From b613ec0b073903a58932ff1b127837eaad4432da Mon Sep 17 00:00:00 2001 From: houdini91 Date: Thu, 25 Sep 2025 10:18:43 +0300 Subject: [PATCH] move to ghcr --- .../standalone-deployment/signVerify.md | 2 +- docs/guides/enforcing-sdlc-initiative.md | 2 +- .../ci-integrations/general.md | 2 +- .../ci-integrations/gitlabci.md | 16 +++++----- .../ci-integrations/jenkins.md | 28 ++++++++-------- .../ci-integrations/travis.md | 12 +++---- .../vulnerability-scanners.md | 2 +- .../vulnerability-scanners.md.bak | 2 +- docs/platforms/github-integration.md | 6 ++-- docs/platforms/hooks.md | 2 +- docs/platforms/jenkins-integration.md | 32 +++++++++---------- docs/platforms/usage.md | 2 +- docs/valint/getting-started-valint.md | 9 ++++-- 13 files changed, 61 insertions(+), 56 deletions(-) diff --git a/docs/advanced-guide/standalone-deployment/signVerify.md b/docs/advanced-guide/standalone-deployment/signVerify.md index 79ff25ec6..485274596 100644 --- a/docs/advanced-guide/standalone-deployment/signVerify.md +++ b/docs/advanced-guide/standalone-deployment/signVerify.md @@ -27,7 +27,7 @@ Following table includes the supported format. 1. Using a Shell-based CLI, download the `valint` CLI tool, created by Scribe: ```sh - curl -sSfL https://get.scribesecurity.com/install.sh | sh -s -- -t valint + curl -sSfL https://raw.githubusercontent.com/scribe-security/misc/master/gh_install.sh | sh -s -- -t valint ``` 2. Run the `valint bom [target] -o [format]` command on one of the available. `format` options: See supported formats table. diff --git a/docs/guides/enforcing-sdlc-initiative.md b/docs/guides/enforcing-sdlc-initiative.md index fa0cbefd2..f73db9ab7 100644 --- a/docs/guides/enforcing-sdlc-initiative.md +++ b/docs/guides/enforcing-sdlc-initiative.md @@ -22,7 +22,7 @@ For a detailed initiative description, see the **[initiatives](../valint/initiat 1. Install `valint`: ```bash - curl -sSfL https://get.scribesecurity.com/install.sh | sh -s -- -t valint + curl -sSfL https://raw.githubusercontent.com/scribe-security/misc/master/gh_install.sh | sh -s -- -t valint ``` 2. Create an SBOM of the type you want to verify. For a Docker image, the command would be: diff --git a/docs/integrating-scribe/ci-integrations/general.md b/docs/integrating-scribe/ci-integrations/general.md index 88ec53af7..7ec0b2d10 100644 --- a/docs/integrating-scribe/ci-integrations/general.md +++ b/docs/integrating-scribe/ci-integrations/general.md @@ -29,7 +29,7 @@ Replace '\' with the token you obtained in the previous step. **Valint** -Scribe CLI- is required to generate evidence in such as SBOMs and SLSA provenance. ``` -curl -sSfL https://get.scribesecurity.com/install.sh | sh -s -- -t valint +curl -sSfL https://raw.githubusercontent.com/scribe-security/misc/master/gh_install.sh | sh -s -- -t valint ``` ### 4. Instrument your build scripts diff --git a/docs/integrating-scribe/ci-integrations/gitlabci.md b/docs/integrating-scribe/ci-integrations/gitlabci.md index e2ef88043..0098a0da8 100644 --- a/docs/integrating-scribe/ci-integrations/gitlabci.md +++ b/docs/integrating-scribe/ci-integrations/gitlabci.md @@ -23,14 +23,14 @@ Set your Scribe Hub API token in GitLab with a key named SCRIBE_TOKEN as instruc **Valint** (Scribe CLI) is required to generate evidence in such as SBOMs and SLSA provenance. Install Valint on your build