Skip to content

Commit f50ae72

Browse files
authored
chore/updated links to cbomkit org (#347)
* chore/updated links to cbomkit org Signed-off-by: san-zrl <san@zurich.ibm.com> * chore/updated links to cbomkit org Signed-off-by: san-zrl <san@zurich.ibm.com> * chore/updated links to cbomkit org Signed-off-by: san-zrl <san@zurich.ibm.com> --------- Signed-off-by: san-zrl <san@zurich.ibm.com>
1 parent 52f958d commit f50ae72

File tree

8 files changed

+21
-21
lines changed

8 files changed

+21
-21
lines changed

.github/workflows/maven.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -32,7 +32,7 @@ jobs:
3232
- name: Build with Maven
3333
run: mvn clean package
3434
- name: Create CBOM
35-
uses: PQCA/cbomkit-action@v2.1.1
35+
uses: cbomkit/cbomkit-action@v2.1.1
3636
id: cbom
3737
# Persist CBOM after a job has completed and share
3838
# that CBOM with another job in the same workflow.

CODEOWNERS

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,3 +1,3 @@
11
# see https://docs.github.com/en/github/creating-cloning-and-archiving-repositories/about-code-owners
22

3-
* @PQCA/cbomkit-maintainers
3+
* @cbomkit/cbomkit-maintainers

CONTRIBUTING.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -8,14 +8,14 @@ This page describes how you can join the community in this goal.
88

99
If you are new to the community? We recommend you do the following before diving into the code:
1010

11-
* Read the [Code of Conduct](https://github.com/PQCA/sonar-cryptography/blob/main/CODE_OF_CONDUCT.md)
12-
* Familiarize yourself with the community (via [GitHub](https://github.com/PQCA/sonar-cryptography/discussions) etc.)
11+
* Read the [Code of Conduct](https://github.com/cbomkit/sonar-cryptography/blob/main/CODE_OF_CONDUCT.md)
12+
* Familiarize yourself with the community (via [GitHub](https://github.com/cbomkit/sonar-cryptography/discussions) etc.)
1313

1414
## Choose an issue to work on
1515
The Sonar Cryptography Plugin uses the following labels to help non-maintainers find issues best suited to their interest and experience level:
1616

17-
* [good first issue](https://github.com/PQCA/sonar-cryptography/issues?q=is%3Aissue+is%3Aopen+label%3A%22good+first+issue%22) - these issues are typically the simplest available to work on, ideal for newcomers. They should already be fully scoped, with a clear approach outlined in the descriptions.
18-
* [help wanted](https://github.com/PQCA/sonar-cryptography/issues?q=is%3Aopen+is%3Aissue+label%3A%22help+wanted%22) - these issues are generally more complex than good first issues. They typically cover work that core maintainers don't currently have capacity to implement and may require more investigation/discussion. These are a great option for experienced contributors looking for something a bit more challenging.
17+
* [good first issue](https://github.com/cbomkit/sonar-cryptography/issues?q=is%3Aissue+is%3Aopen+label%3A%22good+first+issue%22) - these issues are typically the simplest available to work on, ideal for newcomers. They should already be fully scoped, with a clear approach outlined in the descriptions.
18+
* [help wanted](https://github.com/cbomkit/sonar-cryptography/issues?q=is%3Aopen+is%3Aissue+label%3A%22help+wanted%22) - these issues are generally more complex than good first issues. They typically cover work that core maintainers don't currently have capacity to implement and may require more investigation/discussion. These are a great option for experienced contributors looking for something a bit more challenging.
1919

2020
## Code Style
2121

README.md

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -1,12 +1,12 @@
11
# Sonar Cryptography Plugin (CBOMkit-hyperion)
22

