Skip to content

Commit

Permalink
chore(ggshield): rename most references in repo
Browse files Browse the repository at this point in the history
  • Loading branch information
jguerreiro authored and Jguer committed Jul 12, 2021
1 parent 40d0299 commit 1f63dec
Show file tree
Hide file tree
Showing 10 changed files with 52 additions and 52 deletions.
6 changes: 3 additions & 3 deletions CONTRIBUTING.md
Original file line number Diff line number Diff line change
Expand Up @@ -3,7 +3,7 @@
### Submit a bug report

- Make sure you can reproduce it in the latest version of GitGuardian Shield.
- Open an issue on the [issue tracker](https://github.com/GitGuardian/gg-shield/issues).
- Open an issue on the [issue tracker](https://github.com/GitGuardian/ggshield/issues).

### Fix an open and confirmed bug

Expand All @@ -13,11 +13,11 @@

### Propose a new feature

- Open an issue on the [issue tracker](https://github.com/GitGuardian/gg-shield/issues/new?assignees=&labels=feature+request&template=feature_request.md&title=Feature+Request) with a `feature request` label.
- Open an issue on the [issue tracker](https://github.com/GitGuardian/ggshield/issues/new?assignees=&labels=feature+request&template=feature_request.md&title=Feature+Request) with a `feature request` label.

### Implement a new CI integration

- Open an issue on the [issue tracker](https://github.com/GitGuardian/gg-shield/issues/new?assignees=&labels=CI+integration&template=feature_request.md&title=CI+Integration:).
- Open an issue on the [issue tracker](https://github.com/GitGuardian/ggshield/issues/new?assignees=&labels=CI+integration&template=feature_request.md&title=CI+Integration:).
- No core contributor review is necessary on this feature.
- Submit a Pull request

Expand Down
62 changes: 31 additions & 31 deletions README.md
Original file line number Diff line number Diff line change
@@ -1,25 +1,25 @@
<a href="https://gitguardian.com/"><img src="https://cdn.jsdelivr.net/gh/gitguardian/gg-shield/doc/logo.svg"></a>
<a href="https://gitguardian.com/"><img src="https://cdn.jsdelivr.net/gh/gitguardian/ggshield/doc/logo.svg"></a>

---

# [GitGuardian Shield](https://github.com/GitGuardian/gg-shield): protect your secrets with GitGuardian
# [GitGuardian Shield](https://github.com/GitGuardian/ggshield): protect your secrets with GitGuardian

[![PyPI](https://img.shields.io/pypi/v/ggshield?color=%231B2D55&style=for-the-badge)](https://pypi.org/project/ggshield/)
[![Docker Image Version (latest semver)](https://img.shields.io/docker/v/gitguardian/ggshield?color=1B2D55&sort=semver&style=for-the-badge&label=Docker)](https://hub.docker.com/r/gitguardian/ggshield)
[![License](https://img.shields.io/github/license/GitGuardian/gg-shield?color=%231B2D55&style=for-the-badge)](LICENSE)
![GitHub stars](https://img.shields.io/github/stars/gitguardian/gg-shield?color=%231B2D55&style=for-the-badge)
![GitHub Workflow Status](https://img.shields.io/github/workflow/status/GitGuardian/gg-shield/Application%20Main%20Branch?style=for-the-badge)
[![CodeFactor Grade](https://img.shields.io/codefactor/grade/github/gitguardian/gg-shield?style=for-the-badge)](https://www.codefactor.io/repository/github/gitguardian/gg-shield)
[![Codecov](https://img.shields.io/codecov/c/github/GitGuardian/gg-shield?style=for-the-badge)](https://codecov.io/gh/GitGuardian/gg-shield/)
[![License](https://img.shields.io/github/license/GitGuardian/ggshield?color=%231B2D55&style=for-the-badge)](LICENSE)
![GitHub stars](https://img.shields.io/github/stars/gitguardian/ggshield?color=%231B2D55&style=for-the-badge)
![GitHub Workflow Status](https://img.shields.io/github/workflow/status/GitGuardian/ggshield/Application%20Main%20Branch?style=for-the-badge)
[![CodeFactor Grade](https://img.shields.io/codefactor/grade/github/gitguardian/ggshield?style=for-the-badge)](https://www.codefactor.io/repository/github/gitguardian/ggshield)
[![Codecov](https://img.shields.io/codecov/c/github/GitGuardian/ggshield?style=for-the-badge)](https://codecov.io/gh/GitGuardian/ggshield/)

The **GitGuardian shield** (gg-shield) is a CLI application that runs in your local environment
The **GitGuardian shield** (ggshield) is a CLI application that runs in your local environment
or in a CI environment to help you detect more than 200 types of secrets, as well as other potential security vulnerabilities or policy breaks.

