Skip to content

Commit 58782e1

Browse files
author
Florian Perucki
committed
chore: remove SCA & IaC
1 parent 28f5153 commit 58782e1

File tree

187 files changed

+24
-17711
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

187 files changed

+24
-17711
lines changed

.gitguardian.example.yml

-41
Original file line numberDiff line numberDiff line change
@@ -36,44 +36,3 @@ secret:
3636
# Detectors to ignore.
3737
ignored_detectors: # default: []
3838
- Generic Password
39-
40-
iac:
41-
# Exclude files and paths by globbing
42-
ignored_paths:
43-
- '**/README.md'
44-
- 'doc/*'
45-
- 'LICENSE'
46-
- path: 'tests/*'
47-
comment: 'Ignore vulnerabilities in tests'
48-
- path: 'dev/*'
49-
comment: 'Ignore vulnerabilities in dev sandbox'
50-
until: '2030-06-24T00:00:01Z'
51-
52-
# IaC vulnerabilities to ignore
53-
ignored_policies:
54-
- GG_IAC_0000
55-
- GG_IAC_0005
56-
- policy: 'GG_IAC_0003'
57-
until: '2030-06-24T00:00:01Z'
58-
- policy: 'GG_IAC_0012'
59-
comment: 'We will handle this later'
60-
until: '2030-06-24T00:00:01Z'
61-
62-
# Minimum severity of the policies
63-
minimum_severity: HIGH
64-
65-
sca:
66-
# Exclude files and paths by globbing
67-
ignored_paths:
68-
- '**/Pipfile'
69-
- '/back/**/package.json'
70-
71-
# SCA vulnerabilities to ignore
72-
ignored_vulnerabilities:
73-
- identifier: 'GHSA-0000-aaaa-ZZZZ'
74-
path: 'Pipfile.lock' # Can be a regex
75-
comment: 'Check vulnerability later' # Optional
76-
until: '2023-05-01T00:00:00' # Optional, needs to follow ISO 8061 format 'YYYY-MM-DDTHH:MM:SS' (converted to UTC)
77-
78-
# Minimum severity of the policies
79-
minimum_severity: HIGH

.gitguardian.yaml

-11
Original file line numberDiff line numberDiff line change
@@ -34,14 +34,3 @@ secret:
3434
- .env
3535
- 'tests/unit/cassettes/*'
3636
- 'tests/unit/**/snapshots/*'
37-
38-
iac:
39-
ignored_policies:
40-
# We don't want to fix this vulnerability because many CI systems
41-
# (including GitHub action and Azure pipelines) expect the user inside the
42-
# container to be root.
43-
- GG_IAC_0079
44-
45-
sca:
46-
ignored_paths:
47-
- tests/

.github/workflows/ci.yml

-40
Original file line numberDiff line numberDiff line change
@@ -164,51 +164,13 @@ jobs:
164164
GITGUARDIAN_API_KEY: ${{ secrets.GITGUARDIAN_API_KEY }}
165165
GITGUARDIAN_API_URL: ${{ secrets.GITGUARDIAN_API_URL }}
166166

167-
test_github_iac_scan_action:
168-
name: Test GitHub action for `iac scan`
169-
# See note about steps requiring the GITGUARDIAN_API at the top of this file
170-
if: ${{ !github.event.pull_request.head.repo.fork }}
171-
runs-on: ubuntu-22.04
172-
steps:
173-
- name: Checkout
174-
uses: actions/checkout@v4
175-
with:
176-
fetch-depth: 0
177-
- name: Scan commits for IaC vulnerabilities
178-
uses: ./actions-unstable/iac
179-
with:
180-
args: .
181-
env:
182-
GITGUARDIAN_API_KEY: ${{ secrets.GITGUARDIAN_API_KEY }}
183-
GITGUARDIAN_API_URL: ${{ secrets.GITGUARDIAN_API_URL }}
184-
185-
test_github_sca_scan_action:
186-
name: Test GitHub action for `sca scan`
187-
# See note about steps requiring the GITGUARDIAN_API at the top of this file
188-
if: ${{ !github.event.pull_request.head.repo.fork }}
189-
runs-on: ubuntu-22.04
190-
steps:
191-
- name: Checkout
192-
uses: actions/checkout@v4
193-
with:
194-
fetch-depth: 0
195-
- name: Scan commits for SCA vulnerabilities
196-
uses: ./actions-unstable/sca
197-
with:
198-
args: .
199-
env:
200-
GITGUARDIAN_API_KEY: ${{ secrets.GITGUARDIAN_API_KEY }}
201-
GITGUARDIAN_API_URL: ${{ secrets.GITGUARDIAN_API_URL }}
202-
203167
dockerhub-unstable:
204168
name: Push Docker image to Docker Hub
205169
runs-on: ubuntu-22.04
206170
if: github.ref == 'refs/heads/main' && github.event_name == 'push'
207171
needs:
208172
- lint
209173
- build
210-
- test_github_iac_scan_action
211-
- test_github_sca_scan_action
212174
- test_github_secret_scan_action
213175
steps:
214176
- name: Checkout
@@ -228,8 +190,6 @@ jobs:
228190
needs:
229191
- lint
230192
- build
231-
- test_github_iac_scan_action
232-
- test_github_sca_scan_action
233193
- test_github_secret_scan_action
234194
steps:
235195
- name: Check out the repo

