Skip to content

Commit

Permalink
github: cisco-open to openclarity repo move (openclarity#151)
Browse files Browse the repository at this point in the history
  • Loading branch information
FrimIdan authored May 3, 2022
1 parent 11169c7 commit f2f2376
Show file tree
Hide file tree
Showing 243 changed files with 524 additions and 524 deletions.
4 changes: 2 additions & 2 deletions .github/CODEOWNERS
Original file line number Diff line number Diff line change
Expand Up @@ -4,8 +4,8 @@
# the repo. Unless a later match takes precedence,
# the following users/teams will be requested for
# review when someone opens a pull request.
* @cisco-open/kubei-maintainers
* @openclarity/kubeclarity-maintainers

# Enforces admin protections for repo configuration via probot settings app.
# ref: https://github.com/probot/settings#security-implications
.github/settings.yml @cisco-open/kubei-admins
.github/settings.yml @openclarity/kubeclarity-admins
12 changes: 6 additions & 6 deletions .github/workflows/reusable-build-and-push.yml
Original file line number Diff line number Diff line change
Expand Up @@ -23,7 +23,7 @@ jobs:
id: timestamp
run: echo "::set-output name=timestamp::$(date -u +'%Y-%m-%dT%H:%M:%SZ')"

apiclarity:
kubeclarity:
needs: timestamp
runs-on: ubuntu-latest
steps:
Expand Down Expand Up @@ -52,7 +52,7 @@ jobs:
uses: docker/build-push-action@v2
with:
context: .
tags: ghcr.io/cisco-open/kubeclarity:${{ inputs.image_tag }}
tags: ghcr.io/openclarity/kubeclarity:${{ inputs.image_tag }}
file: Dockerfile.backend
push: ${{ inputs.push }}
cache-from: type=local,src=/tmp/.buildx-cache
Expand Down Expand Up @@ -91,7 +91,7 @@ jobs:
uses: docker/build-push-action@v2
with:
context: .
tags: ghcr.io/cisco-open/kubeclarity-cis-docker-benchmark-scanner:${{ inputs.image_tag }}
tags: ghcr.io/openclarity/kubeclarity-cis-docker-benchmark-scanner:${{ inputs.image_tag }}
file: Dockerfile.cis_docker_benchmark_scanner
push: ${{ inputs.push }}
cache-from: type=local,src=/tmp/.buildx-cache
Expand Down Expand Up @@ -130,7 +130,7 @@ jobs:
uses: docker/build-push-action@v2
with:
context: .
tags: ghcr.io/cisco-open/kubeclarity-runtime-k8s-scanner:${{ inputs.image_tag }}
tags: ghcr.io/openclarity/kubeclarity-runtime-k8s-scanner:${{ inputs.image_tag }}
file: Dockerfile.runtime_k8s_scanner
push: ${{ inputs.push }}
cache-from: type=local,src=/tmp/.buildx-cache
Expand Down Expand Up @@ -169,7 +169,7 @@ jobs:
uses: docker/build-push-action@v2
with:
context: .
tags: ghcr.io/cisco-open/kubeclarity-sbom-db:${{ inputs.image_tag }}
tags: ghcr.io/openclarity/kubeclarity-sbom-db:${{ inputs.image_tag }}
file: Dockerfile.sbom_db
push: ${{ inputs.push }}
cache-from: type=local,src=/tmp/.buildx-cache
Expand Down Expand Up @@ -208,7 +208,7 @@ jobs:
uses: docker/build-push-action@v2
with:
context: .
tags: ghcr.io/cisco-open/kubeclarity-cli:${{ inputs.image_tag }}
tags: ghcr.io/openclarity/kubeclarity-cli:${{ inputs.image_tag }}
file: Dockerfile.cli
push: ${{ inputs.push }}
cache-from: type=local,src=/tmp/.buildx-cache
Expand Down
2 changes: 1 addition & 1 deletion .golangci.yml
Original file line number Diff line number Diff line change
Expand Up @@ -8,7 +8,7 @@ linters-settings:
golint:
min-confidence: 0.1
goimports:
local-prefixes: github.com/cisco-open/kubei
local-prefixes: github.com/openclarity/kubeclarity
errorlint:
# Check whether fmt.Errorf uses the %w verb for formatting errors. See the readme for caveats
errorf: false
Expand Down
2 changes: 1 addition & 1 deletion .goreleaser.yml
Original file line number Diff line number Diff line change
Expand Up @@ -5,7 +5,7 @@ builds:
binary: kubeclarity-cli
env:
- CGO_ENABLED=0
ldflags: "-s -w -X github.com/cisco-open/kubei/cli/pkg.GitRevision={{ .Version }}"
ldflags: "-s -w -X github.com/openclarity/kubeclarity/cli/pkg.GitRevision={{ .Version }}"
goos:
- linux
- darwin
Expand Down
6 changes: 3 additions & 3 deletions Dockerfile.backend
Original file line number Diff line number Diff line change
Expand Up @@ -54,9 +54,9 @@ COPY shared .
WORKDIR /build/backend
COPY backend .
RUN go build -ldflags="-s -w \
-X 'github.com/cisco-open/kubei/backend/pkg/version.Version=${VERSION}' \
-X 'github.com/cisco-open/kubei/backend/pkg/version.CommitHash=${COMMIT_HASH}' \
-X 'github.com/cisco-open/kubei/backend/pkg/version.BuildTimestamp=${BUILD_TIMESTAMP}'" -o backend ./cmd/backend/main.go
-X 'github.com/openclarity/kubeclarity/backend/pkg/version.Version=${VERSION}' \
-X 'github.com/openclarity/kubeclarity/backend/pkg/version.CommitHash=${COMMIT_HASH}' \
-X 'github.com/openclarity/kubeclarity/backend/pkg/version.BuildTimestamp=${BUILD_TIMESTAMP}'" -o backend ./cmd/backend/main.go