**GitGuardian shield** uses our [public API](https://api.gitguardian.com/doc) through [py-gitguardian](https://github.com/GitGuardian/py-gitguardian) to scan your files and detect potential secrets in your code. **The `/v1/scan` endpoint of the [public API](https://api.gitguardian.com/doc) is stateless. We will not store any files you are sending or any secrets we have detected**.

You can also use gg-shield via the [pre-commit](https://pre-commit.com/) framework on your repositories, or as a standalone pre-commit either globally or locally.
You can also use ggshield via the [pre-commit](https://pre-commit.com/) framework on your repositories, or as a standalone pre-commit either globally or locally.

You'll need an **API Key** from [GitGuardian](https://dashboard.gitguardian.com/api/v1/auth/user/github_login/authorize?utm_source=github&utm_medium=gg_shield&utm_campaign=shield1) to use gg-shield.
You'll need an **API Key** from [GitGuardian](https://dashboard.gitguardian.com/api/v1/auth/user/github_login/authorize?utm_source=github&utm_medium=gg_shield&utm_campaign=shield1) to use ggshield.

Add the API Key to your environment variables:

Expand Down Expand Up @@ -85,7 +85,7 @@ Install and update using `pip`:
$ pip install ggshield
```

gg-shield supports **Python 3.6 and newer**.
ggshield supports **Python 3.6 and newer**.

The package should run on MacOS, Linux and Windows.

Expand Down Expand Up @@ -126,7 +126,7 @@ Commands:

## Scan command

`ggshield scan` is the main command for **gg-shield**, it has a few config
`ggshield scan` is the main command for **ggshield**, it has a few config
options that can be used to override output behaviour.

```shell
Expand Down Expand Up @@ -205,9 +205,9 @@ Commands:
REPOSITORY is the clone URI or the path of the repository to scan.
Examples:

ggshield scan repo [email protected]:GitGuardian/gg-shield.git
ggshield scan repo [email protected]:GitGuardian/ggshield.git