runner with the following command: ``` -sh 'curl -sSfL https://get.scribesecurity.com/install.sh | sh -s -- -b ./temp/bin' +sh 'curl -sSfL https://raw.githubusercontent.com/scribe-security/misc/master/gh_install.sh | sh -s -- -b ./temp/bin' ``` Alternatively, add an instalation stage at the beginning of your relevant builds as follows: ```yaml before_script: - apt update - apt install git curl -y - - curl -sSfL https://get.scribesecurity.com/install.sh | sh -s -- -b /usr/local/bin + - curl -sSfL https://raw.githubusercontent.com/scribe-security/misc/master/gh_install.sh | sh -s -- -b /usr/local/bin ``` ### 4. Instrument your build scripts @@ -41,7 +41,7 @@ image: ubuntu:latest before_script: - apt update - apt install git curl -y - - curl -sSfL https://get.scribesecurity.com/install.sh | sh -s -- -b /usr/local/bin + - curl -sSfL https://raw.githubusercontent.com/scribe-security/misc/master/gh_install.sh | sh -s -- -b /usr/local/bin stages: - scribe-gitlab-stage @@ -72,7 +72,7 @@ image: ubuntu:latest before_script: - apt update - apt install -y git curl - - curl -sSfL https://get.scribesecurity.com/install.sh | sh -s -- -b /usr/local/bin + - curl -sSfL https://raw.githubusercontent.com/scribe-security/misc/master/gh_install.sh | sh -s -- -b /usr/local/bin - curl -sfL https://raw.githubusercontent.com/aquasecurity/trivy/main/contrib/install.sh | sh -s -- -b /usr/local/bin stages: @@ -137,7 +137,7 @@ Lastly Use the masked environment variables with Valint by decoding them: before_script: - apt update - apt install git curl -y - - curl -sSfL https://get.scribesecurity.com/install.sh | sh -s -- -b /usr/local/bin + - curl -sSfL https://raw.githubusercontent.com/scribe-security/misc/master/gh_install.sh | sh -s -- -b /usr/local/bin stages: - scribe-gitlab-job @@ -326,7 +326,7 @@ save-artifact-job: before_script: - apk update - apk add curl - - curl -sSfL https://get.scribesecurity.com/install.sh | sh -s -- -b /usr/local/bin + - curl -sSfL https://raw.githubusercontent.com/scribe-security/misc/master/gh_install.sh | sh -s -- -b /usr/local/bin valint-docker-job: tags: [ saas-linux-large-amd64 ] @@ -356,7 +356,7 @@ valint-docker-job: before_script: - apk update - apk add curl - - curl -sSfL https://get.scribesecurity.com/install.sh | sh -s -- -b /usr/local/bin + - curl -sSfL https://raw.githubusercontent.com/scribe-security/misc/master/gh_install.sh | sh -s -- -b /usr/local/bin valint-docker-job: tags: [ saas-linux-large-amd64 ] @@ -490,7 +490,7 @@ services: before_script: - apt update - apt install git curl -y - - curl -sSfL https://get.scribesecurity.com/install.sh | sh -s -- -b /usr/local/bin + - curl -sSfL https://raw.githubusercontent.com/scribe-security/misc/master/gh_install.sh | sh -s -- -b /usr/local/bin - echo "$DOCKER_PASSWORD" | docker login -u "$DOCKER_USERNAME" --password-stdin [my_registry] stages: diff --git a/docs/integrating-scribe/ci-integrations/jenkins.md b/docs/integrating-scribe/ci-integrations/jenkins.md index 93c40cdd4..6cfce0e17 100644 --- a/docs/integrating-scribe/ci-integrations/jenkins.md +++ b/docs/integrating-scribe/ci-integrations/jenkins.md @@ -39,14 +39,14 @@ The token is a secret and will not be accessible from the UI after you finalize **Valint** - Scribe CLI is required to generate evidence such as SBOMs and SLSA provenance. Install Valint on