Skip to content

Commit 8e04e99

Browse files
authored
Merge pull request #390 from simonbaird/update-urls
Update urls to new domain name
2 parents 665f0b4 + b4c0d93 commit 8e04e99

File tree

6 files changed

+15
-16
lines changed

6 files changed

+15
-16
lines changed

antora/antora-playbook.yml

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -21,8 +21,7 @@ runtime:
2121
failure_level: warn
2222
site:
2323
title: Conforma
24-
url: https://enterprisecontract.dev/docs
25-
#url: https://conforma.dev/docs
24+
url: https://conforma.dev/docs
2625
start_page: user-guide::index.adoc
2726
robots: allow
2827
content:

website/content/posts/a-taste-of-policies.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ author: "Luiz Carvalho"
55
---
66

77
In a [previous blog
8-
post](https://enterprisecontract.dev/posts/introducing-the-enterprise-contract/), we introduced the
8+
post](https://conforma.dev/posts/introducing-the-enterprise-contract/), we introduced the
99
basic concepts of the Enterprise Contract. This time, we explore it further to showcase the usage of
1010
policies.
1111

@@ -86,7 +86,7 @@ configuration:
8686
8787
This policy moves the certificate flags to the policy itself. It also specifies certain policy rules
8888
to be executed. Here we are including some of the existing Enterprise Contract policy rules,
89-
[github_certificate](https://enterprisecontract.dev/docs/ec-policies/release_policy.html#github_certificate_package).
89+
[github_certificate](https://conforma.dev/docs/ec-policies/release_policy.html#github_certificate_package).
9090
These policy rules rely on certain data to be provided, e.g. the expected GitHub Workflow
9191
repository. With this policy saved as `policy.yaml`, we can simplify how the CLI is invoked:
9292

@@ -189,7 +189,7 @@ deny contains result if {
189189
This defines a single policy rule that verifies the materials section of the SLSA Provenance contain
190190
the expected git repository. The Enterprise Contract relies on rego annotations to provide
191191
additional information about each of the policy rules. See the
192-
[docs](https://enterprisecontract.dev/docs/ec-policies/authoring.html) for more information.
192+
[docs](https://conforma.dev/docs/ec-policies/authoring.html) for more information.
193193

194194
Let's add this rule to our previous policy:
195195

website/content/posts/evaluating-custom-predicates.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ author: "Luiz Carvalho"
77
Attestations are a wonderful way to attach metadata to container images in a secure manner. One of
88
the most popular formats is [SLSA Provenance](https://slsa.dev/spec/v0.1/provenance#schema) which is
99
used to provide information on how the image was created. Our [Hitchhiker’s
10-
Guide](https://enterprisecontract.dev/docs/user-guide/hitchhikers-guide.html) demonstrates how
10+
Guide](https://conforma.dev/docs/user-guide/hitchhikers-guide.html) demonstrates how
1111
to write policies to assert the contents of the SLSA Provenance. Here, we expand on that approach to
1212
assert the contents of *any* attestation format, even completely made up ones.
1313

@@ -17,7 +17,7 @@ assert the contents of *any* attestation format, even completely made up ones.
1717

1818
Before getting started, let's make sure we have an image that is already signed and has a SLSA
1919
Provenance attestation. We will also need access to the signing key used. The [Hitchhiker’s
20-
Guide](https://enterprisecontract.dev/docs/user-guide/hitchhikers-guide.html) walks through the
20+
Guide](https://conforma.dev/docs/user-guide/hitchhikers-guide.html) walks through the
2121
process. If you want to try out the commands in this blog post, start there.
2222

