Skip to content

Commit 8b3b417

Browse files
committed
chore: update references to ec-cli
This commit updates references to both the repository, from `enterprise-contract/ec-cli` to `conforma/cli`, as well as ec itself (from `ec-cli` to `cli` or `ec` as appropriate) to reflect the move from the `enterprise-contract` org to the `conforma` org along with the renaming of the repository from `ec-cli` to `cli`. Ref: EC-1110 Signed-off-by: Rob Nester <rnester@redhat.com>
1 parent b5fd51b commit 8b3b417

File tree

140 files changed

+404
-404
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

140 files changed

+404
-404
lines changed

.github/ISSUE_TEMPLATE/config.yaml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,7 @@
1818
blank_issues_enabled: false
1919
contact_links:
2020
- name: Community Forum
21-
url: https://github.com/enterprise-contract/ec-cli/discussions
21+
url: https://github.com/conforma/cli/discussions
2222
about: Please ask and answer questions here.
2323
- name: Community Chat
2424
url: https://join.slack.com/t/conforma-dev/shared_invite/zt-26l68e6wj-apw7c55CsDtd6Q9TgtiGuw

.github/workflows/checks-sealights.yaml

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -101,7 +101,7 @@ jobs:
101101
echo "[Sealights] Configuring SeaLights to scan the pull request branch"
102102
echo "Latest commit sha: ${LATEST_COMMIT_SHA}"
103103
echo "PR Number: ${PULL_REQUEST_NUMBER}"
104-
./slcli config create-pr-bsid --app ec-cli --target-branch "main" --pull-request-number ${PULL_REQUEST_NUMBER} --latest-commit ${LATEST_COMMIT_SHA} --repository-url https://github.com/enterprise-contract/ec-cli.git
104+
./slcli config create-pr-bsid --app cli --target-branch "main" --pull-request-number ${PULL_REQUEST_NUMBER} --latest-commit ${LATEST_COMMIT_SHA} --repository-url https://github.com/conforma/cli.git
105105
env:
106106
PULL_REQUEST_NUMBER: ${{ github.event.pull_request.number || github.event.issue.number }}
107107
LATEST_COMMIT_SHA: ${{github.event.pull_request.head.sha}}
@@ -110,15 +110,15 @@ jobs:
110110
if: env.on-event == 'push'
111111
run: |
112112
echo "[Sealights] Configuring SeaLights to scan the main branch after pull request was closed"
113-
./slcli config create-bsid --app ec-cli --branch main --build ${LATEST_COMMIT_SHA}
113+
./slcli config create-bsid --app cli --branch main --build ${LATEST_COMMIT_SHA}
114114
env:
115115
LATEST_COMMIT_SHA: ${{ github.sha }}
116116

117117
- name: Run the SeaLights scan
118118
id: sealights-scan
119119
run: |
120120
echo "[Sealights] Running the SeaLights scan"
121-
./slcli scan --bsid buildSessionId.txt --path-to-scanner ./slgoagent --workspacepath ./ --scm git --scmBaseUrl https://github.com/enterprise-contract/ec-cli.git --scmVersion “0” --scmProvider github
121+
./slcli scan --bsid buildSessionId.txt --path-to-scanner ./slgoagent --workspacepath ./ --scm git --scmBaseUrl https://github.com/conforma/cli.git --scmVersion “0” --scmProvider github
122122
echo bsid=$(< buildSessionId.txt) | tee -a "$GITHUB_OUTPUT"
123123
- name: clean all SeaLights secret stuff
124124
run: |

.github/workflows/release.yaml

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -42,7 +42,7 @@ jobs:
4242
GH_TOKEN: ${{ github.token }}
4343
GH_COBRA: 1
4444
run: |
45-
echo head_sha=$(gh api /repos/enterprise-contract/ec-cli/git/matching-refs/heads/main --jq '.[0].object.sha') | tee -a "$GITHUB_OUTPUT"
45+
echo head_sha=$(gh api /repos/conforma/cli/git/matching-refs/heads/main --jq '.[0].object.sha') | tee -a "$GITHUB_OUTPUT"
4646
- name: Timestamp
4747
id: timestamp
4848
run: |
@@ -60,7 +60,7 @@ jobs:
6060
if: ${{ (github.event.workflow_run.conclusion == 'success' && github.event.workflow_run.head_sha == needs.info.outputs.head_sha) || github.event_name == 'workflow_dispatch' }}
6161