your build runner with the following command: ```bash -sh 'curl -sSfL https://get.scribesecurity.com/install.sh | sh -s -- -b ./temp/bin' +sh 'curl -sSfL https://raw.githubusercontent.com/scribe-security/misc/master/gh_install.sh | sh -s -- -b ./temp/bin' ``` Alternatively, add an installation stage at the beginning of your relevant builds as follows: ```javascript stage('install-valint') { steps { - sh 'curl -sSfL https://get.scribesecurity.com/install.sh | sh -s -- -b ./temp/bin' + sh 'curl -sSfL https://raw.githubusercontent.com/scribe-security/misc/master/gh_install.sh | sh -s -- -b ./temp/bin' } } ``` @@ -68,7 +68,7 @@ pipeline { stages { stage('install-valint') { steps { - sh 'curl -sSfL https://get.scribesecurity.com/install.sh | sh -s -- -b ./temp/bin' + sh 'curl -sSfL https://raw.githubusercontent.com/scribe-security/misc/master/gh_install.sh | sh -s -- -b ./temp/bin' } } @@ -95,7 +95,7 @@ node { "PATH=./temp/bin:$PATH" ]) { stage('install') { - sh 'curl -sSfL https://get.scribesecurity.com/install.sh | sh -s -- -b ./temp/bin' + sh 'curl -sSfL https://raw.githubusercontent.com/scribe-security/misc/master/gh_install.sh | sh -s -- -b ./temp/bin' } stage('bom') { @@ -143,7 +143,7 @@ Following are more examples of integration of Valint with Jenkins deployed in di stage('dir-bom') { agent { docker { - image 'scribesecurity/valint:latest' + image 'ghcr.io/scribe-security/valint:latest' reuseNode true args "--entrypoint=" } @@ -162,7 +162,7 @@ Following are more examples of integration of Valint with Jenkins deployed in di stage('image-bom') { agent { docker { - image 'scribesecurity/valint:latest' + image 'ghcr.io/scribe-security/valint:latest' reuseNode true args "--entrypoint=" } @@ -192,7 +192,7 @@ Following are more examples of integration of Valint with Jenkins deployed in di stage('slsa-provenance') { agent { docker { - image 'scribesecurity/valint:latest' + image 'ghcr.io/scribe-security/valint:latest' reuseNode true args "--entrypoint=" } @@ -210,7 +210,7 @@ Following are more examples of integration of Valint with Jenkins deployed in di stage('verify') { agent { docker { - image 'scribesecurity/valint:latest' + image 'ghcr.io/scribe-security/valint:latest' reuseNode true args "--entrypoint=" } @@ -298,7 +298,7 @@ spec: - name: CONTAINER_ENV_VAR value: jnlp - name: valint - image: scribesecurity/valint:latest + image: ghcr.io/scribe-security/valint:latest command: - cat tty: true @@ -363,7 +363,7 @@ spec: - name: CONTAINER_ENV_VAR value: jnlp - name: valint - image: scribesecurity/valint:latest + image: ghcr.io/scribe-security/valint:latest command: - cat tty: true @@ -510,7 +510,7 @@ pipeline { stages { stage('install') { steps { - sh 'curl -sSfL https://get.scribesecurity.com/install.sh | sh -s -- -b ./temp/bin' + sh 'curl -sSfL https://raw.githubusercontent.com/scribe-security/misc/master/gh_install.sh | sh -s -- -b ./temp/bin' } } stage('bom') { @@ -550,7 +550,7 @@ node { "PATH=./temp/bin:$PATH" ]) { stage('install') { - sh 'curl -sSfL https://get.scribesecurity.com/install.sh | sh -s -- -b ./temp/bin -D' + sh 'curl -sSfL https://raw.githubusercontent.com/scribe-security/misc/master/gh_install.sh | sh -s -- -b ./temp/bin -D' } stage('bom') { sh ''' @@ -697,7 +697,7 @@ pipeline { stages { stage('install') { steps { - sh 'curl -sSfL https://get.scribesecurity.com/install.sh | sh -s -- -b ./temp/bin' + sh 'curl -sSfL https://raw.githubusercontent.com/scribe-security/misc/master/gh_install.sh | sh -s -- -b ./temp/bin' } } stage('bom') { @@ -735,7 +735,7 @@ node { "PATH=./temp/bin:$PATH" ]) { stage('install') { - sh 'curl -sSfL https://get.scribesecurity.com/install.sh | sh -s -- -b ./temp/bin -D' + sh 'curl -sSfL https://raw.githubusercontent.com/scribe-security/misc/master/gh_install.sh | sh -s -- -b ./temp/bin -D' } stage('bom') { sh ''' diff --git a/docs/integrating-scribe/ci-integrations/travis.md b/docs/integrating-scribe/ci-integrations/travis.md index 3b98846bb..a50a4e245 100644 --- a/docs/integrating-scribe/ci-integrations/travis.md +++ b/docs/integrating-scribe/ci-integrations/travis.md @@ -21,14 +21,14 @@ Add the Scribe Hub API token as SCRIBE_TOKEN to your environment by following th **Valint** (Scribe CLI) is required to generate evidence in such as SBOMs and SLSA provenance. Install Valint on your build runner with the following command ``` -sh 'curl -sSfL https://get.scribesecurity.com/install.sh | sh -s -- -b ./temp/bin' +sh 'curl -sSfL https://raw.githubusercontent.com/scribe-security/misc/master/gh_install.sh | sh -s -- -b ./temp/bin' ``` Alternatively, add an instalation stage at the beginning of your relevant builds as follows: ```yaml install: - mkdir ./bin - - curl -sSfL https://get.scribesecurity.com/install.sh| sh -s -- -b $PWD/bin + - curl -sSfL https://raw.githubusercontent.com/scribe-security/misc/master/gh_install.sh| sh -s -- -b $PWD/bin - export PATH=$PATH:$PWD/bin/ ``` ### 4. Instrument your build scripts @@ -37,7 +37,7 @@ install: ```yaml install: - mkdir ./bin - - curl -sSfL https://get.scribesecurity.com/install.sh| sh -s -- -b $PWD/bin + - curl -sSfL https://raw.githubusercontent.com/scribe-security/misc/master/gh_install.sh| sh -s -- -b $PWD/bin - export PATH=$PATH:$PWD/bin/ @@ -72,7 +72,7 @@ jobs: depth: false install: - mkdir ./bin - - curl -sSfL https://get.scribesecurity.com/install.sh| sh -s -- -b $PWD/bin + - curl -sSfL https://raw.githubusercontent.com/scribe-security/misc/master/gh_install.sh| sh -s -- -b $PWD/bin - export PATH=$PATH:$PWD/bin/ env: test_env=test_env_value script: @@ -209,7 +209,7 @@ For more details see **[Artifact documentation](https://docs.travis-ci.com/user/ install: - mkdir ./bin - - curl -sSfL https://get.scribesecurity.com/install.sh| sh -s -- -b $PWD/bin + - curl -sSfL https://raw.githubusercontent.com/scribe-security/misc/master/gh_install.sh| sh -s -- -b $PWD/bin - export PATH=$PATH:$PWD/bin/ script: @@ -249,7 +249,7 @@ For more details see [Artifact documentation](https://docs.travis-ci.com/user/up install: - mkdir ./bin - - curl -sSfL https://get.scribesecurity.com/install.sh| sh -s -- -b $PWD/bin + - curl -sSfL https://raw.githubusercontent.com/scribe-security/misc/master/gh_install.sh| sh -s -- -b $PWD/bin - export PATH=$PATH:$PWD/bin/ script: diff --git a/docs/integrating-scribe/vulnerability-scanners.md b/docs/integrating-scribe/vulnerability-scanners.md index 29003d425..e74321c97 100644 --- a/docs/integrating-scribe/vulnerability-scanners.md +++ b/docs/integrating-scribe/vulnerability-scanners.md @@ -168,7 +168,7 @@ Use our CLI tool to upload your report for analysis and cataloging. Get the `valint` tool ```bash -curl -sSfL https://get.scribesecurity.com/install.sh | sh -s -- -t valint +curl -sSfL https://raw.githubusercontent.com/scribe-security/misc/master/gh_install.sh | sh -s -- -t valint ``` diff --git a/docs/integrating-scribe/vulnerability-scanners.md.bak b/docs/integrating-scribe/vulnerability-scanners.md.bak index 42d5852f3..c4ecf0d5c 100644 --- a/docs/integrating-scribe/vulnerability-scanners.md.bak +++ b/docs/integrating-scribe/vulnerability-scanners.md.bak @@ -168,7 +168,7 @@ Use our CLI tool to upload your report for analysis and cataloging. Get the `valint` tool ```bash -curl -sSfL https://get.scribesecurity.com/install.sh | sh -s -- -t valint +curl -sSfL https://raw.githubusercontent.com/scribe-security/misc/master/gh_install.sh | sh -s -- -t valint ``` diff --git a/docs/platforms/github-integration.md b/docs/platforms/github-integration.md index a7af8ae92..a62107500 100644 --- a/docs/platforms/github-integration.md +++ b/docs/platforms/github-integration.md @@ -568,7 +568,7 @@ jobs: discovery-ecr: stage: discovery image: - name: scribesecurity/platforms:${PLATFORMS_VERSION} + name: ghcr.io/scribe-security/platforms:${PLATFORMS_VERSION} entrypoint: [""] pull_policy: always cache: @@ -606,7 +606,7 @@ jobs: needs: ["discovery-ecr"] timeout: 5 hours image: - name: scribesecurity/platforms:${PLATFORMS_VERSION} + name: ghcr.io/scribe-security/platforms:${PLATFORMS_VERSION} entrypoint: [""] pull_policy: always services: @@ -649,7 +649,7 @@ jobs: needs: ["bom-sign-ecr"] # "policy-gitlab" hack to win some time for the backend to process the SBOMs timeout: 5 hours image: - name: scribesecurity/platforms:${PLATFORMS_VERSION} + name: ghcr.io/scribe-security/platforms:${PLATFORMS_VERSION} entrypoint: [""] pull_policy: always services: diff --git a/docs/platforms/hooks.md b/docs/platforms/hooks.md index 4e6206336..827d2c5a7 100644 --- a/docs/platforms/hooks.md +++ b/docs/platforms/hooks.md @@ -701,7 +701,7 @@ run: |- Example: ```bash -docker run -it scribesecurity/platforms:latest discover github --hook trivy_iac_and_secrets_remote +docker run -it ghcr.io/scribe-security/platforms:latest discover github --hook trivy_iac_and_secrets_remote ``` ## Evidence from Hooks diff --git a/docs/platforms/jenkins-integration.md b/docs/platforms/jenkins-integration.md index d347fd8a0..dc7d85f52 100644 --- a/docs/platforms/jenkins-integration.md +++ b/docs/platforms/jenkins-integration.md @@ -86,7 +86,7 @@ pipeline { stage('jfrog-discovery') { agent { docker { - image 'scribesecurity/platforms:dev-latest' + image 'ghcr.io/scribe-security/platforms:dev-latest' args '-e DOCKER_CONFIG=$PLATFORM_DOCKER_CONFIG --entrypoint="" -v /var/run/docker.sock:/var/run/docker.sock:rw -v $HOME/.docker/config.json:/$WORKSPACE/.docker/config.json:rw --group-add ${DOCKER_GID}' reuseNode true } @@ -104,7 +104,7 @@ pipeline { stage('jfrog-bom') { agent { docker { - image 'scribesecurity/platforms:dev-latest' + image 'ghcr.io/scribe-security/platforms:dev-latest' args ' -e DOCKER_CONFIG=$PLATFORM_DOCKER_CONFIG --entrypoint="" -v /var/run/docker.sock:/var/run/docker.sock:rw -v $HOME/.docker/config.json:/$WORKSPACE/.docker/config.json:rw --group-add ${DOCKER_GID}' reuseNode true } @@ -120,7 +120,7 @@ pipeline { stage('jfrog-policy') { agent { docker { - image 'scribesecurity/platforms:dev-latest' + image 'ghcr.io/scribe-security/platforms:dev-latest' args '-e