed,
# or to provide custom queries or build logic.
#
# ******** NOTE ********
# We have attempted to detect the languages in your repository. Please check
# the `language` matrix defined below to confirm you have the correct set of
# supported CodeQL languages.
#
name: "CodeQL"

on:
push:
branches: [ "4.3-dev" ]
pull_request:
# The branches below must be a subset of the branches above
branches: [ "4.3-dev" ]
schedule:
- cron: '45 18 * * 5'

jobs:
analyze:
name: Analyze
# Runner size impacts CodeQL analysis time. To learn more, please see:
# - https://gh.io/recommended-hardware-resources-for-running-codeql
# - https://gh.io/supported-runners-and-hardware-resources
# - https://gh.io/using-larger-runners
# Consider using larger runners for possible analysis time improvements.
runs-on: ${{ (matrix.language == 'swift' && 'macos-latest') || 'ubuntu-latest' }}
timeout-minutes: ${{ (matrix.language == 'swift' && 120) || 360 }}
permissions:
actions: read
contents: read
security-events: write

strategy:
fail-fast: false
matrix:
language: [ 'javascript' ]
# CodeQL supports [ 'cpp', 'csharp', 'go', 'java', 'javascript', 'python', 'ruby', 'swift' ]
# Use only 'java' to analyze code written in Java, Kotlin or both
# Use only 'javascript' to analyze code written in JavaScript, TypeScript or both
# Learn more about CodeQL language support at https://aka.ms/codeql-docs/language-support

steps:
- name: Checkout repository
uses: actions/checkout@v3

# Initializes the CodeQL tools for scanning.
- name: Initialize CodeQL
uses: github/codeql-action/init@v2
with:
languages: ${{ matrix.language }}
# If you wish to specify custom queries, you can do so here or in a config file.
# By default, queries listed here will override any specified in a config file.
# Prefix the list here with "+" to use these queries and those in the config file.

# For more details on CodeQL's query packs, refer to: https://docs.github.com/en/code-security/code-scanning/automatically-scanning-your-code-for-vulnerabilities-and-errors/configuring-code-scanning#using-queries-in-ql-packs
# queries: security-extended,security-and-quality


# Autobuild attempts to build any compiled languages (C/C++, C#, Go, Java, or Swift).
# If this step fails, then you should remove it and run the build manually (see below)
- name: Autobuild
uses: github/codeql-action/autobuild@v2

# ℹ️ Command-line programs to run using the OS shell.
# 📚 See https://docs.github.com/en/actions/using-workflows/workflow-syntax-for-github-actions#jobsjob_idstepsrun

# If the Autobuild fails above, remove it and uncomment the following three lines.
# modify them (or add more) to build your code if your project, please refer to the EXAMPLE below for guidance.

# - run: |
# echo "Run, Build Application using script"
# ./location_of_script_within_repo/buildscript.sh

- name: Perform CodeQL Analysis
uses: github/codeql-action/analyze@v2
with:
category: "/language:${{matrix.language}}"
97 changes: 97 additions & 0 deletions .github/workflows/docker-publish.yml
Original file line number Diff line number Diff line change
@@ -0,0 +1,97 @@
name: Docker

# This workflow uses actions that are not certified by GitHub.
# They are provided by a third-party and are governed by
# separate terms of service, privacy policy, and support
# documentation.

on:
schedule:
- cron: '27 5 * * *'
push:
branches: [ "4.3-dev" ]
# Publish semver tags as releases.
tags: [ 'v*.*.*' ]
pull_request:
branches: [ "4.3-dev" ]

env:
# Use docker.io for Docker Hub if empty
REGISTRY: ghcr.io
# github.repository as <account>/<repo>
IMAGE_NAME: ${{ github.repository }}


jobs:
build:

runs-on: ubuntu-latest
permissions:
contents: read
packages: write
# This is used to complete the identity challenge
# with sigstore/fulcio when running outside of PRs.
id-token: write

steps:
- name: Checkout repository
uses: actions/checkout@v3

# Install the cosign tool except on PR
# https://github.com/sigstore/cosign-installer
- name: Install cosign
if: github.event_name != 'pull_request'
uses: sigstore/cosign-installer@6e04d228eb30da1757ee4e1dd75a0ec73a653e06 #v3.1.1
with:
cosign-release: 'v2.1.1'

# Workaround: https://github.com/docker/build-push-action/issues/461
- name: Setup Docker buildx
uses: docker/setup-buildx-action@79abd3f86f79a9d68a23c75a09a9a85889262adf

# Login against a Docker registry except on PR
# https://github.com/docker/login-action
- name: Log into registry ${{ env.REGISTRY }}
if: github.event_name != 'pull_request'
uses: docker/login-action@28218f9b04b4f3f62068d7b6ce6ca5b26e35336c
with:
registry: ${{ env.REGISTRY }}
username: ${{ github.actor }}
password: ${{ secrets.GITHUB_TOKEN }}

# Extract metadata (tags, labels) for Docker
# https://github.com/docker/metadata-action
- name: Extract Docker metadata
id: meta
uses: docker/metadata-action@98669ae865ea3cffbcbaa878cf57c20bbf1c6c38
with:
images: ${{ env.REGISTRY }}/${{ env.IMAGE_NAME }}

# Build and push Docker image with Buildx (don't push on PR)
# https://github.com/docker/build-push-action
- name: Build and push Docker image
id: build-and-push
uses: docker/build-push-action@ac9327eae2b366085ac7f6a2d02df8aa8ead720a
with:
context: .
push: ${{ github.event_name != 'pull_request' }}
tags: ${{ steps.meta.outputs.tags }}
labels: ${{ steps.meta.outputs.labels }}
cache-from: type=gha
cache-to: type=gha,mode=max


# Sign the resulting Docker image digest except on PRs.
# This will only write to the public Rekor transparency log when the Docker
# repository is public to avoid leaking data. If you would like to publish
# transparency data even for private images, pass --force to cosign below.
# https://github.com/sigstore/cosign
- name: Sign the published Docker image
if: ${{ github.event_name != 'pull_request' }}
env:
# https://docs.github.com/en/actions/security-guides/security-hardening-for-github-actions#using-an-intermediate-environment-variable
TAGS: ${{ steps.meta.outputs.tags }}
DIGEST: ${{ steps.build-and-push.outputs.digest }}
# This step uses the identity token to provision an ephemeral certificate
# against the sigstore community Fulcio instance.
run: echo "${TAGS}" | xargs -I {} cosign sign --yes {}@${DIGEST}
Loading