.importlinter

+2-10
Original file line numberDiff line numberDiff line change
@@ -9,8 +9,8 @@ name = ggshield-layers
99
type = layers
1010
layers =
1111
ggshield.__main__
12-
ggshield.cmd.auth | ggshield.cmd.config | ggshield.cmd.hmsl | ggshield.cmd.honeytoken | ggshield.cmd.iac | ggshield.cmd.install | ggshield.cmd.quota | ggshield.cmd.sca | ggshield.cmd.secret | ggshield.cmd.status | ggshield.cmd.utils
13-
ggshield.verticals.auth | ggshield.verticals.hmsl | ggshield.verticals.iac | ggshield.verticals.sca | ggshield.verticals.secret
12+
ggshield.cmd.auth | ggshield.cmd.config | ggshield.cmd.hmsl | ggshield.cmd.honeytoken | ggshield.cmd.install | ggshield.cmd.quota | ggshield.cmd.secret | ggshield.cmd.status | ggshield.cmd.utils
13+
ggshield.verticals.auth | ggshield.verticals.hmsl | ggshield.verticals.secret
1414
ggshield.core
1515
click | ggshield.utils | pygitguardian
1616
ignore_imports =
@@ -26,18 +26,14 @@ source_modules =
2626
ggshield.cmd.config
2727
ggshield.cmd.hmsl
2828
ggshield.cmd.honeytoken
29-
ggshield.cmd.iac
3029
ggshield.cmd.install
3130
ggshield.cmd.quota
32-
ggshield.cmd.sca
3331
ggshield.cmd.secret
3432
ggshield.cmd.status
3533
ggshield.cmd.utils
3634
forbidden_modules =
3735
ggshield.verticals.auth
3836
ggshield.verticals.hmsl
39-
ggshield.verticals.iac
40-
ggshield.verticals.sca
4137
ggshield.verticals.secret
4238
ignore_imports =
4339
ggshield.cmd.auth.** -> ggshield.verticals.auth
@@ -49,14 +45,10 @@ ignore_imports =
4945
ggshield.cmd.hmsl.** -> ggshield.verticals.hmsl.**
5046
ggshield.cmd.honeytoken.** -> ggshield.verticals.honeytoken
5147
ggshield.cmd.honeytoken.** -> ggshield.verticals.honeytoken.**
52-
ggshield.cmd.iac.** -> ggshield.verticals.iac
53-
ggshield.cmd.iac.** -> ggshield.verticals.iac.**
5448
ggshield.cmd.install.** -> ggshield.verticals.install
5549
ggshield.cmd.install.** -> ggshield.verticals.install.**
5650
ggshield.cmd.quota.** -> ggshield.verticals.quota
5751
ggshield.cmd.quota.** -> ggshield.verticals.quota.**
58-
ggshield.cmd.sca.** -> ggshield.verticals.sca
59-
ggshield.cmd.sca.** -> ggshield.verticals.sca.**
6052
ggshield.cmd.secret.** -> ggshield.verticals.secret
6153
ggshield.cmd.secret.** -> ggshield.verticals.secret.**
6254
ggshield.cmd.status.** -> ggshield.verticals.status

.pre-commit-hooks.yaml

-40
Original file line numberDiff line numberDiff line change
@@ -9,26 +9,6 @@
99
pass_filenames: false
1010
minimum_pre_commit_version: 3.2.0
1111