2323
When we talk about different attestation formats, what we are really saying is different **predicate
@@ -111,7 +111,7 @@ _bacon_attestations := [attestation |
111111
]
112112
```
113113

114-
(Check out the [docs](https://enterprisecontract.dev/docs/ec-policies/authoring.html) for more
114+
(Check out the [docs](https://conforma.dev/docs/ec-policies/authoring.html) for more
115115
information on how to author policy rules 🔥)
116116

117117
Next, we create a policy configuration, `policy.yaml`, to use the policy rules above.

website/content/posts/gating-image-promotion-on-gitlab.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -296,7 +296,7 @@ GitLab.
296296
[GitLab container registry]: https://docs.gitlab.com/ee/user/packages/container_registry/
297297
[identity-based]: https://docs.sigstore.dev/signing/overview/
298298
[SLSA Provenance]: https://slsa.dev/spec/v1.0/
299-
[slsa_source_correlated]: https://enterprisecontract.dev/docs/ec-policies/release_policy.html#slsa_source_correlated_package
299+
[slsa_source_correlated]: https://conforma.dev/docs/ec-policies/release_policy.html#slsa_source_correlated_package
300300

301301
## Appendix
302302

website/content/posts/introducing-action-validate-image.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -22,7 +22,7 @@ processes or any other automated workflow in GitHub.
2222
- **GitHub Native**: Being a GitHub Action, EC Validate seamlessly integrates into your existing GitHub workflows, while also providing GitHub summary output.
2323
- **Policy Compliance**: Ability to tailor its validation checks based on custom or pre-defined policies.
2424
- **Integrity Checks**: Verifies that the image hasn't been tampered with.
25-
- **[Signature Verification Support](https://enterprisecontract.dev/docs/ec-cli/signing.html)**: Offers support for verifying both long-lived public-key signed, and keyless signed container images.
25+
- **[Signature Verification Support](https://conforma.dev/docs/ec-cli/signing.html)**: Offers support for verifying both long-lived public-key signed, and keyless signed container images.
2626

2727
Interested in learning more? Visit the EC Validate action in [GitHub's Market Place](https://github.com/marketplace/actions/ec-validate) for a user guide.
2828

@@ -113,7 +113,7 @@ Here is a version of the EC Action Validate that verifies artifacts signed by co
113113
- **`image`**: Similar to keyless, specifies the container image to be validated.
114114
- **`key`**: The public key used for long-lived authentication.
115115
- **`policy`**: Policy configuration, which can be either [predefined](https://github.com/enterprise-contract/config) or custom.
116-
- **`extra-params`**: Additional parameters for the action, such as ignoring Rekor for this image. More can be found [here](https://enterprisecontract.dev/docs/ec-cli/ec_validate_image.html#_options)
116+
- **`extra-params`**: Additional parameters for the action, such as ignoring Rekor for this image. More can be found [here](https://conforma.dev/docs/ec-cli/ec_validate_image.html#_options)
117117

118118
By using either keyless or long-lived authentication methods, you can tailor EC Action Validate to meet the specific security requirements of your project.
119119

website/content/posts/introducing-the-enterprise-contract.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ date: 2023-04-24T12:56:35-04:00
55

66
You may have heard of [sigstore](https://www.sigstore.dev/how-it-works) and its container image
77
verification tool, [cosign](https://docs.sigstore.dev/cosign/overview/). This blog post introduces a
8-
policy-driven workflow, [Enterprise Contract](https://enterprisecontract.dev/docs/),
8+
policy-driven workflow, [Enterprise Contract](https://conforma.dev/docs/),
99
built on those technologies.
1010

1111
<!--more-->
@@ -166,15 +166,15 @@ rekorUrl: ""
166166
```
167167

168168
The sources attribute specifies a list of rego policy rules and corresponding [data
169-
sources](https://enterprisecontract.dev/docs/ec-cli/configuration.html#_data_sources). Each data and
169+
sources](https://conforma.dev/docs/ec-cli/configuration.html#_data_sources). Each data and
170170
policy source can be specified via a different set of transports. Here we choose to use them
171171
directly from git.
172172

173173
In configuration, we specify what to include from the sources. (Omit this to include all!) In this
174174
example, the policy rules from the
175-
[slsa_source_version_controlled](https://enterprisecontract.dev/docs/ec-policies/release_policy.html#slsa_source_version_controlled_package)
175+
[slsa_source_version_controlled](https://conforma.dev/docs/ec-policies/release_policy.html#slsa_source_version_controlled_package)
176176
package are included. Check out the
177-
[docs](https://enterprisecontract.dev/docs/ec-cli/configuration.html) for more information.
177+
[docs](https://conforma.dev/docs/ec-cli/configuration.html) for more information.
178178

179179
We can also specify the public key and rekor URL directly in this file. This helps consolidate all
180180
the input parameters required for validating images.
@@ -300,5 +300,5 @@ plan on improving it even more. An important feature currently being worked on i
300300
keyless workflows which will increase the number of supported use cases.
301301

302302
If you want to learn more, check out our
303-
[docs](https://enterprisecontract.dev/docs/) and browse [the
303+
[docs](https://conforma.dev/docs/) and browse [the
304304
source](https://github.com/enterprise-contract)!

0 commit comments

Comments
 (0)