You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardexpand all lines: sechub-commons-model/src/main/java/com/mercedesbenz/sechub/commons/model/login/WebLoginVerificationConfiguration.java
Copy file name to clipboardexpand all lines: sechub-commons-model/src/test/java/com/mercedesbenz/sechub/commons/model/login/WebLoginVerificationConfigurationTest.java
Copy file name to clipboardexpand all lines: sechub-web-ui/README.md
+27-18
Original file line number
Diff line number
Diff line change
@@ -3,7 +3,7 @@
3
3
4
4
This project is a web application that provides a user interface for the SecHub API. It is built with [Vite](https://vitejs.dev/), [Vue 3](https://v3.vuejs.org/), and [Vuetify](https://vuetifyjs.com/en/).
5
5
6
-
## Usage
6
+
## Prequisites
7
7
8
8
### Installation
9
9
@@ -24,17 +24,6 @@ Install the project dependencies:
24
24
npm install
25
25
```
26
26
27
-
### Create a local configuration (.env)
28
-
29
-
Create a `.env` file in the sechub-webui directory
30
-
31
-
```bash
32
-
VITE_API_HOST=http://localhost:3000
33
-
VITE_API_USER=<your-api-user>
34
-
VITE_API_PASSWORD=<your-api-password>
35
-
VITE_API_LOCAL_DEV=true
36
-
```
37
-
38
27
### Building openAPI SecHub Client
39
28
40
29
To generate the SecHub openAPI Client use:
@@ -43,25 +32,45 @@ To generate the SecHub openAPI Client use:
43
32
npm run generate-api-client
44
33
```
45
34
46
-
### Starting the Development Server
35
+
## Usage
36
+
37
+
### Running local development server with SecHub Integrationtest Server
38
+
39
+
#### Create a local configuration (.env) with Basic Auth
40
+
41
+
Create a `.env` file in the sechub-webui directory
42
+
43
+
```bash
44
+
VITE_API_USERNAME=<your-api-user>
45
+
VITE_API_PASSWORD=<your-api-password>
46
+
VITE_API_BASIC_AUTH_DEV=true
47
+
```
48
+
49
+
#### Start the Development Server
47
50
48
51
To start the development server with hot-reload, run the following command. The server will be accessible at [http://localhost:3000](http://localhost:3000):
49
52
50
53
```bash
51
54
npm run dev
52
55
```
53
56
54
-
#### Running in Development mode with SecHub Integrationtest Server and PDS Integrationtest Server (using Mocked scan products)
57
+
#### Start SecHub Integrationtest Server
58
+
59
+
If you want to get Server responses, start the SecHub integrationtest Server e.g. via your IDE see the [developer guide](https://mercedes-benz.github.io/sechub/latest/sechub-developer-quickstart-guide.html#run-integration-tests-from-ide) for instructions.
60
+
Use the SecHub user and password for your basic auth .env file.
61
+
You can use the sechub-api.sh script to manage your user and project.
62
+
63
+
### Running local development server with SecHub Integrationtest Server and PDS Integrationtest Server (Mocked Products)
55
64
> Only useful If you want to get mocked scan results
56
-
1. Follow the steps above
65
+
1. Follow all steps above
57
66
2. Start the integration test PDS
58
67
(for the correct run configuration follow the [developer guide](https://mercedes-benz.github.io/sechub/latest/sechub-developer-quickstart-guide.html#run-integration-tests-from-ide))
3. (Optional) Initial setup: execute `test-setups/setup-integration-test-server.sh`. Make sure the .env file contains the correct values for basic auth.
60
69
61
-
####Running in Development mode with SecHub Server and PDS as Docker Container
70
+
### Running local development server with SecHub Docker Container and PDS Docker Container (Real Products)
62
71
> Only useful If you want to get real scan results
63
72
1. Start the SecHub Server as Docker Container (see sechub-solution/01-...)
64
-
2. Start the required PDS as Docker (e.g. sechub-pds-solutions/gosec/05-...)
73
+
2. Start the required PDS as Docker Container (e.g. sechub-pds-solutions/gosec/05-...)
65
74
3. Set up PDS in sechub-solution/setups/ e.g. setup-gosec.sh
66
75
4. Make sure your user is assigned to the project you want to scan
0 commit comments