DOCKER_CONFIG=$PLATFORM_DOCKER_CONFIG --entrypoint="" -v /var/run/docker.sock:/var/run/docker.sock:rw -v $HOME/.docker/config.json:/$WORKSPACE/.docker/config.json:rw --group-add ${DOCKER_GID}' reuseNode true } @@ -177,7 +177,7 @@ def dockerRunPlatforms = { args -> -v $WORKSPACE@tmp:$WORKSPACE@tmp:rw,z \ -w $WORKSPACE \ --group-add ${DOCKER_GID} \ - scribesecurity/platforms:dev-latest ${args} + ghcr.io/scribe-security/platforms:dev-latest ${args} """ } @@ -276,7 +276,7 @@ pipeline { stage('github-discovery') { agent { docker { - image 'scribesecurity/platforms:dev-latest' + image 'ghcr.io/scribe-security/platforms:dev-latest' args '-e DOCKER_CONFIG=$PLATFORM_DOCKER_CONFIG --entrypoint="" -v /var/run/docker.sock:/var/run/docker.sock:rw -v $HOME/.docker/config.json:/$WORKSPACE/.docker/config.json:rw --group-add ${DOCKER_GID}' reuseNode true } @@ -297,7 +297,7 @@ pipeline { stage('github-bom') { agent { docker { - image 'scribesecurity/platforms:dev-latest' + image 'ghcr.io/scribe-security/platforms:dev-latest' args ' -e DOCKER_CONFIG=$PLATFORM_DOCKER_CONFIG --entrypoint="" -v /var/run/docker.sock:/var/run/docker.sock:rw -v $HOME/.docker/config.json:/$WORKSPACE/.docker/config.json:rw --group-add ${DOCKER_GID}' reuseNode true } @@ -313,7 +313,7 @@ pipeline { stage('github-policy') { agent { docker { - image 'scribesecurity/platforms:dev-latest' + image 'ghcr.io/scribe-security/platforms:dev-latest' args '-e DOCKER_CONFIG=$PLATFORM_DOCKER_CONFIG --entrypoint="" -v /var/run/docker.sock:/var/run/docker.sock:rw -v $HOME/.docker/config.json:/$WORKSPACE/.docker/config.json:rw --group-add ${DOCKER_GID}' reuseNode true } @@ -366,7 +366,7 @@ pipeline { stage('k8s-discovery') { agent { docker { - image 'scribesecurity/platforms:dev-latest' + image 'ghcr.io/scribe-security/platforms:dev-latest' args '-e DOCKER_CONFIG=$PLATFORM_DOCKER_CONFIG --entrypoint="" -v /var/run/docker.sock:/var/run/docker.sock:rw -v $HOME/.docker/config.json:/$WORKSPACE/.docker/config.json:rw --group-add ${DOCKER_GID}' reuseNode true } @@ -384,7 +384,7 @@ pipeline { stage('k8s-bom') { agent { docker { - image 'scribesecurity/platforms:dev-latest' + image 'ghcr.io/scribe-security/platforms:dev-latest' args ' -e DOCKER_CONFIG=$PLATFORM_DOCKER_CONFIG --entrypoint="" -v /var/run/docker.sock:/var/run/docker.sock:rw -v $HOME/.docker/config.json:/$WORKSPACE/.docker/config.json:rw --group-add ${DOCKER_GID}' reuseNode true } @@ -401,7 +401,7 @@ pipeline { stage('k8s-policy') { agent { docker { - image 'scribesecurity/platforms:dev-latest' + image 'ghcr.io/scribe-security/platforms:dev-latest' args '-e DOCKER_CONFIG=$PLATFORM_DOCKER_CONFIG --entrypoint="" -v /var/run/docker.sock:/var/run/docker.sock:rw -v $HOME/.docker/config.json:/$WORKSPACE/.docker/config.json:rw --group-add ${DOCKER_GID}' reuseNode true } @@ -458,7 +458,7 @@ pipeline { stage('dockerhub-discovery') { agent { docker { - image 'scribesecurity/platforms:dev-latest' + image 'ghcr.io/scribe-security/platforms:dev-latest' args '-e DOCKER_CONFIG=$PLATFORM_DOCKER_CONFIG --entrypoint="" -v /var/run/docker.sock:/var/run/docker.sock:rw -v $HOME/.docker/config.json:/$WORKSPACE/.docker/config.json:rw --group-add ${DOCKER_GID}' reuseNode true } @@ -480,7 +480,7 @@ pipeline { stage('dockerhub-bom') { agent { docker { - image 'scribesecurity/platforms:dev-latest' + image 