6262
env:
63-
IMAGE_REPO: quay.io/enterprise-contract/ec-cli
63+
IMAGE_REPO: quay.io/conforma/cli
6464
TAG: ${{ github.sha }}
6565
TAG_TIMESTAMP: ${{ github.sha }}-${{ needs.info.outputs.timestamp }}
6666

@@ -116,11 +116,11 @@ jobs:
116116
- name: Registry login (quay.io/enterprise-contract)
117117
run: podman login -u ${{ secrets.BUNDLE_PUSH_USER_EC }} -p ${{ secrets.BUNDLE_PUSH_PASS_EC }} quay.io
118118

119-
- name: Create and push image (quay.io/enterprise-contract/ec-cli)
119+
- name: Create and push image (quay.io/conforma/cli)
120120
run: make dist-image-push IMAGE_TAG=$TAG IMAGE_REPO=$IMAGE_REPO ADD_IMAGE_TAG="snapshot $TAG_TIMESTAMP"
121121

122122
# verify ec works in the image and show the version
123-
- name: verify the ec-cli image
123+
- name: verify the ec image
124124
env:
125125
IMAGE_TAG: snapshot
126126
run: make verify-image

.golangci.yaml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -30,7 +30,7 @@ linters-settings:
3030
sections:
3131
- standard
3232
- default
33-
- prefix(github.com/enterprise-contract/ec-cli)
33+
- prefix(github.com/conforma/cli)
3434

3535
issues:
3636
exclude-rules:

Dockerfile

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -51,7 +51,7 @@ ARG TARGETARCH
5151
ARG CLI_NAME="Conforma"
5252

5353
LABEL \
54-
name="ec-cli" \
54+
name="ec" \
5555
description="${CLI_NAME} verifies and checks supply chain artifacts to ensure they meet security and business policies." \
5656
io.k8s.description="${CLI_NAME} verifies and checks supply chain artifacts to ensure they meet security and business policies." \
5757
summary="Provides the binaries for downloading the ${CLI_NAME} CLI. Also used as a runner image for Tekton tasks." \

Dockerfile.dist

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -51,13 +51,13 @@ ARG TARGETARCH
5151
ARG CLI_NAME="Enterprise Contract"
5252

5353
LABEL \
54-
name="ec-cli" \
54+
name="ec" \
5555
description="${CLI_NAME} verifies and checks supply chain artifacts to ensure they meet security and business policies." \
5656
io.k8s.description="${CLI_NAME} verifies and checks supply chain artifacts to ensure they meet security and business policies." \
5757
summary="Provides the binaries for downloading the ${CLI_NAME} CLI. Also used as a runner image for Tekton tasks." \
5858
io.k8s.display-name="${CLI_NAME}" \
5959
io.openshift.tags="rhtas rhtap trusted-artifact-signer trusted-application-pipeline enterprise-contract conforma ec opa cosign sigstore" \
60-
com.redhat.component="ec-cli"
60+
com.redhat.component="ec"
6161

6262
# Install tools we want to use in the Tekton task
6363
RUN microdnf upgrade --assumeyes --nodocs --setopt=keepcache=0 --refresh && microdnf -y --nodocs --setopt=keepcache=0 install gzip jq ca-certificates

Makefile

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -54,7 +54,7 @@ BUILD_BIN_SUFFIX=$(if $(DEBUG_BUILD),_debug,)
5454
$(ALL_SUPPORTED_OS_ARCH): generate ## Build binaries for specific platform/architecture, e.g. make dist/ec_linux_amd64
5555
@GOOS=$(word 2,$(subst _, ,$(notdir $@))); \
5656
GOARCH=$(word 3,$(subst _, ,$(notdir $@))); \
57-
GOOS=$${GOOS} GOARCH=$${GOARCH} CGO_ENABLED=0 go build $(BUILD_TRIMPATH) $(BUILD_GC_FLAGS) -ldflags="$(BUILD_LD_FLAGS) -X github.com/enterprise-contract/ec-cli/internal/version.Version=$(VERSION)" -o dist/ec_$${GOOS}_$${GOARCH}$(BUILD_BIN_SUFFIX); \
57+
GOOS=$${GOOS} GOARCH=$${GOARCH} CGO_ENABLED=0 go build $(BUILD_TRIMPATH) $(BUILD_GC_FLAGS) -ldflags="$(BUILD_LD_FLAGS) -X github.com/conforma/cli/internal/version.Version=$(VERSION)" -o dist/ec_$${GOOS}_$${GOARCH}$(BUILD_BIN_SUFFIX); \
5858
sha256sum -b dist/ec_$${GOOS}_$${GOARCH}$(BUILD_BIN_SUFFIX) > dist/ec_$${GOOS}_$${GOARCH}$(BUILD_BIN_SUFFIX).sha256
5959