3-
[![License](https://img.shields.io/github/license/PQCA/sonar-cryptography.svg?)](https://opensource.org/licenses/Apache-2.0) <!--- long-description-skip-begin -->
4-
[![Current Release](https://img.shields.io/github/release/PQCA/sonar-cryptography.svg?logo=IBM)](https://github.com/PQCA/sonar-cryptography/releases)
3+
[![License](https://img.shields.io/github/license/cbomkit/sonar-cryptography.svg?)](https://opensource.org/licenses/Apache-2.0) <!--- long-description-skip-begin -->
4+
[![Current Release](https://img.shields.io/github/release/cbomkit/sonar-cryptography.svg?logo=IBM)](https://github.com/cbomkit/sonar-cryptography/releases)
55

66

77
This repository contains a SonarQube Plugin that detects cryptographic assets
88
in source code and generates [CBOM](https://cyclonedx.org/capabilities/cbom/).
9-
It is part of **the [CBOMKit](https://github.com/PQCA/cbomkit) toolset**.
9+
It is part of **the [CBOMKit](https://github.com/cbomkit) toolset**.
1010

1111
## Version compatibility
1212

@@ -41,13 +41,13 @@ It is part of **the [CBOMKit](https://github.com/PQCA/cbomkit) toolset**.
4141
> included Docker Compose to set up a development environment. See
4242
> [here](CONTRIBUTING.md#build) for instructions.
4343
44-
Copy the plugin (the JAR file from the [latest releases](https://github.com/PQCA/sonar-cryptography/releases))
44+
Copy the plugin (the JAR file from the [latest releases](https://github.com/cbomkit/sonar-cryptography/releases))
4545
to `$SONARQUBE_HOME/extensions/plugins` and restart
4646
SonarQube ([more](https://docs.sonarqube.org/latest/setup-and-upgrade/install-a-plugin/)).
4747

4848
## Using
4949

50-
The plugin provides new inventory rules (PQCA Cryptography Repository) regarding the use of cryptography for
50+
The plugin provides new inventory rules (Cbomkit Cryptography Repository) regarding the use of cryptography for
5151
the supported languages.
5252
If you enable these rules, a source code scan creates a cryptographic inventory by creating a
5353
[CBOM](https://cyclonedx.org/capabilities/cbom/) with all cryptographic assets and writing
@@ -72,7 +72,7 @@ to start your first scan.
7272

7373
### Visualizing your CBOM
7474

75-
Once you have scanned your source code with the plugin, and obtained a `cbom.json` file, you can use [PQCA's CBOM Viewer](https://github.com/PQCA/cbomkit) service to know more about it.
75+
Once you have scanned your source code with the plugin, and obtained a `cbom.json` file, you can use [Cbomkit's CBOM Viewer](https://github.com/cbomkit/cbomkit) service to know more about it.
7676
It provides you with general insights about the cryptography used in your source code and its compliance with post-quantum safety.
7777
It also allows you to explore precisely each cryptography asset and its detailed specification, and displays where it appears in your code.
7878

@@ -85,8 +85,8 @@ If you encounter difficulties or unexpected results while installing the plugin
8585
If you'd like to contribute to Sonar Cryptography Plugin, please take a look at our
8686
[contribution guidelines](CONTRIBUTING.md). By participating, you are expected to uphold our [code of conduct](CODE_OF_CONDUCT.md).
8787

88-
We use [GitHub issues](https://github.com/PQCA/sonar-cryptography/issues) for tracking requests and bugs. For questions
89-
start a discussion using [GitHub Discussions](https://github.com/PQCA/sonar-cryptography/discussions).
88+
We use [GitHub issues](https://github.com/cbomkit/sonar-cryptography/issues) for tracking requests and bugs. For questions
89+
start a discussion using [GitHub Discussions](https://github.com/cbomkit/sonar-cryptography/discussions).
9090

9191
## License
9292

SECURITY.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22

33
You can privately report a potential security issue via the GitHub security advisory feature. This can be done here:
44

5-
https://github.com/PQCA/sonar-cryptography/security/advisories
5+
https://github.com/cbomkit/sonar-cryptography/security/advisories
66