FROM alpine:3.15.4

Expand Down
6 changes: 3 additions & 3 deletions Dockerfile.cis_docker_benchmark_scanner
Original file line number Diff line number Diff line change
Expand Up @@ -23,9 +23,9 @@ RUN go mod download
WORKDIR /build/cis_docker_benchmark_scanner
COPY cis_docker_benchmark_scanner .
RUN CGO_ENABLED=0 go build -ldflags="-s -w \
-X 'github.com/cisco-open/kubei/cis_docker_benchmark_scanner/pkg/version.Version=${VERSION}' \
-X 'github.com/cisco-open/kubei/cis_docker_benchmark_scanner/pkg/version.CommitHash=${COMMIT_HASH}' \
-X 'github.com/cisco-open/kubei/cis_docker_benchmark_scanner/pkg/version.BuildTimestamp=${BUILD_TIMESTAMP}'" \
-X 'github.com/openclarity/kubeclarity/cis_docker_benchmark_scanner/pkg/version.Version=${VERSION}' \
-X 'github.com/openclarity/kubeclarity/cis_docker_benchmark_scanner/pkg/version.CommitHash=${COMMIT_HASH}' \
-X 'github.com/openclarity/kubeclarity/cis_docker_benchmark_scanner/pkg/version.BuildTimestamp=${BUILD_TIMESTAMP}'" \
-o cis_docker_benchmark_scanner ./cmd/main.go

FROM alpine:3.15.4
Expand Down
2 changes: 1 addition & 1 deletion Dockerfile.cli
Original file line number Diff line number Diff line change
Expand Up @@ -26,7 +26,7 @@ COPY shared .
WORKDIR /build/cli
COPY cli .
RUN go build -ldflags="-s -w \
-X 'github.com/cisco-open/kubei/cli/pkg.GitRevision=${COMMIT_HASH}'" -o cli ./main.go
-X 'github.com/openclarity/kubeclarity/cli/pkg.GitRevision=${COMMIT_HASH}'" -o cli ./main.go
RUN go build -ldflags "${LDFLAGS}" ./...

FROM alpine:3.15.4
Expand Down
6 changes: 3 additions & 3 deletions Dockerfile.runtime_k8s_scanner
Original file line number Diff line number Diff line change
Expand Up @@ -32,9 +32,9 @@ COPY shared .
WORKDIR /build/runtime_k8s_scanner
COPY runtime_k8s_scanner .
RUN go build -ldflags="-s -w \
-X 'github.com/cisco-open/kubei/runtime_k8s_scanner/pkg/version.Version=${VERSION}' \
-X 'github.com/cisco-open/kubei/runtime_k8s_scanner/pkg/version.CommitHash=${COMMIT_HASH}' \
-X 'github.com/cisco-open/kubei/runtime_k8s_scanner/pkg/version.BuildTimestamp=${BUILD_TIMESTAMP}'" \
-X 'github.com/openclarity/kubeclarity/runtime_k8s_scanner/pkg/version.Version=${VERSION}' \
-X 'github.com/openclarity/kubeclarity/runtime_k8s_scanner/pkg/version.CommitHash=${COMMIT_HASH}' \
-X 'github.com/openclarity/kubeclarity/runtime_k8s_scanner/pkg/version.BuildTimestamp=${BUILD_TIMESTAMP}'" \
-o runtime_k8s_scanner ./cmd/main.go