6060
.PHONY: dist
@@ -210,7 +210,7 @@ lint-fix: ## Fix linting issues automagically
210210
# We don't apply the fixes from the internal (error handling) linter.
211211
# TODO: fix the outstanding error handling lint issues and enable the fixer
212212
# @go run -modfile tools/go.mod ./internal/lint -fix $$(go list ./... | grep -v '/acceptance/')
213-
@go run -modfile tools/go.mod github.com/daixiang0/gci write -s standard -s default -s "prefix(github.com/enterprise-contract/ec-cli)" .
213+
@go run -modfile tools/go.mod github.com/daixiang0/gci write -s standard -s default -s "prefix(github.com/conforma/cli)" .
214214

215215
node_modules: package-lock.json
216216
@npm ci
@@ -238,19 +238,19 @@ go-mod-lint:
238238
##@ Pushing images
239239

240240
IMAGE_TAG ?= latest
241-
IMAGE_REPO ?= quay.io/enterprise-contract/ec-cli
241+
IMAGE_REPO ?= quay.io/conforma/cli
242242
.PHONY: build-image
243-
build-image: image_$(BUILD_IMG_ARCH) ## Build container image with ec-cli
243+
build-image: image_$(BUILD_IMG_ARCH) ## Build container image with ec
244244

245245
.PHONY: push-image
246-
push-image: push_image_$(BUILD_IMG_ARCH) ## Push ec-cli container image to default location
246+
push-image: push_image_$(BUILD_IMG_ARCH) ## Push ec container image to default location
247247

248248
.PHONY: build-snapshot-image
249-
build-snapshot-image: push-image ## Build the ec-cli image and tag it with "snapshot"
249+
build-snapshot-image: push-image ## Build the ec image and tag it with "snapshot"
250250
@podman tag $(IMAGE_REPO):$(IMAGE_TAG) $(IMAGE_REPO):snapshot
251251

252252
.PHONY: push-snapshot-image
253-
push-snapshot-image: build-snapshot-image ## Push the ec-cli image with the "snapshot" tag
253+
push-snapshot-image: build-snapshot-image ## Push the ec image with the "snapshot" tag
254254
@podman push $(PODMAN_OPTS) $(IMAGE_REPO):snapshot
255255

256256
.PHONY: $(ALL_SUPPORTED_IMG_OS_ARCH)
@@ -318,7 +318,7 @@ dev: TASKS:=$(shell T=$$(mktemp) && yq e ".spec.steps[].image? = \"localhost:$(R
318318
tasks/verify-enterprise-contract/*/verify-enterprise-contract.yaml \
319319
tasks/verify-conforma-konflux-ta/*/verify-conforma-konflux-ta.yaml \
320320
| yq 'select(. != null)' > "$${T}" && echo "$${T}")
321-
dev: push-image task-bundle ## Push the ec-cli and v-e-c Task Bundle to the kind cluster setup via hack/setup-dev-environment.sh
321+
dev: push-image task-bundle ## Push the ec and v-e-c Task Bundle to the kind cluster setup via hack/setup-dev-environment.sh
322322
@rm "$(TASKS)"
323323