ggshield scan repo /repositories/gg-shield
ggshield scan repo /repositories/ggshield
```
- `Docker`: scan a Docker image after exporting its filesystem and manifest with the `docker save` command.
Expand Down Expand Up @@ -401,7 +401,7 @@ Alternatively to setting the `GITGUARDIAN_API_URL` environment variable, set the
## Ignoring a secret
Useful for ignoring a revoked test credential or a false positive, there are three ways to ignore a secret with gg-shield:
Useful for ignoring a revoked test credential or a false positive, there are three ways to ignore a secret with ggshield:
### In code
Expand Down Expand Up @@ -447,7 +447,7 @@ Create a `.pre-commit-config.yaml` file in your root repository:
```yaml
repos:
- repo: https://github.com/gitguardian/gg-shield
- repo: https://github.com/gitguardian/ggshield
rev: main
hooks:
- id: ggshield
Expand Down Expand Up @@ -506,7 +506,7 @@ You can force override with the `--force` option:
$ ggshield install --mode local --force
```
If you already have a pre-commit executable file and you want to use gg-shield,
If you already have a pre-commit executable file and you want to use ggshield,
all you need to do is to add this line in the file:
```shell
Expand Down Expand Up @@ -545,7 +545,7 @@ Create a `.pre-commit-config.yaml` file in your root repository:
```yaml
repos:
- repo: https://github.com/gitguardian/gg-shield
- repo: https://github.com/gitguardian/ggshield
rev: main
hooks:
- id: ggshield-push
Expand Down Expand Up @@ -602,7 +602,7 @@ Now you're good to go!
A pre-receive hook allows you to reject commits from being pushed to a git repository if they do not validate every check.
You can find **gg-shield**'s pre-receive hook samples in the [doc/pre-receive.sample](doc/pre-receive.sample) and [doc/pre-receive-python.sample](doc/pre-receive-python.sample).
You can find **ggshield**'s pre-receive hook samples in the [doc/pre-receive.sample](doc/pre-receive.sample) and [doc/pre-receive-python.sample](doc/pre-receive-python.sample).
### Python git pre-receive hook
Expand Down Expand Up @@ -674,7 +674,7 @@ Do not forget to add your [GitGuardian API Key](https://dashboard.gitguardian.co
**ggshield's** support of GitHub comes in the form of GitHub actions.
The action for this repository is hosted at [gg-shield-action](https://github.com/GitGuardian/gg-shield-action).
The action for this repository is hosted at [ggshield-action](https://github.com/GitGuardian/ggshield-action).
Configuring a GitHub workflow to use **ggshield** is as simple as
adding a step to your project's workflow:
Expand All @@ -694,7 +694,7 @@ jobs:
with:
fetch-depth: 0 # fetch all history so multiple commits can be scanned
- name: GitGuardian scan
uses: GitGuardian/gg-shield-action@master
uses: GitGuardian/ggshield-action@master
env:
GITHUB_PUSH_BEFORE_SHA: ${{ github.event.before }}
GITHUB_PUSH_BASE_SHA: ${{ github.event.base }}
Expand Down Expand Up @@ -727,19 +727,19 @@ Do not forget to add your [GitGuardian API Key](https://dashboard.gitguardian.co
# Circle CI
Circle CI is supported in **gg-shield** through [gg-shield-orb](https://github.com/GitGuardian/gg-shield-orb).
Circle CI is supported in **ggshield** through [ggshield-orb](https://github.com/GitGuardian/ggshield-orb).
To add gg-shield to your pipelines configure your `.circleci/config.yml` to add the gg-shield orb:
To add ggshield to your pipelines configure your `.circleci/config.yml` to add the ggshield orb:
```yaml
orbs:
gg-shield: gitguardian/ggshield
ggshield: gitguardian/ggshield
workflows:
main:
jobs:
- gg-shield/scan:
name: gg-shield-scan # best practice is to name each orb job
- ggshield/scan:
name: ggshield-scan # best practice is to name each orb job
base_revision: << pipeline.git.base_revision >>
revision: <<pipeline.git.revision>>
```
Expand All @@ -748,7 +748,7 @@ Do not forget to add your [GitGuardian API Key](https://dashboard.gitguardian.co
# Travis CI
To add gg-shield to your pipelines configure your `.travis.yml` to add a gg-shield scanning job:
To add ggshield to your pipelines configure your `.travis.yml` to add a ggshield scanning job:
```yml
jobs:
Expand All @@ -768,7 +768,7 @@ Do not forget to add your [GitGuardian API Key](https://dashboard.gitguardian.co
# Jenkins
To add gg-shield to your pipelines configure your `Jenkinsfile` to add a gg-shield stage:
To add ggshield to your pipelines configure your `Jenkinsfile` to add a ggshield stage:
```groovy
pipeline {
Expand All @@ -793,15 +793,15 @@ Do not forget to add your [GitGuardian API Key](https://dashboard.gitguardian.co
# Drone
To add gg-shield to your pipelines configure your `.drone.yml` to add a gg-shield stage:
To add ggshield to your pipelines configure your `.drone.yml` to add a ggshield stage:
```groovy
kind: pipeline
type: docker
name: default
steps:
- name: gg-shield
- name: ggshield
image: gitguardian/ggshield:latest
commands:
- ggshield scan ci
Expand All @@ -815,7 +815,7 @@ Do not forget to add your [GitGuardian API Key](https://dashboard.gitguardian.co
> ⚠ Azure Pipelines does not support commit ranges outside of GitHub Pull Requests, therefore on push events in a regular branch only your latest commit will be scanned.
> This limitation doesn't apply to GitHub Pull Requests where all the commits in the pull request will be scanned.
To add gg-shield to your pipelines configure your `azure-pipelines.yml` to add a gg-shield scanning job:
