Skip to content

Commit cb558e9

Browse files
authored
Merge pull request #1039 from GitGuardian/fperucki/remove-sca-iac
chore: remove SCA & IaC
2 parents 28f5153 + 58782e1 commit cb558e9

File tree

187 files changed

+24
-17711
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

187 files changed

+24
-17711
lines changed

.gitguardian.example.yml

Lines changed: 0 additions & 41 deletions
Original file line numberDiff line numberDiff line change
@@ -36,44 +36,3 @@ secret:
3636
# Detectors to ignore.
3737
ignored_detectors: # default: []
3838
- Generic Password
39-
40-
iac:
41-
# Exclude files and paths by globbing
42-
ignored_paths:
43-
- '**/README.md'
44-
- 'doc/*'
45-
- 'LICENSE'
46-
- path: 'tests/*'
47-
comment: 'Ignore vulnerabilities in tests'
48-
- path: 'dev/*'
49-
comment: 'Ignore vulnerabilities in dev sandbox'
50-
until: '2030-06-24T00:00:01Z'
51-
52-
# IaC vulnerabilities to ignore
53-
ignored_policies:
54-
- GG_IAC_0000
55-
- GG_IAC_0005
56-
- policy: 'GG_IAC_0003'
57-
until: '2030-06-24T00:00:01Z'
58-
- policy: 'GG_IAC_0012'
59-
comment: 'We will handle this later'
60-
until: '2030-06-24T00:00:01Z'
61-
62-
# Minimum severity of the policies
63-
minimum_severity: HIGH
64-
65-
sca:
66-
# Exclude files and paths by globbing
67-
ignored_paths:
68-
- '**/Pipfile'
69-
- '/back/**/package.json'
70-
71-
# SCA vulnerabilities to ignore
72-
ignored_vulnerabilities:
73-
- identifier: 'GHSA-0000-aaaa-ZZZZ'
74-
path: 'Pipfile.lock' # Can be a regex
75-
comment: 'Check vulnerability later' # Optional
76-
until: '2023-05-01T00:00:00' # Optional, needs to follow ISO 8061 format 'YYYY-MM-DDTHH:MM:SS' (converted to UTC)
77-
78-
# Minimum severity of the policies
79-
minimum_severity: HIGH

.gitguardian.yaml

Lines changed: 0 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -34,14 +34,3 @@ secret:
3434
- .env
3535
- 'tests/unit/cassettes/*'
3636
- 'tests/unit/**/snapshots/*'
37-
38-
iac:
39-
ignored_policies:
40-
# We don't want to fix this vulnerability because many CI systems
41-
# (including GitHub action and Azure pipelines) expect the user inside the
42-
# container to be root.
43-
- GG_IAC_0079
44-
45-
sca:
46-
ignored_paths:
47-
- tests/

.github/workflows/ci.yml

Lines changed: 0 additions & 40 deletions
Original file line numberDiff line numberDiff line change
@@ -164,51 +164,13 @@ jobs:
164164
GITGUARDIAN_API_KEY: ${{ secrets.GITGUARDIAN_API_KEY }}
165165
GITGUARDIAN_API_URL: ${{ secrets.GITGUARDIAN_API_URL }}
166166

