mirror of
https://github.com/spring-projects/spring-petclinic.git
synced 2025-07-20 14:55:50 +00:00
rename docker-compose file and add a getting started in the readme
This commit is contained in:
parent
d7b576ed9b
commit
a7c0b5e895
5 changed files with 24 additions and 3938 deletions
3
.gitignore
vendored
3
.gitignore
vendored
|
@ -15,4 +15,5 @@ build/*
|
||||||
_site/
|
_site/
|
||||||
*.css
|
*.css
|
||||||
!petclinic.css
|
!petclinic.css
|
||||||
zap-report/zap-report.html
|
|
||||||
|
zap-report/*
|
||||||
|
|
22
readme.md
22
readme.md
|
@ -1,3 +1,25 @@
|
||||||
|
# Getting started
|
||||||
|
|
||||||
|
## Running a build pipeline
|
||||||
|
|
||||||
|
```
|
||||||
|
docker-compose -f docker-compose_spring-petclinic.yml up -d
|
||||||
|
```
|
||||||
|
|
||||||
|
Go to the following locations:
|
||||||
|
* [petclinic](http://localhost:8080)
|
||||||
|
* [jenkins](http://localhost:8081)
|
||||||
|
* [sonarqube](http://localhost:9000)
|
||||||
|
* [promethius](http://localhost:8080/prometheus)
|
||||||
|
* [zap](http://localhost:8080/zap)
|
||||||
|
|
||||||
|
|
||||||
|
## Stopping a build pipeline
|
||||||
|
```
|
||||||
|
docker-compose -f docker-compose_spring-petclinic.yml down
|
||||||
|
```
|
||||||
|
|
||||||
|
|
||||||
# Setting up Jenkins
|
# Setting up Jenkins
|
||||||
|
|
||||||
## Steps 1: Set up Jenkins in Docker
|
## Steps 1: Set up Jenkins in Docker
|
||||||
|
|
|
@ -1,69 +0,0 @@
|
||||||
# zap-baseline rule configuration file
|
|
||||||
# Change WARN to IGNORE to ignore rule or FAIL to fail if rule matches
|
|
||||||
# Only the rule identifiers are used - the names are just for info
|
|
||||||
# You can add your own messages to each rule by appending them after a tab on each line.
|
|
||||||
10003 WARN (Vulnerable JS Library (Powered by Retire.js))
|
|
||||||
10009 WARN (In Page Banner Information Leak)
|
|
||||||
10010 WARN (Cookie No HttpOnly Flag)
|
|
||||||
10011 WARN (Cookie Without Secure Flag)
|
|
||||||
10015 WARN (Re-examine Cache-control Directives)
|
|
||||||
10017 WARN (Cross-Domain JavaScript Source File Inclusion)
|
|
||||||
10019 WARN (Content-Type Header Missing)
|
|
||||||
10020 WARN (Anti-clickjacking Header)
|
|
||||||
10021 WARN (X-Content-Type-Options Header Missing)
|
|
||||||
10023 WARN (Information Disclosure - Debug Error Messages)
|
|
||||||
10024 WARN (Information Disclosure - Sensitive Information in URL)
|
|
||||||
10025 WARN (Information Disclosure - Sensitive Information in HTTP Referrer Header)
|
|
||||||
10026 WARN (HTTP Parameter Override)
|
|
||||||
10027 WARN (Information Disclosure - Suspicious Comments)
|
|
||||||
10028 WARN (Open Redirect)
|
|
||||||
10029 WARN (Cookie Poisoning)
|
|
||||||
10030 WARN (User Controllable Charset)
|
|
||||||
10031 WARN (User Controllable HTML Element Attribute (Potential XSS))
|
|
||||||
10032 WARN (Viewstate)
|
|
||||||
10033 WARN (Directory Browsing)
|
|
||||||
10034 WARN (Heartbleed OpenSSL Vulnerability (Indicative))
|
|
||||||
10035 WARN (Strict-Transport-Security Header)
|
|
||||||
10036 WARN (HTTP Server Response Header)
|
|
||||||
10037 WARN (Server Leaks Information via "X-Powered-By" HTTP Response Header Field(s))
|
|
||||||
10038 WARN (Content Security Policy (CSP) Header Not Set)
|
|
||||||
10039 WARN (X-Backend-Server Header Information Leak)
|
|
||||||
10040 WARN (Secure Pages Include Mixed Content)
|
|
||||||
10041 WARN (HTTP to HTTPS Insecure Transition in Form Post)
|
|
||||||
10042 WARN (HTTPS to HTTP Insecure Transition in Form Post)
|
|
||||||
10043 WARN (User Controllable JavaScript Event (XSS))
|
|
||||||
10044 WARN (Big Redirect Detected (Potential Sensitive Information Leak))
|
|
||||||
10049 WARN (Content Cacheability)
|
|
||||||
10050 WARN (Retrieved from Cache)
|
|
||||||
10052 WARN (X-ChromeLogger-Data (XCOLD) Header Information Leak)
|
|
||||||
10054 WARN (Cookie without SameSite Attribute)
|
|
||||||
10055 WARN (CSP)
|
|
||||||
10056 WARN (X-Debug-Token Information Leak)
|
|
||||||
10057 WARN (Username Hash Found)
|
|
||||||
10061 WARN (X-AspNet-Version Response Header)
|
|
||||||
10062 WARN (PII Disclosure)
|
|
||||||
10063 WARN (Permissions Policy Header Not Set)
|
|
||||||
10096 WARN (Timestamp Disclosure)
|
|
||||||
10097 WARN (Hash Disclosure)
|
|
||||||
10098 WARN (Cross-Domain Misconfiguration)
|
|
||||||
10099 WARN (Source Code Disclosure)
|
|
||||||
10105 WARN (Weak Authentication Method)
|
|
||||||
10108 WARN (Reverse Tabnabbing)
|
|
||||||
10109 WARN (Modern Web Application)
|
|
||||||
10110 WARN (Dangerous JS Functions)
|
|
||||||
10111 WARN (Authentication Request Identified)
|
|
||||||
10112 WARN (Session Management Response Identified)
|
|
||||||
10113 WARN (Verification Request Identified)
|
|
||||||
10115 WARN (Script Served From Malicious Domain (polyfill))
|
|
||||||
10202 WARN (Absence of Anti-CSRF Tokens)
|
|
||||||
2 WARN (Private IP Disclosure)
|
|
||||||
3 WARN (Session ID in URL Rewrite)
|
|
||||||
50001 WARN (Script Passive Scan Rules)
|
|
||||||
90001 WARN (Insecure JSF ViewState)
|
|
||||||
90002 WARN (Java Serialization Object)
|
|
||||||
90003 WARN (Sub Resource Integrity Attribute Missing)
|
|
||||||
90004 WARN (Insufficient Site Isolation Against Spectre Vulnerability)
|
|
||||||
90011 WARN (Charset Mismatch)
|
|
||||||
90022 WARN (Application Error Disclosure)
|
|
||||||
90030 WARN (WSDL File Detection)
|
|
||||||
90033 WARN (Loosely Scoped Cookie)
|
|
File diff suppressed because it is too large
Load diff
Loading…
Reference in a new issue