FROM alpine:3.15.4
Expand Down
6 changes: 3 additions & 3 deletions Dockerfile.sbom_db
Original file line number Diff line number Diff line change
Expand Up @@ -16,9 +16,9 @@ ARG COMMIT_HASH
# Copy and build backend code
COPY sbom_db/backend .
RUN go build -ldflags="-s -w \
-X 'github.com/cisco-open/kubei/sbom_db/backend/pkg/version.Version=${VERSION}' \
-X 'github.com/cisco-open/kubei/sbom_db/backend/pkg/version.CommitHash=${COMMIT_HASH}' \
-X 'github.com/cisco-open/kubei/sbom_db/backend/pkg/version.BuildTimestamp=${BUILD_TIMESTAMP}'" -o sbom_db ./cmd/main.go
-X 'github.com/openclarity/kubeclarity/sbom_db/backend/pkg/version.Version=${VERSION}' \
-X 'github.com/openclarity/kubeclarity/sbom_db/backend/pkg/version.CommitHash=${COMMIT_HASH}' \
-X 'github.com/openclarity/kubeclarity/sbom_db/backend/pkg/version.BuildTimestamp=${BUILD_TIMESTAMP}'" -o sbom_db ./cmd/main.go

FROM alpine:3.15.4

Expand Down
4 changes: 2 additions & 2 deletions Makefile
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,7 @@ SHELL=/bin/bash

# Project variables
BINARY_NAME ?= kubeclarity
DOCKER_REGISTRY ?= ghcr.io/kubeclarity
DOCKER_REGISTRY ?= ghcr.io/openclarity
VERSION ?= $(shell git rev-parse HEAD)
DOCKER_IMAGE ?= $(DOCKER_REGISTRY)/$(BINARY_NAME)
DOCKER_TAG ?= ${VERSION}
Expand Down Expand Up @@ -35,7 +35,7 @@ ui: ## Build UI
.PHONY: cli
cli: ## Build CLI
@(echo "Building CLI ..." )
@(cd cli && go build -ldflags "-X github.com/cisco-open/kubei/cli/pkg.GitRevision=${VERSION}" -o bin/cli ./main.go && ls -l bin/)
@(cd cli && go build -ldflags "-X github.com/openclarity/kubeclarity/cli/pkg.GitRevision=${VERSION}" -o bin/cli ./main.go && ls -l bin/)

.PHONY: backend
backend: ## Build Backend
Expand Down
14 changes: 7 additions & 7 deletions README.md
Original file line number Diff line number Diff line change
Expand Up @@ -72,7 +72,7 @@ KubeClarity is a tool for detection and management of Software Bill Of Materials
* Merging of SBOM and vulnerabilities across different CI/CD stages
* Export results to KubeClarity backend
* API
* The API for KubeClarity can be found [here](https://github.com/cisco-open/kubei/blob/master/api/swagger.yaml)
* The API for KubeClarity can be found [here](https://github.com/openclarity/kubeclarity/blob/master/api/swagger.yaml)

## High level architecture

Expand All @@ -90,7 +90,7 @@ KubeClarity vulnerability scanner integrates with the following scanners:
* [Grype](https://github.com/anchore/grype)
* [Dependency-Track](https://github.com/DependencyTrack/dependency-track)

The integrations with the SBOM generators can be found here [here](https://github.com/cisco-open/kubei/tree/master/shared/pkg/analyzer), and the integrations with the vulnerability scanners can be found here [here](https://github.com/cisco-open/kubei/tree/master/shared/pkg/scanner).
The integrations with the SBOM generators can be found [here](https://github.com/openclarity/kubeclarity/tree/master/shared/pkg/analyzer), and the integrations with the vulnerability scanners can be found here [here](https://github.com/openclarity/kubeclarity/tree/master/shared/pkg/scanner).
To enable and configure the supported SBOM generators and vulnerability scanners, please check the "analyzer" and "scanner" config under the "vulnerability-scanner" section in Helm values.