324324
TASK_TAG ?= latest

README.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -116,7 +116,7 @@ This issue may be resolved by adding the below entries in the `/etc/hosts` file:
116116
127.0.0.1 rekor.localhost
117117
```
118118

119-
This issue arises because the acceptance tests use ec-cli binaries built with `CGO_ENABLED=0`. This setting, [chosen for OS compatibility](https://github.com/enterprise-contract/ec-cli/pull/703), causes the program to use Go's native DNS resolver instead of the system's libc resolver ([learn more](https://go.dev/doc/go1.5#net)). Consequently, the binary is unable to resolve 2nd level localhost domains like `apiserver.localhost`, as the native Go DNS resolver does not support resolution for such names in the same way the system resolver does.
119+
This issue arises because the acceptance tests use ec binaries built with `CGO_ENABLED=0`. This setting, [chosen for OS compatibility](https://github.com/conforma/cli/pull/703), causes the program to use Go's native DNS resolver instead of the system's libc resolver ([learn more](https://go.dev/doc/go1.5#net)). Consequently, the binary is unable to resolve 2nd level localhost domains like `apiserver.localhost`, as the native Go DNS resolver does not support resolution for such names in the same way the system resolver does.
120120

121121
[pol]: https://github.com/conforma/policy/
122-
[docs]: https://conforma.dev/docs/ec-cli/ec.html
122+
[docs]: https://conforma.dev/docs/cli/ec.html

acceptance/README.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -47,7 +47,7 @@ The `-tags` argument is for selecting acceptance test scenarios.
4747

4848
Also notice that there are different ways of specifying the path to the
4949
acceptance tests. `./...` can only be be used if `-args` is NOT used. Use,
50-
`./acceptance` or `github.com/enterprise-contract/ec-cli/acceptance`
50+
`./acceptance` or `github.com/conforma/cli/acceptance`
5151
in such cases.
5252

5353
Depending on your setup Testcontainer's ryuk container might need to be run as
@@ -68,7 +68,7 @@ reason `make acceptance` builds the binary prior to running the tests.)
6868

6969
To use a debugger, like [delve](https://github.com/go-delve/delve), you must
7070
determine what part of the code is being debugged. If it's part of the
71-
acceptance module, `github.com/enterprise-contract/ec-cli/acceptance`, or
71+
acceptance module, `github.com/conforma/cli/acceptance`, or
7272
it is a dependency of the acceptance module, then the debugger can be invoked
7373
directly. However, if the code to be debugged is in any other module, first
7474
run the acceptance tests in `-persist` mode. The, scan the test logs for the

acceptance/acceptance_test.go

Lines changed: 14 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -27,20 +27,20 @@ import (
2727
"github.com/cucumber/godog"
2828
"github.com/gkampitakis/go-snaps/snaps"
2929

30-
"github.com/enterprise-contract/ec-cli/acceptance/cli"
31-
"github.com/enterprise-contract/ec-cli/acceptance/conftest"
32-
"github.com/enterprise-contract/ec-cli/acceptance/crypto"
33-
"github.com/enterprise-contract/ec-cli/acceptance/git"
34-
"github.com/enterprise-contract/ec-cli/acceptance/image"
35-
"github.com/enterprise-contract/ec-cli/acceptance/kubernetes"
36-
"github.com/enterprise-contract/ec-cli/acceptance/log"
37-
"github.com/enterprise-contract/ec-cli/acceptance/pipeline"
38-
"github.com/enterprise-contract/ec-cli/acceptance/registry"
39-
"github.com/enterprise-contract/ec-cli/acceptance/rekor"
40-
"github.com/enterprise-contract/ec-cli/acceptance/tekton"
41-
"github.com/enterprise-contract/ec-cli/acceptance/testenv"
42-
"github.com/enterprise-contract/ec-cli/acceptance/tuf"
43-
"github.com/enterprise-contract/ec-cli/acceptance/wiremock"
30+
"github.com/conforma/cli/acceptance/cli"
31+
"github.com/conforma/cli/acceptance/conftest"
32+
"github.com/conforma/cli/acceptance/crypto"
33+
"github.com/conforma/cli/acceptance/git"
34+
"github.com/conforma/cli/acceptance/image"
35+
"github.com/conforma/cli/acceptance/kubernetes"
36+
"github.com/conforma/cli/acceptance/log"
37+
"github.com/conforma/cli/acceptance/pipeline"
38+
"github.com/conforma/cli/acceptance/registry"
39+
"github.com/conforma/cli/acceptance/rekor"
40+
"github.com/conforma/cli/acceptance/tekton"
41+
"github.com/conforma/cli/acceptance/testenv"
42+
"github.com/conforma/cli/acceptance/tuf"
43+
"github.com/conforma/cli/acceptance/wiremock"
4444
)
4545

4646
// NOTE: flags need to be initialized with the package in order to be recognized

0 commit comments

Comments
 (0)