'ghcr.io/scribe-security/platforms:dev-latest' args ' -e DOCKER_CONFIG=$PLATFORM_DOCKER_CONFIG --entrypoint="" -v /var/run/docker.sock:/var/run/docker.sock:rw -v $HOME/.docker/config.json:/$WORKSPACE/.docker/config.json:rw --group-add ${DOCKER_GID}' reuseNode true } @@ -497,7 +497,7 @@ pipeline { stage('dockerhub-policy') { agent { docker { - image 'scribesecurity/platforms:dev-latest' + image 'ghcr.io/scribe-security/platforms:dev-latest' args '-e DOCKER_CONFIG=$PLATFORM_DOCKER_CONFIG --entrypoint="" -v /var/run/docker.sock:/var/run/docker.sock:rw -v $HOME/.docker/config.json:/$WORKSPACE/.docker/config.json:rw --group-add ${DOCKER_GID}' reuseNode true } @@ -550,7 +550,7 @@ pipeline { stage('gitlab-discovery') { agent { docker { - image 'scribesecurity/platforms:dev-latest' + image 'ghcr.io/scribe-security/platforms:dev-latest' args '-e DOCKER_CONFIG=$PLATFORM_DOCKER_CONFIG --entrypoint="" -v /var/run/docker.sock:/var/run/docker.sock:rw -v $HOME/.docker/config.json:/$WORKSPACE/.docker/config.json:rw --group-add ${DOCKER_GID}' reuseNode true } @@ -576,7 +576,7 @@ pipeline { stage('gitlab-bom') { agent { docker { - image 'scribesecurity/platforms:dev-latest' + image 'ghcr.io/scribe-security/platforms:dev-latest' args ' -e DOCKER_CONFIG=$PLATFORM_DOCKER_CONFIG --entrypoint="" -v /var/run/docker.sock:/var/run/docker.sock:rw -v $HOME/.docker/config.json:/$WORKSPACE/.docker/config.json:rw --group-add ${DOCKER_GID}' reuseNode true } @@ -596,7 +596,7 @@ pipeline { stage('gitlab-policy') { agent { docker { - image 'scribesecurity/platforms:dev-latest' + image 'ghcr.io/scribe-security/platforms:dev-latest' args '-e DOCKER_CONFIG=$PLATFORM_DOCKER_CONFIG --entrypoint="" -v /var/run/docker.sock:/var/run/docker.sock:rw -v $HOME/.docker/config.json:/$WORKSPACE/.docker/config.json:rw --group-add ${DOCKER_GID}' reuseNode true } diff --git a/docs/platforms/usage.md b/docs/platforms/usage.md index 78a9ad6ab..566be0be3 100644 --- a/docs/platforms/usage.md +++ b/docs/platforms/usage.md @@ -15,7 +15,7 @@ Pull the `platforms` release binary wrapped in its relevant docker image.
Tag value should be the requested version. ```bash -docker pull scribesecurity/platforms:latest +docker pull ghcr.io/scribe-security/platforms:latest ``` diff --git a/docs/valint/getting-started-valint.md b/docs/valint/getting-started-valint.md index 32f290164..fcad38edc 100644 --- a/docs/valint/getting-started-valint.md +++ b/docs/valint/getting-started-valint.md @@ -22,8 +22,10 @@ Choose any of the following command line interface (CLI) installation options: Get the `valint` tool ```bash -curl -sSfL https://get.scribesecurity.com/install.sh | sh -s -- -t valint +curl -sSfL https://raw.githubusercontent.com/scribe-security/misc/master/gh_install.sh | sh -s -- -t valint ``` +> If you hit GitHub API rate limits, set GITHUB_TOKEN. +> We've deprecated the old installer (curl -sSfL https://get.scribesecurity.com/install.sh) in favor of the command above. @@ -34,8 +36,11 @@ Pull the `valint` release binary wrapped in its relevant docker image.
Tag value should be the requested version. ```bash -docker pull scribesecurity/valint:latest +docker pull ghcr.io/scribe-security/valint:latest ``` + +> The old image `scribesecurity/valint:latest` is deprecated—use the GHCR image above. + ### Using Valint to generate and sign an SBOM