Contributions of integrations with additional tools are more than welcome!
Expand All @@ -100,7 +100,7 @@ Contributions of integrations with additional tools are more than welcome!
1. Add Helm repo

```shell
helm repo add kubeclarity https://cisco-open.github.io/kubei
helm repo add kubeclarity https://openclarity.github.io/kubeclarity
```
2. Save KubeClarity default chart values
```shell
Expand Down Expand Up @@ -150,7 +150,7 @@ Contributions of integrations with additional tools are more than welcome!
```
2. Run the backend using demo data:
```shell
docker run -p 8080:8080 -e FAKE_RUNTIME_SCANNER=true -e FAKE_DATA=true -e ENABLE_DB_INFO_LOGS=true -e DATABASE_DRIVER=LOCAL ghcr.io/kubeclarity/kubeclarity:test run
docker run -p 8080:8080 -e FAKE_RUNTIME_SCANNER=true -e FAKE_DATA=true -e ENABLE_DB_INFO_LOGS=true -e DATABASE_DRIVER=LOCAL ghcr.io/openclarity/kubeclarity:test run
```
2. Local build:
1. Build UI and backend
Expand All @@ -176,14 +176,14 @@ The results can be exported to KubeClarity backend.
### Binary Distribution

Download the release distribution for your OS from the [releases page](
https://github.com/cisco-open/kubei/releases)
https://github.com/openclarity/kubeclarity/releases)

Unpack the `kubeclarity-cli` binary, add it to your PATH, and you are good to go!

### Docker Image

A Docker image is available at `ghcr.io/cisco-open/kubeclarity-cli` with list of
available tags [here](https://github.com/cisco-open/kubei/pkgs/container/kubeclarity-cli/versions).
A Docker image is available at `ghcr.io/openclarity/kubeclarity-cli` with list of
available tags [here](https://github.com/openclarity/kubeclarity/pkgs/container/kubeclarity-cli/versions).

### Local Compilation
```
Expand Down
2 changes: 1 addition & 1 deletion api/client/client/kube_clarity_a_p_is_client.go

Some generated files are not rendered by default. Learn more about how customized files appear on GitHub.

Some generated files are not rendered by default. Learn more about how customized files appear on GitHub.

Some generated files are not rendered by default. Learn more about how customized files appear on GitHub.

Some generated files are not rendered by default. Learn more about how customized files appear on GitHub.

Some generated files are not rendered by default. Learn more about how customized files appear on GitHub.

2 changes: 1 addition & 1 deletion api/client/client/operations/get_applications_responses.go

Some generated files are not rendered by default. Learn more about how customized files appear on GitHub.

Some generated files are not rendered by default. Learn more about how customized files appear on GitHub.

Some generated files are not rendered by default. Learn more about how customized files appear on GitHub.

Some generated files are not rendered by default. Learn more about how customized files appear on GitHub.

Some generated files are not rendered by default. Learn more about how customized files appear on GitHub.

Some generated files are not rendered by default. Learn more about how customized files appear on GitHub.

Some generated files are not rendered by default. Learn more about how customized files appear on GitHub.

2 changes: 1 addition & 1 deletion api/client/client/operations/get_namespaces_responses.go

Some generated files are not rendered by default. Learn more about how customized files appear on GitHub.

Some generated files are not rendered by default. Learn more about how customized files appear on GitHub.

2 changes: 1 addition & 1 deletion api/client/client/operations/get_packages_id_responses.go

Some generated files are not rendered by default. Learn more about how customized files appear on GitHub.

2 changes: 1 addition & 1 deletion api/client/client/operations/get_packages_responses.go

Some generated files are not rendered by default. Learn more about how customized files appear on GitHub.

Some generated files are not rendered by default. Learn more about how customized files appear on GitHub.

Some generated files are not rendered by default. Learn more about how customized files appear on GitHub.

Some generated files are not rendered by default. Learn more about how customized files appear on GitHub.

Some generated files are not rendered by default. Learn more about how customized files appear on GitHub.

Loading

0 comments on commit f2f2376

Please sign in to comment.