77
Please do **not** open a public issue about a potential security vulnerability.
88

docs/DETECTION_RULE_STRUCTURE.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -109,7 +109,7 @@ This will then be useful when we translate the detected findings: we use the bun
109109
And finally, we can finish the specification of the detection rules by adding top level dependent detection rules with `withDependingDetectionRules(List<IDetectionRule<T>> detectionRules)` (or not, using `withoutDependingDetectionRules()` instead).
110110
These are similar to the parameter dependent rules, but instead of applying these rules on a parameter, they are applied to the object itself, i.e. to the object with which the rule matched in the first place[^2].
111111

112-
[^2]: Currently, findings of top level dependent detection rules are added below *each* (top level and parameter) detections of the rules in the tree of detected values, *except* for parameter detections using `asChildOfParameterWithId`. More information [here](https://github.com/PQCA/sonar-cryptography/pull/142).
112+
[^2]: Currently, findings of top level dependent detection rules are added below *each* (top level and parameter) detections of the rules in the tree of detected values, *except* for parameter detections using `asChildOfParameterWithId`. More information [here](https://github.com/cbomkit/sonar-cryptography/pull/142).
113113

114114
> [!TIP]
115115
> You will find all the classes implementing the action factories, value factories and contexts (that you may use in the functions described above) in the [`model`](../engine/src/main/java/com/ibm/engine/model/) directory of the engine.

docs/TROUBLESHOOTING.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -19,7 +19,7 @@ To do so, start by opening this repo and `git checkout` to the latest release br
1919
Open the [`docker-compose.yaml`](../docker-compose.yaml) file and check the `image` argument to make sure that it uses a version of SonarQube supported by our plugin.
2020

2121
You then need to have a `.jar` plugin in the `.SonarQube/plugins/` directory. There are two options for this:
22-
- Easiest way: download the `.jar` file from the [latest releases](https://github.com/PQCA/sonar-cryptography/releases) GitHub page and move it to this directory. In our case, it is named `sonar-cryptography-plugin-1.2.0.jar`.
22+
- Easiest way: download the `.jar` file from the [latest releases](https://github.com/cbomkit/sonar-cryptography/releases) GitHub page and move it to this directory. In our case, it is named `sonar-cryptography-plugin-1.2.0.jar`.
2323
- Alternatively, you can build the plugin from source, as explained in the [Build](../CONTRIBUTING.md#build) paragraph of [`CONTRIBUTING.md`](../CONTRIBUTING.md).
2424

2525
Now, you can run our plugin with SonarQube by following the [Run the Plugin with SonarQube](../CONTRIBUTING.md#run-the-plugin-with-sonarqube) paragraph of [`CONTRIBUTING.md`](../CONTRIBUTING.md).
@@ -149,4 +149,4 @@ If the analysis runs as expected, you should see the results in two ways:
149149

150150
---
151151

152-
If you did not succeed while following all the steps in this guide, please check previous GitHub [issues](https://github.com/PQCA/sonar-cryptography/issues?q=is%3Aissue) to check if someone else ever had your problem, otherwise feel free to reach us by creating a new GitHub issue.
152+
If you did not succeed while following all the steps in this guide, please check previous GitHub [issues](https://github.com/cbomkit/sonar-cryptography/issues?q=is%3Aissue) to check if someone else ever had your problem, otherwise feel free to reach us by creating a new GitHub issue.

pom.xml

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -23,8 +23,8 @@
2323
<version>2.0.0-SNAPSHOT</version>
2424
<name>sonar-cryptography</name>
2525
<organization>
26-
<name>PQCA</name>
27-
<url>https://github.com/PQCA</url>
26+
<name>cbomkit</name>
27+
<url>https://github.com/cbomkit</url>
2828
</organization>
2929
<licenses>
3030
<license>
@@ -56,7 +56,7 @@
5656
<repository>
5757
<id>github</id>
5858
<name>GitHub Packages</name>
59-
<url>https://maven.pkg.github.com/PQCA/sonar-cryptography</url>
59+
<url>https://maven.pkg.github.com/cbomkit/sonar-cryptography</url>
6060
</repository>
6161
</distributionManagement>
6262

0 commit comments

Comments
 (0)