12-
- id: ggshield-iac
13-
name: ggshield-iac (pre-commit)
14-
entry: ggshield
15-
description: Runs ggshield Infra as Code Security to detect IaC vulnerabilities.
16-
stages: [pre-commit]
17-
args: ['iac', 'scan', 'pre-commit']
18-
language: python
19-
pass_filenames: false
20-
minimum_pre_commit_version: 3.2.0
21-
22-
- id: ggshield-sca
23-
name: ggshield-sca (pre-commit)
24-
entry: ggshield
25-
description: Runs ggshield Software Composition Analysis to detect vulnerabilities introduced by dependencies.
26-
stages: [pre-commit]
27-
args: ['sca', 'scan', 'pre-commit']
28-
language: python
29-
pass_filenames: false
30-
minimum_pre_commit_version: 3.2.0
31-
3212
- id: docker-ggshield
3313
name: ggshield (pre-commit,docker)
3414
language: docker_image
@@ -46,26 +26,6 @@
4626
pass_filenames: false
4727
minimum_pre_commit_version: 3.2.0
4828

49-
- id: ggshield-iac-push
50-
name: ggshield-iac (pre-push)
51-
entry: ggshield
52-
description: Runs ggshield Infra as Code Security to detect IaC vulnerabilities.
53-
args: ['iac', 'scan', 'pre-push']
54-
stages: [pre-push]
55-
language: python
56-
pass_filenames: false
57-
minimum_pre_commit_version: 3.2.0
58-
59-
- id: ggshield-sca-push
60-
name: ggshield-sca (pre-push)
61-
entry: ggshield
62-
description: Runs ggshield Software Composition Analysis to detect vulnerabilities introduced by dependencies.
63-
args: ['sca', 'scan', 'pre-push']
64-
stages: [pre-push]
65-
language: python
66-
pass_filenames: false
67-
minimum_pre_commit_version: 3.2.0
68-
6929
- id: docker-ggshield-push
7030
name: ggshield (pre-push,docker)
7131
language: docker_image

README.md

-17
Original file line numberDiff line numberDiff line change
@@ -39,7 +39,6 @@ Only metadata such as call time, request size and scan mode is stored from scans
3939
- [Manual setup](#manual-setup)
4040
- [Getting started](#getting-started)
4141
- [Secrets](#secrets)
42-
- [Infra as Code Security (IaC)](#infra-as-code-security-iac)
4342
- [Integrations](#integrations)
4443
- [Learn more](#learn-more)
4544
- [Output](#output)
@@ -166,22 +165,6 @@ You can now use `ggshield` to search for secrets:
166165
- in Pypi packages: `ggshield secret scan pypi flask`
167166
- and more, have a look at `ggshield secret scan --help` output for details.
168167

169-
## Infra as Code Security (IaC)
170-
171-
You can also search for vulnerabilities in your IaC files using the following command:
172-
173-
```
174-
ggshield iac scan all .
175-
```
176-
177-
However, if you are only interested in _new_ potential IaC vulnerabilities, you can run:
178-
179-
```
180-
ggshield iac scan diff --ref=HEAD~1 .
181-
```
182-
183-
Have a look at `ggshield iac scan --help` for more details.
184-
185168
# Integrations
186169

187170
You can integrate `ggshield` in your [CI/CD workflow](https://docs.gitguardian.com/ggshield-docs/integrations/overview#cicd-integrations-secrets-detection-in-your-cicd-workflow).

actions-unstable/iac/action.yml

-27
This file was deleted.

actions-unstable/sca/action.yml

-25
This file was deleted.

actions/iac/action.yml

-20
This file was deleted.

actions/sca/action.yml

-20
This file was deleted.
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,4 @@
1+
### Removed
2+
3+
- SCA code and commands
4+
- IaC code and commands

doc/dev/error-handling.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@
99
It is important for users (and for our tests) to be able to make the distinction between "a scan was successful but it found problems" and "something went wrong while scanning". To do so, GGShield uses different error codes for the different cases. At the time of this writing the following codes are supported:
1010

1111
- 0: All good
12-
- 1: Scan was successful but it found problems (leaked secrets, IaC security issues...)
12+
- 1: Scan was successful but it found problems (e.g. leaked secrets)
1313
- 2: Error on the command-line, like a missing parameter
1414
- 3: An authentication subcommand failed
1515
- 128: Something else

0 commit comments

Comments
 (0)