To add ggshield to your pipelines configure your `azure-pipelines.yml` to add a ggshield scanning job:
```yml
jobs:
Expand Down
2 changes: 1 addition & 1 deletion doc/pre-receive-python.sample
Original file line number Diff line number Diff line change
@@ -1,5 +1,5 @@
#!/bin/bash
# gg-shield as a pre-commit hook
# ggshield as a pre-commit hook
# Prequirements:
# python >= 3.6, pip
# Installation instructions:
Expand Down
2 changes: 1 addition & 1 deletion doc/pre-receive.sample
Original file line number Diff line number Diff line change
@@ -1,5 +1,5 @@
#!/bin/bash
# gg-shield as a pre-commit hook
# ggshield as a pre-commit hook
# Move `pre-receive.sample` to `.git/hooks/pre-receive`
# Do not forget to `chmod +x .git/hooks/pre-receive`
# either set an environment variable machine wide `GITGUARDIAN_API_KEY`
Expand Down
2 changes: 1 addition & 1 deletion ggshield/__init__.py
Original file line number Diff line number Diff line change
@@ -1 +1 @@
__version__ = "1.7.0"
__version__ = "1.7.1"
4 changes: 2 additions & 2 deletions ggshield/dev_scan.py
Original file line number Diff line number Diff line change
Expand Up @@ -73,9 +73,9 @@ def repo_cmd(ctx: click.Context, repository: str) -> int: # pragma: no cover
REPOSITORY is the clone URI or the path of the repository to scan.
Examples:
ggshield scan repo [email protected]:GitGuardian/gg-shield.git
ggshield scan repo [email protected]:GitGuardian/ggshield.git
ggshield scan repo /repositories/gg-shield
ggshield scan repo /repositories/ggshield
"""
config: Config = ctx.obj["config"]
cache: Cache = ctx.obj["cache"]
Expand Down
2 changes: 1 addition & 1 deletion ggshield/ignore.py
Original file line number Diff line number Diff line change
Expand Up @@ -9,7 +9,7 @@
@click.option(
"--last-found",
is_flag=True,
help="Ignore secrets found in the last gg-shield scan run",
help="Ignore secrets found in the last ggshield scan run",
)
@click.pass_context
def ignore(ctx: click.Context, last_found: bool) -> int:
Expand Down
2 changes: 1 addition & 1 deletion setup.py
Original file line number Diff line number Diff line change
Expand Up @@ -28,7 +28,7 @@ def get_version() -> str:
description="Detect secrets from all sources using GitGuardian's brains",
long_description=read("README.md"),
long_description_content_type="text/markdown",
url="https://github.com/GitGuardian/gg-shield",
url="https://github.com/GitGuardian/ggshield",
author="GitGuardian",
author_email="[email protected]",
maintainer="GitGuardian",
Expand Down
10 changes: 5 additions & 5 deletions tests/test_cli.py
Original file line number Diff line number Diff line change
Expand Up @@ -256,13 +256,13 @@ def test_invalid_scan_repo_github(self, cli_fs_runner):
THEN a validation error proposing error correction should be shown
"""
result = cli_fs_runner.invoke(
cli, ["scan", "repo", "https://github.com/gitguardian/gg-shield"]
cli, ["scan", "repo", "https://github.com/gitguardian/ggshield"]
)
assert result.exit_code == 1
assert (
"Error: https://github.com/gitguardian/gg-shield doesn't seem to "
"Error: https://github.com/gitguardian/ggshield doesn't seem to "
"be a valid git URL.\nDid you mean "
"https://github.com/gitguardian/gg-shield.git?" in result.output
"https://github.com/gitguardian/ggshield.git?" in result.output
)

def test_invalid_scan_repo_url(self, cli_fs_runner):
Expand All @@ -272,11 +272,11 @@ def test_invalid_scan_repo_url(self, cli_fs_runner):
THEN a validation error should be shown
"""
result = cli_fs_runner.invoke(
cli, ["scan", "repo", "trial.gitguardian.com/gitguardian/gg-shield"]
cli, ["scan", "repo", "trial.gitguardian.com/gitguardian/ggshield"]
)
assert result.exit_code == 1
assert (
"Error: trial.gitguardian.com/gitguardian/gg-shield is"
"Error: trial.gitguardian.com/gitguardian/ggshield is"
" neither a valid path nor a git URL" in result.output
)

Expand Down
12 changes: 6 additions & 6 deletions tests/test_docker.py
Original file line number Diff line number Diff line change
Expand Up @@ -94,11 +94,11 @@ def test_docker_scan(
self, scan_mock: Mock, save_mock, cli_fs_runner: click.testing.CliRunner
):
scan_mock.return_value = ScanCollection(
id="gg-shield-non-existant", type="docker", results=[]
id="ggshield-non-existant", type="docker", results=[]
)
result = cli_fs_runner.invoke(
cli,
["-v", "scan", "docker", "gg-shield-non-existant"],
["-v", "scan", "docker", "ggshield-non-existant"],
)
assert result.exit_code == 0

Expand All @@ -109,11 +109,11 @@ def test_docker_scan_abort(
):
save_mock.side_effect = click.exceptions.Abort()
scan_mock.return_value = ScanCollection(
id="gg-shield-non-existant", type="docker", results=[]
id="ggshield-non-existant", type="docker", results=[]
)
result = cli_fs_runner.invoke(
cli,
["-v", "scan", "docker", "gg-shield-non-existant"],
["-v", "scan", "docker", "ggshield-non-existant"],
)
assert result.output == ""
assert result.exit_code == 0
Expand All @@ -127,11 +127,11 @@ def test_docker_scan_failed_to_save(
'Image "ggshield-non-existant" not found'
)
scan_mock.return_value = ScanCollection(
id="gg-shield-non-existant", type="docker", results=[]
id="ggshield-non-existant", type="docker", results=[]
)
result = cli_fs_runner.invoke(
cli,
["-v", "scan", "docker", "gg-shield-non-existant"],
["-v", "scan", "docker", "ggshield-non-existant"],
)
assert 'Error: Image "ggshield-non-existant" not found\n' in result.output
assert result.exit_code == 1
Expand Down

0 comments on commit 1f63dec

Please sign in to comment.