167-
test_github_iac_scan_action:
168-
name: Test GitHub action for `iac scan`
169-
# See note about steps requiring the GITGUARDIAN_API at the top of this file
170-
if: ${{ !github.event.pull_request.head.repo.fork }}
171-
runs-on: ubuntu-22.04
172-
steps:
173-
- name: Checkout
174-
uses: actions/checkout@v4
175-
with:
176-
fetch-depth: 0
177-
- name: Scan commits for IaC vulnerabilities
178-
uses: ./actions-unstable/iac
179-
with:
180-
args: .
181-
env:
182-
GITGUARDIAN_API_KEY: ${{ secrets.GITGUARDIAN_API_KEY }}
183-
GITGUARDIAN_API_URL: ${{ secrets.GITGUARDIAN_API_URL }}
184-
185-
test_github_sca_scan_action:
186-
name: Test GitHub action for `sca scan`
187-
# See note about steps requiring the GITGUARDIAN_API at the top of this file
188-
if: ${{ !github.event.pull_request.head.repo.fork }}
189-
runs-on: ubuntu-22.04
190-
steps:
191-
- name: Checkout
192-
uses: actions/checkout@v4
193-
with:
194-
fetch-depth: 0
195-
- name: Scan commits for SCA vulnerabilities
196-
uses: ./actions-unstable/sca
197-
with:
198-
args: .
199-
env:
200-
GITGUARDIAN_API_KEY: ${{ secrets.GITGUARDIAN_API_KEY }}
201-
GITGUARDIAN_API_URL: ${{ secrets.GITGUARDIAN_API_URL }}
202-
203167
dockerhub-unstable:
204168
name: Push Docker image to Docker Hub
205169
runs-on: ubuntu-22.04
206170
if: github.ref == 'refs/heads/main' && github.event_name == 'push'
207171
needs:
208172
- lint
209173
- build
210-
- test_github_iac_scan_action
211-
- test_github_sca_scan_action
212174
- test_github_secret_scan_action
213175
steps:
214176
- name: Checkout
@@ -228,8 +190,6 @@ jobs:
228190
needs:
229191
- lint
230192
- build
231-
- test_github_iac_scan_action
232-
- test_github_sca_scan_action
233193
- test_github_secret_scan_action
234194
steps:
235195
- name: Check out the repo

.importlinter

Lines changed: 2 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -9,8 +9,8 @@ name = ggshield-layers
99
type = layers
1010
layers =
1111
ggshield.__main__
12-
ggshield.cmd.auth | ggshield.cmd.config | ggshield.cmd.hmsl | ggshield.cmd.honeytoken | ggshield.cmd.iac | ggshield.cmd.install | ggshield.cmd.quota | ggshield.cmd.sca | ggshield.cmd.secret | ggshield.cmd.status | ggshield.cmd.utils
13-
ggshield.verticals.auth | ggshield.verticals.hmsl | ggshield.verticals.iac | ggshield.verticals.sca | ggshield.verticals.secret
12+
ggshield.cmd.auth | ggshield.cmd.config | ggshield.cmd.hmsl | ggshield.cmd.honeytoken | ggshield.cmd.install | ggshield.cmd.quota | ggshield.cmd.secret | ggshield.cmd.status | ggshield.cmd.utils
13+
ggshield.verticals.auth | ggshield.verticals.hmsl | ggshield.verticals.secret
1414
ggshield.core
1515
click | ggshield.utils | pygitguardian
1616
ignore_imports =
@@ -26,18 +26,14 @@ source_modules =
2626
ggshield.cmd.config
2727
ggshield.cmd.hmsl
2828
ggshield.cmd.honeytoken
29-
ggshield.cmd.iac
3029
ggshield.cmd.install
3130
ggshield.cmd.quota
32-
ggshield.cmd.sca
3331
ggshield.cmd.secret
3432
ggshield.cmd.status
3533
ggshield.cmd.utils
3634
forbidden_modules =
3735
ggshield.verticals.auth
3836
ggshield.verticals.hmsl
39-
ggshield.verticals.iac
40-
ggshield.verticals.sca
4137
ggshield.verticals.secret
4238
ignore_imports =
4339
ggshield.cmd.auth.** -> ggshield.verticals.auth
@@ -49,14 +45,10 @@ ignore_imports =
4945
ggshield.cmd.hmsl.** -> ggshield.verticals.hmsl.**
5046
ggshield.cmd.honeytoken.** -> ggshield.verticals.honeytoken
5147
ggshield.cmd.honeytoken.** -> ggshield.verticals.honeytoken.**
52-
ggshield.cmd.iac.** -> ggshield.verticals.iac
53-
ggshield.cmd.iac.** -> ggshield.verticals.iac.**
5448
ggshield.cmd.install.** -> ggshield.verticals.install
5549
ggshield.cmd.install.** -> ggshield.verticals.install.**
5650
ggshield.cmd.quota.** -> ggshield.verticals.quota
5751
ggshield.cmd.quota.** -> ggshield.verticals.quota.**
58-
ggshield.cmd.sca.** -> ggshield.verticals.sca
59-
ggshield.cmd.sca.** -> ggshield.verticals.sca.**
6052
ggshield.cmd.secret.** -> ggshield.verticals.secret
6153
ggshield.cmd.secret.** -> ggshield.verticals.secret.**
6254
ggshield.cmd.status.** -> ggshield.verticals.status

.pre-commit-hooks.yaml

Lines changed: 0 additions & 40 deletions
Original file line numberDiff line numberDiff line change
@@ -9,26 +9,6 @@
99
pass_filenames: false
1010
minimum_pre_commit_version: 3.2.0
1111

12-
- id: ggshield-iac
13-
name: ggshield-iac (pre-commit)
14-
entry: ggshield
15-
description: Runs ggshield Infra as Code Security to detect IaC vulnerabilities.
16-
stages: [pre-commit]
17-
args: ['iac', 'scan', 'pre-commit']
18-
language: python
19-
pass_filenames: false
20-
minimum_pre_commit_version: 3.2.0
21-
22-
- id: ggshield-sca
23-
name: ggshield-sca (pre-commit)
24-
entry: ggshield
25-
description: Runs ggshield Software Composition Analysis to detect vulnerabilities introduced by dependencies.
26-
stages: [pre-commit]
27-
args: ['sca', 'scan', 'pre-commit']
28-
language: python
29-
pass_filenames: false
30-
minimum_pre_commit_version: 3.2.0
31-
3212
- id: docker-ggshield
3313
name: ggshield (pre-commit,docker)
3414
language: docker_image
@@ -46,26 +26,6 @@
4626
pass_filenames: false
4727
minimum_pre_commit_version: 3.2.0
4828

49-
- id: ggshield-iac-push
50-
name: ggshield-iac (pre-push)
51-
entry: ggshield
52-
description: Runs ggshield Infra as Code Security to detect IaC vulnerabilities.
53-
args: ['iac', 'scan', 'pre-push']
54-
stages: [pre-push]
55-
language: python
56-
pass_filenames: false
57-
minimum_pre_commit_version: 3.2.0
58-
59-
- id: ggshield-sca-push
60-
name: ggshield-sca (pre-push)
61-
entry: ggshield
62-
description: Runs ggshield Software Composition Analysis to detect vulnerabilities introduced by dependencies.
63-
args: ['sca', 'scan', 'pre-push']
64-
stages: [pre-push]
65-
language: python
66-
pass_filenames: false
67-
minimum_pre_commit_version: 3.2.0
68-
6929
- id: docker-ggshield-push
7030
name: ggshield (pre-push,docker)
7131
language: docker_image

README.md

Lines changed: 0 additions & 17 deletions
Original file line numberDiff line numberDiff line change
@@ -39,7 +39,6 @@ Only metadata such as call time, request size and scan mode is stored from scans
3939
- [Manual setup](#manual-setup)
4040
- [Getting started](#getting-started)
4141
- [Secrets](#secrets)
42-
- [Infra as Code Security (IaC)](#infra-as-code-security-iac)
4342
- [Integrations](#integrations)
4443
- [Learn more](#learn-more)
4544
- [Output](#output)
@@ -166,22 +165,6 @@ You can now use `ggshield` to search for secrets:
166165
- in Pypi packages: `ggshield secret scan pypi flask`
167166
- and more, have a look at `ggshield secret scan --help` output for details.
168167

169-
## Infra as Code Security (IaC)
170-
171-
You can also search for vulnerabilities in your IaC files using the following command:
172-
173-
```
174-
ggshield iac scan all .
175-
```
176-
177-
However, if you are only interested in _new_ potential IaC vulnerabilities, you can run:
178-
179-
```
180-
ggshield iac scan diff --ref=HEAD~1 .
181-
```
182-
183-
Have a look at `ggshield iac scan --help` for more details.
184-
185168
# Integrations
186169

187170
You can integrate `ggshield` in your [CI/CD workflow](https://docs.gitguardian.com/ggshield-docs/integrations/overview#cicd-integrations-secrets-detection-in-your-cicd-workflow).

actions-unstable/iac/action.yml

Lines changed: 0 additions & 27 deletions
This file was deleted.

actions-unstable/sca/action.yml

Lines changed: 0 additions & 25 deletions
This file was deleted.

actions/iac/action.yml

Lines changed: 0 additions & 20 deletions
This file was deleted.

actions/sca/action.yml

Lines changed: 0 additions & 20 deletions
This file was deleted.

0 commit comments

Comments
 (0)