From 7a1fcca2cc4f47f93e18a7efdb15ecd78a74d6c4 Mon Sep 17 00:00:00 2001 From: Ville Aikas Date: Wed, 8 Jun 2022 15:57:38 +0300 Subject: [PATCH 1/2] Fix import paths, update go.mod to be policy-controller. Signed-off-by: Ville Aikas --- cmd/cosign/cli/attach.go | 4 +- cmd/cosign/cli/attach/attestation.go | 10 +- cmd/cosign/cli/attach/sbom.go | 6 +- cmd/cosign/cli/attach/sig.go | 8 +- cmd/cosign/cli/attest.go | 6 +- cmd/cosign/cli/attest/attest.go | 24 +-- cmd/cosign/cli/clean.go | 6 +- cmd/cosign/cli/commands.go | 4 +- cmd/cosign/cli/copy.go | 4 +- cmd/cosign/cli/copy/copy.go | 8 +- cmd/cosign/cli/dockerfile.go | 6 +- cmd/cosign/cli/dockerfile/verify.go | 2 +- cmd/cosign/cli/download.go | 4 +- cmd/cosign/cli/download/attestation.go | 4 +- cmd/cosign/cli/download/sbom.go | 4 +- cmd/cosign/cli/download/signature.go | 4 +- cmd/cosign/cli/fulcio/depcheck_test.go | 2 +- cmd/cosign/cli/fulcio/fulcio.go | 8 +- cmd/cosign/cli/fulcio/fulcio_test.go | 2 +- .../cli/fulcio/fulcioroots/fulcioroots.go | 2 +- .../fulcio/fulcioroots/fulcioroots_test.go | 2 +- .../cli/fulcio/fulcioverifier/ctl/verify.go | 4 +- .../fulcio/fulcioverifier/fulcioverifier.go | 6 +- cmd/cosign/cli/generate.go | 4 +- cmd/cosign/cli/generate/generate.go | 4 +- cmd/cosign/cli/generate/generate_key_pair.go | 10 +- cmd/cosign/cli/generate_key_pair.go | 4 +- cmd/cosign/cli/import_key_pair.go | 4 +- .../cli/importkeypair/import_key_pair.go | 2 +- cmd/cosign/cli/initialize.go | 4 +- cmd/cosign/cli/initialize/init.go | 4 +- cmd/cosign/cli/load.go | 6 +- cmd/cosign/cli/manifest.go | 6 +- cmd/cosign/cli/manifest/verify.go | 2 +- cmd/cosign/cli/options/annotations.go | 2 +- cmd/cosign/cli/options/annotations_test.go | 2 +- cmd/cosign/cli/options/attach.go | 2 +- cmd/cosign/cli/options/files.go | 2 +- cmd/cosign/cli/options/initialize.go | 2 +- cmd/cosign/cli/options/key.go | 4 +- cmd/cosign/cli/options/predicate.go | 2 +- cmd/cosign/cli/options/registry.go | 2 +- cmd/cosign/cli/piv_tool.go | 4 +- cmd/cosign/cli/pivcli/commands.go | 2 +- cmd/cosign/cli/pkcs11_tool.go | 4 +- cmd/cosign/cli/pkcs11cli/commands.go | 2 +- cmd/cosign/cli/policy_init.go | 18 +- cmd/cosign/cli/public_key.go | 6 +- cmd/cosign/cli/publickey/public_key.go | 8 +- cmd/cosign/cli/publickey/public_key_test.go | 2 +- cmd/cosign/cli/rekor/rekor.go | 2 +- cmd/cosign/cli/rekor/rekor_test.go | 2 +- cmd/cosign/cli/save.go | 8 +- cmd/cosign/cli/sign.go | 6 +- cmd/cosign/cli/sign/sign.go | 38 ++-- cmd/cosign/cli/sign/sign_blob.go | 8 +- cmd/cosign/cli/sign/sign_test.go | 8 +- cmd/cosign/cli/signblob.go | 6 +- cmd/cosign/cli/tree.go | 4 +- cmd/cosign/cli/triangulate.go | 4 +- cmd/cosign/cli/triangulate/triangulate.go | 6 +- cmd/cosign/cli/upload.go | 4 +- cmd/cosign/cli/upload/blob.go | 4 +- cmd/cosign/cli/upload/wasm.go | 6 +- cmd/cosign/cli/verify.go | 4 +- cmd/cosign/cli/verify/verify.go | 20 +- cmd/cosign/cli/verify/verify_attestation.go | 22 +- cmd/cosign/cli/verify/verify_blob.go | 22 +- cmd/cosign/cli/verify/verify_blob_test.go | 2 +- cmd/cosign/main.go | 2 +- cmd/cosign/policy_webhook/depcheck_test.go | 2 +- cmd/cosign/policy_webhook/main.go | 8 +- cmd/cosign/webhook/depcheck_test.go | 2 +- cmd/cosign/webhook/main.go | 4 +- cmd/fig/fig.go | 2 +- cmd/help/main.go | 2 +- cmd/schema/main.go | 4 +- cmd/sget/cli/commands.go | 4 +- cmd/sget/cli/options/root.go | 2 +- cmd/sget/main.go | 2 +- go.mod | 2 +- hack/update-codegen.sh | 6 +- internal/pkg/cosign/dsse.go | 2 +- internal/pkg/cosign/ephemeral/signer.go | 8 +- internal/pkg/cosign/fulcio/signer.go | 6 +- internal/pkg/cosign/fulcio/signer_test.go | 4 +- internal/pkg/cosign/payload/attestor.go | 8 +- internal/pkg/cosign/payload/attestor_test.go | 2 +- internal/pkg/cosign/payload/signer.go | 6 +- internal/pkg/cosign/payload/signer_test.go | 2 +- internal/pkg/cosign/rekor/signer.go | 10 +- internal/pkg/cosign/rekor/signer_test.go | 6 +- internal/pkg/cosign/sign.go | 2 +- pkg/apis/config/image_policies.go | 2 +- pkg/apis/config/image_policies_test.go | 2 +- pkg/apis/config/store_test.go | 2 +- .../v1alpha1/clusterimagepolicy_conversion.go | 2 +- .../clusterimagepolicy_conversion_test.go | 2 +- .../v1alpha1/clusterimagepolicy_validation.go | 2 +- pkg/apis/policy/v1alpha1/register.go | 2 +- .../v1beta1/clusterimagepolicy_validation.go | 2 +- pkg/apis/policy/v1beta1/register.go | 2 +- pkg/client/clientset/versioned/clientset.go | 4 +- .../versioned/fake/clientset_generated.go | 10 +- .../clientset/versioned/fake/register.go | 4 +- .../clientset/versioned/scheme/register.go | 4 +- .../policy/v1alpha1/clusterimagepolicy.go | 4 +- .../v1alpha1/fake/fake_clusterimagepolicy.go | 2 +- .../v1alpha1/fake/fake_policy_client.go | 2 +- .../typed/policy/v1alpha1/policy_client.go | 4 +- .../policy/v1beta1/clusterimagepolicy.go | 4 +- .../v1beta1/fake/fake_clusterimagepolicy.go | 2 +- .../policy/v1beta1/fake/fake_policy_client.go | 2 +- .../typed/policy/v1beta1/policy_client.go | 4 +- .../informers/externalversions/factory.go | 6 +- .../informers/externalversions/generic.go | 4 +- .../internalinterfaces/factory_interfaces.go | 2 +- .../externalversions/policy/interface.go | 6 +- .../policy/v1alpha1/clusterimagepolicy.go | 8 +- .../policy/v1alpha1/interface.go | 2 +- .../policy/v1beta1/clusterimagepolicy.go | 8 +- .../policy/v1beta1/interface.go | 2 +- pkg/client/injection/client/client.go | 14 +- pkg/client/injection/client/fake/fake.go | 6 +- .../injection/informers/factory/factory.go | 6 +- .../injection/informers/factory/fake/fake.go | 6 +- .../filtered/fake/fake_filtered_factory.go | 6 +- .../factory/filtered/filtered_factory.go | 6 +- .../clusterimagepolicy/clusterimagepolicy.go | 14 +- .../v1alpha1/clusterimagepolicy/fake/fake.go | 4 +- .../filtered/clusterimagepolicy.go | 14 +- .../clusterimagepolicy/filtered/fake/fake.go | 4 +- .../clusterimagepolicy/clusterimagepolicy.go | 14 +- .../v1beta1/clusterimagepolicy/fake/fake.go | 4 +- .../filtered/clusterimagepolicy.go | 14 +- .../clusterimagepolicy/filtered/fake/fake.go | 4 +- .../v1alpha1/clusterimagepolicy/controller.go | 6 +- .../v1alpha1/clusterimagepolicy/reconciler.go | 6 +- .../v1alpha1/clusterimagepolicy/state.go | 2 +- .../v1beta1/clusterimagepolicy/controller.go | 6 +- .../v1beta1/clusterimagepolicy/reconciler.go | 6 +- .../v1beta1/clusterimagepolicy/state.go | 2 +- .../policy/v1alpha1/clusterimagepolicy.go | 2 +- .../policy/v1beta1/clusterimagepolicy.go | 2 +- pkg/cosign/fetch.go | 4 +- pkg/cosign/git/git.go | 6 +- pkg/cosign/git/github/github.go | 2 +- pkg/cosign/git/gitlab/gitlab.go | 2 +- pkg/cosign/keys.go | 2 +- pkg/cosign/kubernetes/secret.go | 2 +- pkg/cosign/kubernetes/secret_test.go | 2 +- .../clusterimagepolicy_types.go | 4 +- pkg/cosign/kubernetes/webhook/validation.go | 10 +- pkg/cosign/kubernetes/webhook/validator.go | 12 +- .../kubernetes/webhook/validator_test.go | 14 +- pkg/cosign/remote/index.go | 2 +- pkg/cosign/remote/remote.go | 6 +- pkg/cosign/tlog.go | 4 +- pkg/cosign/verifiers.go | 2 +- pkg/cosign/verifiers_test.go | 2 +- pkg/cosign/verify.go | 18 +- pkg/cosign/verify_test.go | 12 +- pkg/oci/empty/empty.go | 2 +- pkg/oci/empty/empty_test.go | 2 +- pkg/oci/empty/signed.go | 2 +- pkg/oci/internal/signature/layer.go | 4 +- pkg/oci/internal/signature/layer_test.go | 2 +- pkg/oci/layout/index.go | 4 +- pkg/oci/layout/signatures.go | 4 +- pkg/oci/layout/write.go | 2 +- pkg/oci/layout/write_test.go | 10 +- pkg/oci/mutate/map.go | 2 +- pkg/oci/mutate/map_test.go | 4 +- pkg/oci/mutate/mutate.go | 6 +- pkg/oci/mutate/mutate_test.go | 6 +- pkg/oci/mutate/options.go | 4 +- pkg/oci/mutate/signature.go | 6 +- pkg/oci/mutate/signature_test.go | 6 +- pkg/oci/mutate/signatures.go | 2 +- pkg/oci/mutate/signatures_test.go | 4 +- pkg/oci/remote/image.go | 2 +- pkg/oci/remote/index.go | 2 +- pkg/oci/remote/index_test.go | 2 +- pkg/oci/remote/remote.go | 2 +- pkg/oci/remote/signatures.go | 6 +- pkg/oci/remote/write.go | 2 +- pkg/oci/remote/write_test.go | 6 +- pkg/oci/signature/layer.go | 4 +- pkg/oci/signature/layer_test.go | 2 +- pkg/oci/signatures.go | 2 +- pkg/oci/signed/image.go | 4 +- pkg/oci/signed/index.go | 4 +- pkg/oci/signed/index_test.go | 2 +- pkg/oci/static/file.go | 4 +- pkg/oci/static/options.go | 4 +- pkg/oci/static/options_test.go | 4 +- pkg/oci/static/signature.go | 4 +- pkg/oci/static/signature_test.go | 2 +- pkg/oci/walk/walk.go | 4 +- pkg/oci/walk/walk_test.go | 4 +- pkg/policy/attestation.go | 6 +- pkg/policy/attestation_test.go | 8 +- pkg/policy/eval.go | 2 +- pkg/providers/all/all.go | 10 +- pkg/providers/filesystem/filesystem.go | 4 +- pkg/providers/github/github.go | 2 +- pkg/providers/google/google.go | 2 +- pkg/providers/spiffe/spiffe.go | 2 +- .../clusterimagepolicy/clusterimagepolicy.go | 16 +- .../clusterimagepolicy_test.go | 10 +- .../clusterimagepolicy/controller.go | 6 +- .../clusterimagepolicy/controller_test.go | 2 +- .../clusterimagepolicy/resources/configmap.go | 2 +- .../testing/v1alpha1/clusterimagepolicy.go | 2 +- pkg/reconciler/testing/v1alpha1/factory.go | 2 +- pkg/reconciler/testing/v1alpha1/listers.go | 6 +- pkg/sget/sget.go | 12 +- pkg/signature/keys.go | 12 +- pkg/signature/keys_test.go | 2 +- test/cmd/getoidctoken/main.go | 2 +- test/config/gettoken/gettoken.yaml | 2 +- .../github.com/sigstore/cosign/LICENSE | 201 ------------------ 222 files changed, 562 insertions(+), 763 deletions(-) delete mode 100644 third_party/VENDOR-LICENSE/github.com/sigstore/cosign/LICENSE diff --git a/cmd/cosign/cli/attach.go b/cmd/cosign/cli/attach.go index 99281af7a..7ba574045 100644 --- a/cmd/cosign/cli/attach.go +++ b/cmd/cosign/cli/attach.go @@ -19,8 +19,8 @@ import ( "fmt" "os" - "github.com/sigstore/cosign/cmd/cosign/cli/attach" - "github.com/sigstore/cosign/cmd/cosign/cli/options" + "github.com/sigstore/policy-controller/cmd/cosign/cli/attach" + "github.com/sigstore/policy-controller/cmd/cosign/cli/options" "github.com/spf13/cobra" ) diff --git a/cmd/cosign/cli/attach/attestation.go b/cmd/cosign/cli/attach/attestation.go index 9f928969b..902e5f53e 100644 --- a/cmd/cosign/cli/attach/attestation.go +++ b/cmd/cosign/cli/attach/attestation.go @@ -22,11 +22,11 @@ import ( "github.com/google/go-containerregistry/pkg/name" ssldsse "github.com/secure-systems-lab/go-securesystemslib/dsse" - "github.com/sigstore/cosign/cmd/cosign/cli/options" - "github.com/sigstore/cosign/pkg/oci/mutate" - ociremote "github.com/sigstore/cosign/pkg/oci/remote" - "github.com/sigstore/cosign/pkg/oci/static" - "github.com/sigstore/cosign/pkg/types" + "github.com/sigstore/policy-controller/cmd/cosign/cli/options" + "github.com/sigstore/policy-controller/pkg/oci/mutate" + ociremote "github.com/sigstore/policy-controller/pkg/oci/remote" + "github.com/sigstore/policy-controller/pkg/oci/static" + "github.com/sigstore/policy-controller/pkg/types" ) func AttestationCmd(ctx context.Context, regOpts options.RegistryOptions, signedPayload, imageRef string) error { diff --git a/cmd/cosign/cli/attach/sbom.go b/cmd/cosign/cli/attach/sbom.go index fd16e7b49..cff7ef36f 100644 --- a/cmd/cosign/cli/attach/sbom.go +++ b/cmd/cosign/cli/attach/sbom.go @@ -26,9 +26,9 @@ import ( "github.com/google/go-containerregistry/pkg/name" "github.com/google/go-containerregistry/pkg/v1/remote" "github.com/google/go-containerregistry/pkg/v1/types" - "github.com/sigstore/cosign/cmd/cosign/cli/options" - ociremote "github.com/sigstore/cosign/pkg/oci/remote" - "github.com/sigstore/cosign/pkg/oci/static" + "github.com/sigstore/policy-controller/cmd/cosign/cli/options" + ociremote "github.com/sigstore/policy-controller/pkg/oci/remote" + "github.com/sigstore/policy-controller/pkg/oci/static" ) func SBOMCmd(ctx context.Context, regOpts options.RegistryOptions, sbomRef string, sbomType types.MediaType, imageRef string) error { diff --git a/cmd/cosign/cli/attach/sig.go b/cmd/cosign/cli/attach/sig.go index 06899d59e..a0bf91974 100644 --- a/cmd/cosign/cli/attach/sig.go +++ b/cmd/cosign/cli/attach/sig.go @@ -24,10 +24,10 @@ import ( "github.com/google/go-containerregistry/pkg/name" - "github.com/sigstore/cosign/cmd/cosign/cli/options" - "github.com/sigstore/cosign/pkg/oci/mutate" - ociremote "github.com/sigstore/cosign/pkg/oci/remote" - "github.com/sigstore/cosign/pkg/oci/static" + "github.com/sigstore/policy-controller/cmd/cosign/cli/options" + "github.com/sigstore/policy-controller/pkg/oci/mutate" + ociremote "github.com/sigstore/policy-controller/pkg/oci/remote" + "github.com/sigstore/policy-controller/pkg/oci/static" sigPayload "github.com/sigstore/sigstore/pkg/signature/payload" ) diff --git a/cmd/cosign/cli/attest.go b/cmd/cosign/cli/attest.go index 13182b93d..507edc91f 100644 --- a/cmd/cosign/cli/attest.go +++ b/cmd/cosign/cli/attest.go @@ -20,9 +20,9 @@ import ( "github.com/spf13/cobra" - "github.com/sigstore/cosign/cmd/cosign/cli/attest" - "github.com/sigstore/cosign/cmd/cosign/cli/generate" - "github.com/sigstore/cosign/cmd/cosign/cli/options" + "github.com/sigstore/policy-controller/cmd/cosign/cli/attest" + "github.com/sigstore/policy-controller/cmd/cosign/cli/generate" + "github.com/sigstore/policy-controller/cmd/cosign/cli/options" ) func Attest() *cobra.Command { diff --git a/cmd/cosign/cli/attest/attest.go b/cmd/cosign/cli/attest/attest.go index 2442f766e..b07f7c3d1 100644 --- a/cmd/cosign/cli/attest/attest.go +++ b/cmd/cosign/cli/attest/attest.go @@ -27,18 +27,18 @@ import ( "github.com/google/go-containerregistry/pkg/name" v1 "github.com/google/go-containerregistry/pkg/v1" - "github.com/sigstore/cosign/cmd/cosign/cli/options" - "github.com/sigstore/cosign/cmd/cosign/cli/rekor" - "github.com/sigstore/cosign/cmd/cosign/cli/sign" - "github.com/sigstore/cosign/pkg/cosign" - "github.com/sigstore/cosign/pkg/cosign/attestation" - cbundle "github.com/sigstore/cosign/pkg/cosign/bundle" - cremote "github.com/sigstore/cosign/pkg/cosign/remote" - "github.com/sigstore/cosign/pkg/oci/mutate" - ociremote "github.com/sigstore/cosign/pkg/oci/remote" - "github.com/sigstore/cosign/pkg/oci/static" - sigs "github.com/sigstore/cosign/pkg/signature" - "github.com/sigstore/cosign/pkg/types" + "github.com/sigstore/policy-controller/cmd/cosign/cli/options" + "github.com/sigstore/policy-controller/cmd/cosign/cli/rekor" + "github.com/sigstore/policy-controller/cmd/cosign/cli/sign" + "github.com/sigstore/policy-controller/pkg/cosign" + "github.com/sigstore/policy-controller/pkg/cosign/attestation" + cbundle "github.com/sigstore/policy-controller/pkg/cosign/bundle" + cremote "github.com/sigstore/policy-controller/pkg/cosign/remote" + "github.com/sigstore/policy-controller/pkg/oci/mutate" + ociremote "github.com/sigstore/policy-controller/pkg/oci/remote" + "github.com/sigstore/policy-controller/pkg/oci/static" + sigs "github.com/sigstore/policy-controller/pkg/signature" + "github.com/sigstore/policy-controller/pkg/types" "github.com/sigstore/rekor/pkg/generated/client" "github.com/sigstore/rekor/pkg/generated/models" "github.com/sigstore/sigstore/pkg/signature/dsse" diff --git a/cmd/cosign/cli/clean.go b/cmd/cosign/cli/clean.go index c26701263..3e6243f8f 100644 --- a/cmd/cosign/cli/clean.go +++ b/cmd/cosign/cli/clean.go @@ -27,9 +27,9 @@ import ( "github.com/google/go-containerregistry/pkg/v1/remote/transport" "github.com/spf13/cobra" - "github.com/sigstore/cosign/cmd/cosign/cli/options" - "github.com/sigstore/cosign/pkg/cosign" - ociremote "github.com/sigstore/cosign/pkg/oci/remote" + "github.com/sigstore/policy-controller/cmd/cosign/cli/options" + "github.com/sigstore/policy-controller/pkg/cosign" + ociremote "github.com/sigstore/policy-controller/pkg/oci/remote" ) func Clean() *cobra.Command { diff --git a/cmd/cosign/cli/commands.go b/cmd/cosign/cli/commands.go index 6b72c0175..0bf2b28b9 100644 --- a/cmd/cosign/cli/commands.go +++ b/cmd/cosign/cli/commands.go @@ -25,8 +25,8 @@ import ( "sigs.k8s.io/release-utils/version" cranecmd "github.com/google/go-containerregistry/cmd/crane/cmd" - "github.com/sigstore/cosign/cmd/cosign/cli/options" - "github.com/sigstore/cosign/pkg/cosign" + "github.com/sigstore/policy-controller/cmd/cosign/cli/options" + "github.com/sigstore/policy-controller/pkg/cosign" ) var ( diff --git a/cmd/cosign/cli/copy.go b/cmd/cosign/cli/copy.go index 11c395bcc..58de74ee4 100644 --- a/cmd/cosign/cli/copy.go +++ b/cmd/cosign/cli/copy.go @@ -18,8 +18,8 @@ package cli import ( "github.com/spf13/cobra" - "github.com/sigstore/cosign/cmd/cosign/cli/copy" - "github.com/sigstore/cosign/cmd/cosign/cli/options" + "github.com/sigstore/policy-controller/cmd/cosign/cli/copy" + "github.com/sigstore/policy-controller/cmd/cosign/cli/options" ) func Copy() *cobra.Command { diff --git a/cmd/cosign/cli/copy/copy.go b/cmd/cosign/cli/copy/copy.go index cf2c733b6..59eea826d 100644 --- a/cmd/cosign/cli/copy/copy.go +++ b/cmd/cosign/cli/copy/copy.go @@ -25,10 +25,10 @@ import ( v1 "github.com/google/go-containerregistry/pkg/v1" "github.com/google/go-containerregistry/pkg/v1/remote" "github.com/google/go-containerregistry/pkg/v1/remote/transport" - "github.com/sigstore/cosign/cmd/cosign/cli/options" - "github.com/sigstore/cosign/pkg/oci" - ociremote "github.com/sigstore/cosign/pkg/oci/remote" - "github.com/sigstore/cosign/pkg/oci/walk" + "github.com/sigstore/policy-controller/cmd/cosign/cli/options" + "github.com/sigstore/policy-controller/pkg/oci" + ociremote "github.com/sigstore/policy-controller/pkg/oci/remote" + "github.com/sigstore/policy-controller/pkg/oci/walk" ) // CopyCmd implements the logic to copy the supplied container image and signatures. diff --git a/cmd/cosign/cli/dockerfile.go b/cmd/cosign/cli/dockerfile.go index 27e37b2b7..ce801af48 100644 --- a/cmd/cosign/cli/dockerfile.go +++ b/cmd/cosign/cli/dockerfile.go @@ -16,11 +16,11 @@ package cli import ( - "github.com/sigstore/cosign/cmd/cosign/cli/dockerfile" - "github.com/sigstore/cosign/cmd/cosign/cli/verify" + "github.com/sigstore/policy-controller/cmd/cosign/cli/dockerfile" + "github.com/sigstore/policy-controller/cmd/cosign/cli/verify" "github.com/spf13/cobra" - "github.com/sigstore/cosign/cmd/cosign/cli/options" + "github.com/sigstore/policy-controller/cmd/cosign/cli/options" ) func Dockerfile() *cobra.Command { diff --git a/cmd/cosign/cli/dockerfile/verify.go b/cmd/cosign/cli/dockerfile/verify.go index da6cb4412..6656fe688 100644 --- a/cmd/cosign/cli/dockerfile/verify.go +++ b/cmd/cosign/cli/dockerfile/verify.go @@ -24,7 +24,7 @@ import ( "os" "strings" - "github.com/sigstore/cosign/cmd/cosign/cli/verify" + "github.com/sigstore/policy-controller/cmd/cosign/cli/verify" ) // VerifyCommand verifies a signature on a supplied container image diff --git a/cmd/cosign/cli/download.go b/cmd/cosign/cli/download.go index cdd5fcf99..9672f08fe 100644 --- a/cmd/cosign/cli/download.go +++ b/cmd/cosign/cli/download.go @@ -21,8 +21,8 @@ import ( "github.com/spf13/cobra" - "github.com/sigstore/cosign/cmd/cosign/cli/download" - "github.com/sigstore/cosign/cmd/cosign/cli/options" + "github.com/sigstore/policy-controller/cmd/cosign/cli/download" + "github.com/sigstore/policy-controller/cmd/cosign/cli/options" ) func Download() *cobra.Command { diff --git a/cmd/cosign/cli/download/attestation.go b/cmd/cosign/cli/download/attestation.go index 938b9df8b..443513f5b 100644 --- a/cmd/cosign/cli/download/attestation.go +++ b/cmd/cosign/cli/download/attestation.go @@ -21,8 +21,8 @@ import ( "fmt" "github.com/google/go-containerregistry/pkg/name" - "github.com/sigstore/cosign/cmd/cosign/cli/options" - "github.com/sigstore/cosign/pkg/cosign" + "github.com/sigstore/policy-controller/cmd/cosign/cli/options" + "github.com/sigstore/policy-controller/pkg/cosign" ) func AttestationCmd(ctx context.Context, regOpts options.RegistryOptions, imageRef string) error { diff --git a/cmd/cosign/cli/download/sbom.go b/cmd/cosign/cli/download/sbom.go index 82f107c26..79cd9ff8e 100644 --- a/cmd/cosign/cli/download/sbom.go +++ b/cmd/cosign/cli/download/sbom.go @@ -22,8 +22,8 @@ import ( "os" "github.com/google/go-containerregistry/pkg/name" - "github.com/sigstore/cosign/cmd/cosign/cli/options" - ociremote "github.com/sigstore/cosign/pkg/oci/remote" + "github.com/sigstore/policy-controller/cmd/cosign/cli/options" + ociremote "github.com/sigstore/policy-controller/pkg/oci/remote" ) func SBOMCmd(ctx context.Context, regOpts options.RegistryOptions, imageRef string, out io.Writer) ([]string, error) { diff --git a/cmd/cosign/cli/download/signature.go b/cmd/cosign/cli/download/signature.go index 62b117cb2..44af591c7 100644 --- a/cmd/cosign/cli/download/signature.go +++ b/cmd/cosign/cli/download/signature.go @@ -21,8 +21,8 @@ import ( "fmt" "github.com/google/go-containerregistry/pkg/name" - "github.com/sigstore/cosign/cmd/cosign/cli/options" - "github.com/sigstore/cosign/pkg/cosign" + "github.com/sigstore/policy-controller/cmd/cosign/cli/options" + "github.com/sigstore/policy-controller/pkg/cosign" ) func SignatureCmd(ctx context.Context, regOpts options.RegistryOptions, imageRef string) error { diff --git a/cmd/cosign/cli/fulcio/depcheck_test.go b/cmd/cosign/cli/fulcio/depcheck_test.go index bc7d45f2f..e56de879f 100644 --- a/cmd/cosign/cli/fulcio/depcheck_test.go +++ b/cmd/cosign/cli/fulcio/depcheck_test.go @@ -23,7 +23,7 @@ import ( func TestNoDeps(t *testing.T) { depcheck.AssertNoDependency(t, map[string][]string{ - "github.com/sigstore/cosign/cmd/cosign/cli/fulcio": { + "github.com/sigstore/policy-controller/cmd/cosign/cli/fulcio": { // Avoid pulling in a variety of things that are massive dependencies. "github.com/google/trillian", "github.com/envoyproxy/go-control-plane", diff --git a/cmd/cosign/cli/fulcio/fulcio.go b/cmd/cosign/cli/fulcio/fulcio.go index 21f7530f2..86cb0392f 100644 --- a/cmd/cosign/cli/fulcio/fulcio.go +++ b/cmd/cosign/cli/fulcio/fulcio.go @@ -29,10 +29,10 @@ import ( "golang.org/x/term" - "github.com/sigstore/cosign/cmd/cosign/cli/fulcio/fulcioroots" - "github.com/sigstore/cosign/cmd/cosign/cli/options" - "github.com/sigstore/cosign/pkg/cosign" - "github.com/sigstore/cosign/pkg/providers" + "github.com/sigstore/policy-controller/cmd/cosign/cli/fulcio/fulcioroots" + "github.com/sigstore/policy-controller/cmd/cosign/cli/options" + "github.com/sigstore/policy-controller/pkg/cosign" + "github.com/sigstore/policy-controller/pkg/providers" "github.com/sigstore/fulcio/pkg/api" "github.com/sigstore/sigstore/pkg/oauthflow" "github.com/sigstore/sigstore/pkg/signature" diff --git a/cmd/cosign/cli/fulcio/fulcio_test.go b/cmd/cosign/cli/fulcio/fulcio_test.go index 779c62dbc..50ea7f116 100644 --- a/cmd/cosign/cli/fulcio/fulcio_test.go +++ b/cmd/cosign/cli/fulcio/fulcio_test.go @@ -25,7 +25,7 @@ import ( "net/http/httptest" "testing" - "github.com/sigstore/cosign/cmd/cosign/cli/options" + "github.com/sigstore/policy-controller/cmd/cosign/cli/options" "github.com/sigstore/fulcio/pkg/api" "github.com/sigstore/sigstore/pkg/oauthflow" ) diff --git a/cmd/cosign/cli/fulcio/fulcioroots/fulcioroots.go b/cmd/cosign/cli/fulcio/fulcioroots/fulcioroots.go index a536ff0e8..8dd5b2d3d 100644 --- a/cmd/cosign/cli/fulcio/fulcioroots/fulcioroots.go +++ b/cmd/cosign/cli/fulcio/fulcioroots/fulcioroots.go @@ -24,7 +24,7 @@ import ( "os" "sync" - "github.com/sigstore/cosign/pkg/cosign/tuf" + "github.com/sigstore/policy-controller/pkg/cosign/tuf" "github.com/sigstore/sigstore/pkg/cryptoutils" ) diff --git a/cmd/cosign/cli/fulcio/fulcioroots/fulcioroots_test.go b/cmd/cosign/cli/fulcio/fulcioroots/fulcioroots_test.go index 7fcacf59b..6a0e0fb81 100644 --- a/cmd/cosign/cli/fulcio/fulcioroots/fulcioroots_test.go +++ b/cmd/cosign/cli/fulcio/fulcioroots/fulcioroots_test.go @@ -18,7 +18,7 @@ import ( "os" "testing" - "github.com/sigstore/cosign/test" + "github.com/sigstore/policy-controller/test" "github.com/sigstore/sigstore/pkg/cryptoutils" ) diff --git a/cmd/cosign/cli/fulcio/fulcioverifier/ctl/verify.go b/cmd/cosign/cli/fulcio/fulcioverifier/ctl/verify.go index 641088f37..49f6eea52 100644 --- a/cmd/cosign/cli/fulcio/fulcioverifier/ctl/verify.go +++ b/cmd/cosign/cli/fulcio/fulcioverifier/ctl/verify.go @@ -28,9 +28,9 @@ import ( ct "github.com/google/certificate-transparency-go" ctx509 "github.com/google/certificate-transparency-go/x509" "github.com/google/certificate-transparency-go/x509util" - "github.com/sigstore/cosign/cmd/cosign/cli/fulcio/fulcioverifier/ctutil" + "github.com/sigstore/policy-controller/cmd/cosign/cli/fulcio/fulcioverifier/ctutil" - "github.com/sigstore/cosign/pkg/cosign/tuf" + "github.com/sigstore/policy-controller/pkg/cosign/tuf" "github.com/sigstore/sigstore/pkg/cryptoutils" ) diff --git a/cmd/cosign/cli/fulcio/fulcioverifier/fulcioverifier.go b/cmd/cosign/cli/fulcio/fulcioverifier/fulcioverifier.go index 0c8f8ccb7..be134583e 100644 --- a/cmd/cosign/cli/fulcio/fulcioverifier/fulcioverifier.go +++ b/cmd/cosign/cli/fulcio/fulcioverifier/fulcioverifier.go @@ -20,9 +20,9 @@ import ( "fmt" "os" - "github.com/sigstore/cosign/cmd/cosign/cli/fulcio" - "github.com/sigstore/cosign/cmd/cosign/cli/fulcio/fulcioverifier/ctl" - "github.com/sigstore/cosign/cmd/cosign/cli/options" + "github.com/sigstore/policy-controller/cmd/cosign/cli/fulcio" + "github.com/sigstore/policy-controller/cmd/cosign/cli/fulcio/fulcioverifier/ctl" + "github.com/sigstore/policy-controller/cmd/cosign/cli/options" ) func NewSigner(ctx context.Context, ko options.KeyOpts) (*fulcio.Signer, error) { diff --git a/cmd/cosign/cli/generate.go b/cmd/cosign/cli/generate.go index 85a7a78c7..007bda215 100644 --- a/cmd/cosign/cli/generate.go +++ b/cmd/cosign/cli/generate.go @@ -18,8 +18,8 @@ package cli import ( "github.com/spf13/cobra" - "github.com/sigstore/cosign/cmd/cosign/cli/generate" - "github.com/sigstore/cosign/cmd/cosign/cli/options" + "github.com/sigstore/policy-controller/cmd/cosign/cli/generate" + "github.com/sigstore/policy-controller/cmd/cosign/cli/options" ) func Generate() *cobra.Command { diff --git a/cmd/cosign/cli/generate/generate.go b/cmd/cosign/cli/generate/generate.go index 3ad6f29ee..fe678ff16 100644 --- a/cmd/cosign/cli/generate/generate.go +++ b/cmd/cosign/cli/generate/generate.go @@ -21,8 +21,8 @@ import ( "io" "github.com/google/go-containerregistry/pkg/name" - "github.com/sigstore/cosign/cmd/cosign/cli/options" - ociremote "github.com/sigstore/cosign/pkg/oci/remote" + "github.com/sigstore/policy-controller/cmd/cosign/cli/options" + ociremote "github.com/sigstore/policy-controller/pkg/oci/remote" "github.com/sigstore/sigstore/pkg/signature/payload" ) diff --git a/cmd/cosign/cli/generate/generate_key_pair.go b/cmd/cosign/cli/generate/generate_key_pair.go index 95f373e8b..f0787ec1a 100644 --- a/cmd/cosign/cli/generate/generate_key_pair.go +++ b/cmd/cosign/cli/generate/generate_key_pair.go @@ -24,12 +24,12 @@ import ( "os" "strings" - "github.com/sigstore/cosign/pkg/cosign/git" - "github.com/sigstore/cosign/pkg/cosign/git/github" - "github.com/sigstore/cosign/pkg/cosign/git/gitlab" + "github.com/sigstore/policy-controller/pkg/cosign/git" + "github.com/sigstore/policy-controller/pkg/cosign/git/github" + "github.com/sigstore/policy-controller/pkg/cosign/git/gitlab" - "github.com/sigstore/cosign/pkg/cosign" - "github.com/sigstore/cosign/pkg/cosign/kubernetes" + "github.com/sigstore/policy-controller/pkg/cosign" + "github.com/sigstore/policy-controller/pkg/cosign/kubernetes" "github.com/sigstore/sigstore/pkg/cryptoutils" "github.com/sigstore/sigstore/pkg/signature/kms" ) diff --git a/cmd/cosign/cli/generate_key_pair.go b/cmd/cosign/cli/generate_key_pair.go index 6366f697b..70b069e68 100644 --- a/cmd/cosign/cli/generate_key_pair.go +++ b/cmd/cosign/cli/generate_key_pair.go @@ -18,8 +18,8 @@ package cli import ( "github.com/spf13/cobra" - "github.com/sigstore/cosign/cmd/cosign/cli/generate" - "github.com/sigstore/cosign/cmd/cosign/cli/options" + "github.com/sigstore/policy-controller/cmd/cosign/cli/generate" + "github.com/sigstore/policy-controller/cmd/cosign/cli/options" ) func GenerateKeyPair() *cobra.Command { diff --git a/cmd/cosign/cli/import_key_pair.go b/cmd/cosign/cli/import_key_pair.go index 7c5a017ee..5fb324dd1 100644 --- a/cmd/cosign/cli/import_key_pair.go +++ b/cmd/cosign/cli/import_key_pair.go @@ -18,8 +18,8 @@ package cli import ( "github.com/spf13/cobra" - "github.com/sigstore/cosign/cmd/cosign/cli/importkeypair" - "github.com/sigstore/cosign/cmd/cosign/cli/options" + "github.com/sigstore/policy-controller/cmd/cosign/cli/importkeypair" + "github.com/sigstore/policy-controller/cmd/cosign/cli/options" ) func ImportKeyPair() *cobra.Command { diff --git a/cmd/cosign/cli/importkeypair/import_key_pair.go b/cmd/cosign/cli/importkeypair/import_key_pair.go index 6d74eef5d..66c462ef6 100644 --- a/cmd/cosign/cli/importkeypair/import_key_pair.go +++ b/cmd/cosign/cli/importkeypair/import_key_pair.go @@ -21,7 +21,7 @@ import ( "io" "os" - "github.com/sigstore/cosign/pkg/cosign" + "github.com/sigstore/policy-controller/pkg/cosign" ) var ( diff --git a/cmd/cosign/cli/initialize.go b/cmd/cosign/cli/initialize.go index 89e9c7aff..f8c19859d 100644 --- a/cmd/cosign/cli/initialize.go +++ b/cmd/cosign/cli/initialize.go @@ -16,10 +16,10 @@ package cli import ( - "github.com/sigstore/cosign/cmd/cosign/cli/initialize" + "github.com/sigstore/policy-controller/cmd/cosign/cli/initialize" "github.com/spf13/cobra" - "github.com/sigstore/cosign/cmd/cosign/cli/options" + "github.com/sigstore/policy-controller/cmd/cosign/cli/options" ) func Initialize() *cobra.Command { diff --git a/cmd/cosign/cli/initialize/init.go b/cmd/cosign/cli/initialize/init.go index d9a4d1e62..5d838ffe8 100644 --- a/cmd/cosign/cli/initialize/init.go +++ b/cmd/cosign/cli/initialize/init.go @@ -21,8 +21,8 @@ import ( "encoding/json" "fmt" - "github.com/sigstore/cosign/pkg/blob" - "github.com/sigstore/cosign/pkg/cosign/tuf" + "github.com/sigstore/policy-controller/pkg/blob" + "github.com/sigstore/policy-controller/pkg/cosign/tuf" ) func DoInitialize(ctx context.Context, root, mirror string) error { diff --git a/cmd/cosign/cli/load.go b/cmd/cosign/cli/load.go index 26c8b1ecb..3293b19d0 100644 --- a/cmd/cosign/cli/load.go +++ b/cmd/cosign/cli/load.go @@ -20,9 +20,9 @@ import ( "fmt" "github.com/google/go-containerregistry/pkg/name" - "github.com/sigstore/cosign/cmd/cosign/cli/options" - "github.com/sigstore/cosign/pkg/oci/layout" - "github.com/sigstore/cosign/pkg/oci/remote" + "github.com/sigstore/policy-controller/cmd/cosign/cli/options" + "github.com/sigstore/policy-controller/pkg/oci/layout" + "github.com/sigstore/policy-controller/pkg/oci/remote" "github.com/spf13/cobra" ) diff --git a/cmd/cosign/cli/manifest.go b/cmd/cosign/cli/manifest.go index 5854065f4..4dd16b6fe 100644 --- a/cmd/cosign/cli/manifest.go +++ b/cmd/cosign/cli/manifest.go @@ -16,11 +16,11 @@ package cli import ( - "github.com/sigstore/cosign/cmd/cosign/cli/manifest" - "github.com/sigstore/cosign/cmd/cosign/cli/verify" + "github.com/sigstore/policy-controller/cmd/cosign/cli/manifest" + "github.com/sigstore/policy-controller/cmd/cosign/cli/verify" "github.com/spf13/cobra" - "github.com/sigstore/cosign/cmd/cosign/cli/options" + "github.com/sigstore/policy-controller/cmd/cosign/cli/options" ) func Manifest() *cobra.Command { diff --git a/cmd/cosign/cli/manifest/verify.go b/cmd/cosign/cli/manifest/verify.go index 3129918cd..6a6171400 100644 --- a/cmd/cosign/cli/manifest/verify.go +++ b/cmd/cosign/cli/manifest/verify.go @@ -27,7 +27,7 @@ import ( "k8s.io/apimachinery/pkg/util/yaml" - "github.com/sigstore/cosign/cmd/cosign/cli/verify" + "github.com/sigstore/policy-controller/cmd/cosign/cli/verify" ) // VerifyManifestCommand verifies all image signatures on a supplied k8s resource diff --git a/cmd/cosign/cli/options/annotations.go b/cmd/cosign/cli/options/annotations.go index bb6f72ef5..17b49b4f9 100644 --- a/cmd/cosign/cli/options/annotations.go +++ b/cmd/cosign/cli/options/annotations.go @@ -21,7 +21,7 @@ import ( "github.com/spf13/cobra" - sigs "github.com/sigstore/cosign/pkg/signature" + sigs "github.com/sigstore/policy-controller/pkg/signature" ) // AnnotationOptions is the top level wrapper for the annotations. diff --git a/cmd/cosign/cli/options/annotations_test.go b/cmd/cosign/cli/options/annotations_test.go index f64e7af24..8ee74e040 100644 --- a/cmd/cosign/cli/options/annotations_test.go +++ b/cmd/cosign/cli/options/annotations_test.go @@ -20,7 +20,7 @@ import ( "github.com/google/go-cmp/cmp" - "github.com/sigstore/cosign/pkg/signature" + "github.com/sigstore/policy-controller/pkg/signature" ) func TestAnnotationOptions_AnnotationsMap(t *testing.T) { diff --git a/cmd/cosign/cli/options/attach.go b/cmd/cosign/cli/options/attach.go index a5146f023..1ad32c648 100644 --- a/cmd/cosign/cli/options/attach.go +++ b/cmd/cosign/cli/options/attach.go @@ -22,7 +22,7 @@ import ( "github.com/google/go-containerregistry/pkg/v1/types" "github.com/spf13/cobra" - ctypes "github.com/sigstore/cosign/pkg/types" + ctypes "github.com/sigstore/policy-controller/pkg/types" ) // AttachSignatureOptions is the top level wrapper for the attach signature command. diff --git a/cmd/cosign/cli/options/files.go b/cmd/cosign/cli/options/files.go index 5dda2572f..b0969cac9 100644 --- a/cmd/cosign/cli/options/files.go +++ b/cmd/cosign/cli/options/files.go @@ -21,7 +21,7 @@ import ( "github.com/spf13/cobra" - cremote "github.com/sigstore/cosign/pkg/cosign/remote" + cremote "github.com/sigstore/policy-controller/pkg/cosign/remote" ) // FilesOptions is the wrapper for the files. diff --git a/cmd/cosign/cli/options/initialize.go b/cmd/cosign/cli/options/initialize.go index 6c2aa744b..8b3c05016 100644 --- a/cmd/cosign/cli/options/initialize.go +++ b/cmd/cosign/cli/options/initialize.go @@ -16,7 +16,7 @@ package options import ( - "github.com/sigstore/cosign/pkg/cosign/tuf" + "github.com/sigstore/policy-controller/pkg/cosign/tuf" "github.com/spf13/cobra" ) diff --git a/cmd/cosign/cli/options/key.go b/cmd/cosign/cli/options/key.go index 55edca285..3a77d0e05 100644 --- a/cmd/cosign/cli/options/key.go +++ b/cmd/cosign/cli/options/key.go @@ -15,7 +15,7 @@ package options -import "github.com/sigstore/cosign/pkg/cosign" +import "github.com/sigstore/policy-controller/pkg/cosign" type KeyOpts struct { Sk bool @@ -32,7 +32,7 @@ type KeyOpts struct { OIDCDisableProviders bool // Disable OIDC credential providers in keyless signer BundlePath string // FulcioAuthFlow is the auth flow to use when authenticating against - // Fulcio. See https://pkg.go.dev/github.com/sigstore/cosign/cmd/cosign/cli/fulcio#pkg-constants + // Fulcio. See https://pkg.go.dev/github.com/sigstore/policy-controller/cmd/cosign/cli/fulcio#pkg-constants // for valid values. FulcioAuthFlow string diff --git a/cmd/cosign/cli/options/predicate.go b/cmd/cosign/cli/options/predicate.go index 691de3d1e..8048f8921 100644 --- a/cmd/cosign/cli/options/predicate.go +++ b/cmd/cosign/cli/options/predicate.go @@ -24,7 +24,7 @@ import ( "github.com/in-toto/in-toto-golang/in_toto" "github.com/spf13/cobra" - "github.com/sigstore/cosign/pkg/cosign/attestation" + "github.com/sigstore/policy-controller/pkg/cosign/attestation" ) const ( diff --git a/cmd/cosign/cli/options/registry.go b/cmd/cosign/cli/options/registry.go index 0fcb750e7..69b181c5b 100644 --- a/cmd/cosign/cli/options/registry.go +++ b/cmd/cosign/cli/options/registry.go @@ -27,7 +27,7 @@ import ( "github.com/google/go-containerregistry/pkg/name" "github.com/google/go-containerregistry/pkg/v1/google" "github.com/google/go-containerregistry/pkg/v1/remote" - ociremote "github.com/sigstore/cosign/pkg/oci/remote" + ociremote "github.com/sigstore/policy-controller/pkg/oci/remote" "github.com/spf13/cobra" ) diff --git a/cmd/cosign/cli/piv_tool.go b/cmd/cosign/cli/piv_tool.go index 1989fb48c..33e3f9bb5 100644 --- a/cmd/cosign/cli/piv_tool.go +++ b/cmd/cosign/cli/piv_tool.go @@ -22,8 +22,8 @@ import ( "github.com/spf13/cobra" - "github.com/sigstore/cosign/cmd/cosign/cli/options" - "github.com/sigstore/cosign/cmd/cosign/cli/pivcli" + "github.com/sigstore/policy-controller/cmd/cosign/cli/options" + "github.com/sigstore/policy-controller/cmd/cosign/cli/pivcli" ) var pivToolForce bool diff --git a/cmd/cosign/cli/pivcli/commands.go b/cmd/cosign/cli/pivcli/commands.go index 8b2c2a13a..a3dd3a05b 100644 --- a/cmd/cosign/cli/pivcli/commands.go +++ b/cmd/cosign/cli/pivcli/commands.go @@ -32,7 +32,7 @@ import ( "github.com/go-piv/piv-go/piv" "github.com/manifoldco/promptui" - "github.com/sigstore/cosign/pkg/cosign/pivkey" + "github.com/sigstore/policy-controller/pkg/cosign/pivkey" ) func SetManagementKeyCmd(_ context.Context, oldKey, newKey string, randomKey bool) error { diff --git a/cmd/cosign/cli/pkcs11_tool.go b/cmd/cosign/cli/pkcs11_tool.go index 42733e534..618d85d7d 100644 --- a/cmd/cosign/cli/pkcs11_tool.go +++ b/cmd/cosign/cli/pkcs11_tool.go @@ -20,8 +20,8 @@ package cli import ( "github.com/spf13/cobra" - "github.com/sigstore/cosign/cmd/cosign/cli/options" - "github.com/sigstore/cosign/cmd/cosign/cli/pkcs11cli" + "github.com/sigstore/policy-controller/cmd/cosign/cli/options" + "github.com/sigstore/policy-controller/cmd/cosign/cli/pkcs11cli" ) var pkcs11ToolForce bool diff --git a/cmd/cosign/cli/pkcs11cli/commands.go b/cmd/cosign/cli/pkcs11cli/commands.go index 76193afd2..14b306daf 100644 --- a/cmd/cosign/cli/pkcs11cli/commands.go +++ b/cmd/cosign/cli/pkcs11cli/commands.go @@ -28,7 +28,7 @@ import ( "syscall" "github.com/miekg/pkcs11" - "github.com/sigstore/cosign/pkg/cosign/pkcs11key" + "github.com/sigstore/policy-controller/pkg/cosign/pkcs11key" "golang.org/x/term" ) diff --git a/cmd/cosign/cli/policy_init.go b/cmd/cosign/cli/policy_init.go index a4ab37108..1e5d3b96a 100644 --- a/cmd/cosign/cli/policy_init.go +++ b/cmd/cosign/cli/policy_init.go @@ -32,17 +32,17 @@ import ( "github.com/google/go-containerregistry/pkg/authn" "github.com/google/go-containerregistry/pkg/name" "github.com/google/go-containerregistry/pkg/v1/remote" - "github.com/sigstore/cosign/cmd/cosign/cli/options" - "github.com/sigstore/cosign/cmd/cosign/cli/rekor" - "github.com/sigstore/cosign/cmd/cosign/cli/sign" - "github.com/sigstore/cosign/cmd/cosign/cli/upload" + "github.com/sigstore/policy-controller/cmd/cosign/cli/options" + "github.com/sigstore/policy-controller/cmd/cosign/cli/rekor" + "github.com/sigstore/policy-controller/cmd/cosign/cli/sign" + "github.com/sigstore/policy-controller/cmd/cosign/cli/upload" "github.com/sigstore/sigstore/pkg/cryptoutils" - "github.com/sigstore/cosign/pkg/cosign" - cremote "github.com/sigstore/cosign/pkg/cosign/remote" - "github.com/sigstore/cosign/pkg/cosign/tuf" - "github.com/sigstore/cosign/pkg/sget" - sigs "github.com/sigstore/cosign/pkg/signature" + "github.com/sigstore/policy-controller/pkg/cosign" + cremote "github.com/sigstore/policy-controller/pkg/cosign/remote" + "github.com/sigstore/policy-controller/pkg/cosign/tuf" + "github.com/sigstore/policy-controller/pkg/sget" + sigs "github.com/sigstore/policy-controller/pkg/signature" signatureoptions "github.com/sigstore/sigstore/pkg/signature/options" "github.com/spf13/cobra" ) diff --git a/cmd/cosign/cli/public_key.go b/cmd/cosign/cli/public_key.go index e539d179a..261051bc1 100644 --- a/cmd/cosign/cli/public_key.go +++ b/cmd/cosign/cli/public_key.go @@ -20,9 +20,9 @@ import ( "github.com/spf13/cobra" - "github.com/sigstore/cosign/cmd/cosign/cli/generate" - "github.com/sigstore/cosign/cmd/cosign/cli/options" - "github.com/sigstore/cosign/cmd/cosign/cli/publickey" + "github.com/sigstore/policy-controller/cmd/cosign/cli/generate" + "github.com/sigstore/policy-controller/cmd/cosign/cli/options" + "github.com/sigstore/policy-controller/cmd/cosign/cli/publickey" ) func PublicKey() *cobra.Command { diff --git a/cmd/cosign/cli/publickey/public_key.go b/cmd/cosign/cli/publickey/public_key.go index 164b2a819..9190d3d41 100644 --- a/cmd/cosign/cli/publickey/public_key.go +++ b/cmd/cosign/cli/publickey/public_key.go @@ -21,10 +21,10 @@ import ( "io" "os" - "github.com/sigstore/cosign/pkg/cosign" - "github.com/sigstore/cosign/pkg/cosign/pivkey" - "github.com/sigstore/cosign/pkg/cosign/pkcs11key" - sigs "github.com/sigstore/cosign/pkg/signature" + "github.com/sigstore/policy-controller/pkg/cosign" + "github.com/sigstore/policy-controller/pkg/cosign/pivkey" + "github.com/sigstore/policy-controller/pkg/cosign/pkcs11key" + sigs "github.com/sigstore/policy-controller/pkg/signature" "github.com/sigstore/sigstore/pkg/signature" signatureoptions "github.com/sigstore/sigstore/pkg/signature/options" ) diff --git a/cmd/cosign/cli/publickey/public_key_test.go b/cmd/cosign/cli/publickey/public_key_test.go index 367060dc4..29df3b867 100644 --- a/cmd/cosign/cli/publickey/public_key_test.go +++ b/cmd/cosign/cli/publickey/public_key_test.go @@ -23,7 +23,7 @@ import ( "path/filepath" "testing" - "github.com/sigstore/cosign/pkg/cosign" + "github.com/sigstore/policy-controller/pkg/cosign" ) func pass(s string) cosign.PassFunc { diff --git a/cmd/cosign/cli/rekor/rekor.go b/cmd/cosign/cli/rekor/rekor.go index 5742b0d4b..eed03fa7a 100644 --- a/cmd/cosign/cli/rekor/rekor.go +++ b/cmd/cosign/cli/rekor/rekor.go @@ -18,7 +18,7 @@ import ( rekor "github.com/sigstore/rekor/pkg/client" "github.com/sigstore/rekor/pkg/generated/client" - "github.com/sigstore/cosign/cmd/cosign/cli/options" + "github.com/sigstore/policy-controller/cmd/cosign/cli/options" ) func NewClient(rekorURL string) (*client.Rekor, error) { diff --git a/cmd/cosign/cli/rekor/rekor_test.go b/cmd/cosign/cli/rekor/rekor_test.go index 104ffffda..398171f6a 100644 --- a/cmd/cosign/cli/rekor/rekor_test.go +++ b/cmd/cosign/cli/rekor/rekor_test.go @@ -19,7 +19,7 @@ import ( "net/http/httptest" "testing" - "github.com/sigstore/cosign/cmd/cosign/cli/options" + "github.com/sigstore/policy-controller/cmd/cosign/cli/options" ) func TestNewClient(t *testing.T) { diff --git a/cmd/cosign/cli/save.go b/cmd/cosign/cli/save.go index e72f8688c..ad9477f0a 100644 --- a/cmd/cosign/cli/save.go +++ b/cmd/cosign/cli/save.go @@ -21,10 +21,10 @@ import ( "fmt" "github.com/google/go-containerregistry/pkg/name" - "github.com/sigstore/cosign/cmd/cosign/cli/options" - "github.com/sigstore/cosign/pkg/oci" - "github.com/sigstore/cosign/pkg/oci/layout" - ociremote "github.com/sigstore/cosign/pkg/oci/remote" + "github.com/sigstore/policy-controller/cmd/cosign/cli/options" + "github.com/sigstore/policy-controller/pkg/oci" + "github.com/sigstore/policy-controller/pkg/oci/layout" + ociremote "github.com/sigstore/policy-controller/pkg/oci/remote" "github.com/spf13/cobra" ) diff --git a/cmd/cosign/cli/sign.go b/cmd/cosign/cli/sign.go index f9355b289..1934f8145 100644 --- a/cmd/cosign/cli/sign.go +++ b/cmd/cosign/cli/sign.go @@ -21,9 +21,9 @@ import ( "github.com/spf13/cobra" - "github.com/sigstore/cosign/cmd/cosign/cli/generate" - "github.com/sigstore/cosign/cmd/cosign/cli/options" - "github.com/sigstore/cosign/cmd/cosign/cli/sign" + "github.com/sigstore/policy-controller/cmd/cosign/cli/generate" + "github.com/sigstore/policy-controller/cmd/cosign/cli/options" + "github.com/sigstore/policy-controller/cmd/cosign/cli/sign" ) func Sign() *cobra.Command { diff --git a/cmd/cosign/cli/sign/sign.go b/cmd/cosign/cli/sign/sign.go index 43aa11dfa..37efe093a 100644 --- a/cmd/cosign/cli/sign/sign.go +++ b/cmd/cosign/cli/sign/sign.go @@ -30,31 +30,31 @@ import ( v1 "github.com/google/go-containerregistry/pkg/v1" "github.com/google/go-containerregistry/pkg/v1/remote" - "github.com/sigstore/cosign/cmd/cosign/cli/fulcio" - "github.com/sigstore/cosign/cmd/cosign/cli/fulcio/fulcioverifier" - "github.com/sigstore/cosign/cmd/cosign/cli/fulcio/fulcioverifier/ctl" - "github.com/sigstore/cosign/cmd/cosign/cli/options" - "github.com/sigstore/cosign/cmd/cosign/cli/rekor" - icos "github.com/sigstore/cosign/internal/pkg/cosign" - ifulcio "github.com/sigstore/cosign/internal/pkg/cosign/fulcio" - ipayload "github.com/sigstore/cosign/internal/pkg/cosign/payload" - irekor "github.com/sigstore/cosign/internal/pkg/cosign/rekor" - "github.com/sigstore/cosign/pkg/cosign" - "github.com/sigstore/cosign/pkg/cosign/pivkey" - "github.com/sigstore/cosign/pkg/cosign/pkcs11key" - cremote "github.com/sigstore/cosign/pkg/cosign/remote" - "github.com/sigstore/cosign/pkg/oci" - "github.com/sigstore/cosign/pkg/oci/mutate" - ociremote "github.com/sigstore/cosign/pkg/oci/remote" - "github.com/sigstore/cosign/pkg/oci/walk" - sigs "github.com/sigstore/cosign/pkg/signature" + "github.com/sigstore/policy-controller/cmd/cosign/cli/fulcio" + "github.com/sigstore/policy-controller/cmd/cosign/cli/fulcio/fulcioverifier" + "github.com/sigstore/policy-controller/cmd/cosign/cli/fulcio/fulcioverifier/ctl" + "github.com/sigstore/policy-controller/cmd/cosign/cli/options" + "github.com/sigstore/policy-controller/cmd/cosign/cli/rekor" + icos "github.com/sigstore/policy-controller/internal/pkg/cosign" + ifulcio "github.com/sigstore/policy-controller/internal/pkg/cosign/fulcio" + ipayload "github.com/sigstore/policy-controller/internal/pkg/cosign/payload" + irekor "github.com/sigstore/policy-controller/internal/pkg/cosign/rekor" + "github.com/sigstore/policy-controller/pkg/cosign" + "github.com/sigstore/policy-controller/pkg/cosign/pivkey" + "github.com/sigstore/policy-controller/pkg/cosign/pkcs11key" + cremote "github.com/sigstore/policy-controller/pkg/cosign/remote" + "github.com/sigstore/policy-controller/pkg/oci" + "github.com/sigstore/policy-controller/pkg/oci/mutate" + ociremote "github.com/sigstore/policy-controller/pkg/oci/remote" + "github.com/sigstore/policy-controller/pkg/oci/walk" + sigs "github.com/sigstore/policy-controller/pkg/signature" "github.com/sigstore/sigstore/pkg/cryptoutils" "github.com/sigstore/sigstore/pkg/signature" signatureoptions "github.com/sigstore/sigstore/pkg/signature/options" sigPayload "github.com/sigstore/sigstore/pkg/signature/payload" // Loads OIDC providers - _ "github.com/sigstore/cosign/pkg/providers/all" + _ "github.com/sigstore/policy-controller/pkg/providers/all" ) func ShouldUploadToTlog(ctx context.Context, ref name.Reference, force bool, url string) bool { diff --git a/cmd/cosign/cli/sign/sign_blob.go b/cmd/cosign/cli/sign/sign_blob.go index f623613c7..8d71c172e 100644 --- a/cmd/cosign/cli/sign/sign_blob.go +++ b/cmd/cosign/cli/sign/sign_blob.go @@ -25,11 +25,11 @@ import ( "os" "path/filepath" - cbundle "github.com/sigstore/cosign/pkg/cosign/bundle" + cbundle "github.com/sigstore/policy-controller/pkg/cosign/bundle" - "github.com/sigstore/cosign/cmd/cosign/cli/options" - "github.com/sigstore/cosign/cmd/cosign/cli/rekor" - "github.com/sigstore/cosign/pkg/cosign" + "github.com/sigstore/policy-controller/cmd/cosign/cli/options" + "github.com/sigstore/policy-controller/cmd/cosign/cli/rekor" + "github.com/sigstore/policy-controller/pkg/cosign" signatureoptions "github.com/sigstore/sigstore/pkg/signature/options" ) diff --git a/cmd/cosign/cli/sign/sign_test.go b/cmd/cosign/cli/sign/sign_test.go index bc0eabcf8..41e043106 100644 --- a/cmd/cosign/cli/sign/sign_test.go +++ b/cmd/cosign/cli/sign/sign_test.go @@ -26,10 +26,10 @@ import ( "strings" "testing" - "github.com/sigstore/cosign/cmd/cosign/cli/generate" - "github.com/sigstore/cosign/cmd/cosign/cli/options" - "github.com/sigstore/cosign/pkg/cosign" - "github.com/sigstore/cosign/test" + "github.com/sigstore/policy-controller/cmd/cosign/cli/generate" + "github.com/sigstore/policy-controller/cmd/cosign/cli/options" + "github.com/sigstore/policy-controller/pkg/cosign" + "github.com/sigstore/policy-controller/test" "github.com/sigstore/sigstore/pkg/cryptoutils" "github.com/theupdateframework/go-tuf/encrypted" ) diff --git a/cmd/cosign/cli/signblob.go b/cmd/cosign/cli/signblob.go index e6bea6d19..3ed0c35fa 100644 --- a/cmd/cosign/cli/signblob.go +++ b/cmd/cosign/cli/signblob.go @@ -19,9 +19,9 @@ import ( "fmt" "os" - "github.com/sigstore/cosign/cmd/cosign/cli/generate" - "github.com/sigstore/cosign/cmd/cosign/cli/options" - "github.com/sigstore/cosign/cmd/cosign/cli/sign" + "github.com/sigstore/policy-controller/cmd/cosign/cli/generate" + "github.com/sigstore/policy-controller/cmd/cosign/cli/options" + "github.com/sigstore/policy-controller/cmd/cosign/cli/sign" "github.com/spf13/cobra" "github.com/spf13/viper" ) diff --git a/cmd/cosign/cli/tree.go b/cmd/cosign/cli/tree.go index 27b9baed5..1e00b2683 100644 --- a/cmd/cosign/cli/tree.go +++ b/cmd/cosign/cli/tree.go @@ -25,8 +25,8 @@ import ( "github.com/google/go-containerregistry/pkg/name" "github.com/spf13/cobra" - "github.com/sigstore/cosign/cmd/cosign/cli/options" - ociremote "github.com/sigstore/cosign/pkg/oci/remote" + "github.com/sigstore/policy-controller/cmd/cosign/cli/options" + ociremote "github.com/sigstore/policy-controller/pkg/oci/remote" ) func Tree() *cobra.Command { diff --git a/cmd/cosign/cli/triangulate.go b/cmd/cosign/cli/triangulate.go index 6477e4f92..d1baef989 100644 --- a/cmd/cosign/cli/triangulate.go +++ b/cmd/cosign/cli/triangulate.go @@ -20,8 +20,8 @@ import ( "github.com/spf13/cobra" - "github.com/sigstore/cosign/cmd/cosign/cli/options" - "github.com/sigstore/cosign/cmd/cosign/cli/triangulate" + "github.com/sigstore/policy-controller/cmd/cosign/cli/options" + "github.com/sigstore/policy-controller/cmd/cosign/cli/triangulate" ) func Triangulate() *cobra.Command { diff --git a/cmd/cosign/cli/triangulate/triangulate.go b/cmd/cosign/cli/triangulate/triangulate.go index 00828575e..3c5b5acef 100644 --- a/cmd/cosign/cli/triangulate/triangulate.go +++ b/cmd/cosign/cli/triangulate/triangulate.go @@ -20,9 +20,9 @@ import ( "fmt" "github.com/google/go-containerregistry/pkg/name" - "github.com/sigstore/cosign/cmd/cosign/cli/options" - "github.com/sigstore/cosign/pkg/cosign" - ociremote "github.com/sigstore/cosign/pkg/oci/remote" + "github.com/sigstore/policy-controller/cmd/cosign/cli/options" + "github.com/sigstore/policy-controller/pkg/cosign" + ociremote "github.com/sigstore/policy-controller/pkg/oci/remote" ) func MungeCmd(ctx context.Context, regOpts options.RegistryOptions, imageRef string, attachmentType string) error { diff --git a/cmd/cosign/cli/upload.go b/cmd/cosign/cli/upload.go index 3c0c362f8..f72e6425d 100644 --- a/cmd/cosign/cli/upload.go +++ b/cmd/cosign/cli/upload.go @@ -20,8 +20,8 @@ import ( "github.com/spf13/cobra" - "github.com/sigstore/cosign/cmd/cosign/cli/options" - "github.com/sigstore/cosign/cmd/cosign/cli/upload" + "github.com/sigstore/policy-controller/cmd/cosign/cli/options" + "github.com/sigstore/policy-controller/cmd/cosign/cli/upload" ) func Upload() *cobra.Command { diff --git a/cmd/cosign/cli/upload/blob.go b/cmd/cosign/cli/upload/blob.go index 7580ba833..24566f479 100644 --- a/cmd/cosign/cli/upload/blob.go +++ b/cmd/cosign/cli/upload/blob.go @@ -24,8 +24,8 @@ import ( "github.com/google/go-containerregistry/pkg/name" "github.com/google/go-containerregistry/pkg/v1/types" - "github.com/sigstore/cosign/cmd/cosign/cli/options" - cremote "github.com/sigstore/cosign/pkg/cosign/remote" + "github.com/sigstore/policy-controller/cmd/cosign/cli/options" + cremote "github.com/sigstore/policy-controller/pkg/cosign/remote" ) func BlobCmd(ctx context.Context, regOpts options.RegistryOptions, files []cremote.File, contentType, imageRef string) error { diff --git a/cmd/cosign/cli/upload/wasm.go b/cmd/cosign/cli/upload/wasm.go index 12d3c24af..8e1600b33 100644 --- a/cmd/cosign/cli/upload/wasm.go +++ b/cmd/cosign/cli/upload/wasm.go @@ -22,9 +22,9 @@ import ( "github.com/google/go-containerregistry/pkg/name" "github.com/google/go-containerregistry/pkg/v1/remote" - "github.com/sigstore/cosign/cmd/cosign/cli/options" - "github.com/sigstore/cosign/pkg/oci/static" - "github.com/sigstore/cosign/pkg/types" + "github.com/sigstore/policy-controller/cmd/cosign/cli/options" + "github.com/sigstore/policy-controller/pkg/oci/static" + "github.com/sigstore/policy-controller/pkg/types" ) func WasmCmd(ctx context.Context, regOpts options.RegistryOptions, wasmPath, imageRef string) error { diff --git a/cmd/cosign/cli/verify.go b/cmd/cosign/cli/verify.go index 7a365cfd1..44f2c5da8 100644 --- a/cmd/cosign/cli/verify.go +++ b/cmd/cosign/cli/verify.go @@ -20,8 +20,8 @@ import ( "github.com/spf13/cobra" - "github.com/sigstore/cosign/cmd/cosign/cli/options" - "github.com/sigstore/cosign/cmd/cosign/cli/verify" + "github.com/sigstore/policy-controller/cmd/cosign/cli/options" + "github.com/sigstore/policy-controller/cmd/cosign/cli/verify" ) func Verify() *cobra.Command { diff --git a/cmd/cosign/cli/verify/verify.go b/cmd/cosign/cli/verify/verify.go index d4a5ffa22..bb75aaa42 100644 --- a/cmd/cosign/cli/verify/verify.go +++ b/cmd/cosign/cli/verify/verify.go @@ -29,16 +29,16 @@ import ( "github.com/google/go-containerregistry/pkg/name" - "github.com/sigstore/cosign/cmd/cosign/cli/fulcio" - "github.com/sigstore/cosign/cmd/cosign/cli/options" - "github.com/sigstore/cosign/cmd/cosign/cli/rekor" - "github.com/sigstore/cosign/cmd/cosign/cli/sign" - "github.com/sigstore/cosign/pkg/blob" - "github.com/sigstore/cosign/pkg/cosign" - "github.com/sigstore/cosign/pkg/cosign/pivkey" - "github.com/sigstore/cosign/pkg/cosign/pkcs11key" - "github.com/sigstore/cosign/pkg/oci" - sigs "github.com/sigstore/cosign/pkg/signature" + "github.com/sigstore/policy-controller/cmd/cosign/cli/fulcio" + "github.com/sigstore/policy-controller/cmd/cosign/cli/options" + "github.com/sigstore/policy-controller/cmd/cosign/cli/rekor" + "github.com/sigstore/policy-controller/cmd/cosign/cli/sign" + "github.com/sigstore/policy-controller/pkg/blob" + "github.com/sigstore/policy-controller/pkg/cosign" + "github.com/sigstore/policy-controller/pkg/cosign/pivkey" + "github.com/sigstore/policy-controller/pkg/cosign/pkcs11key" + "github.com/sigstore/policy-controller/pkg/oci" + sigs "github.com/sigstore/policy-controller/pkg/signature" "github.com/sigstore/sigstore/pkg/cryptoutils" "github.com/sigstore/sigstore/pkg/signature" "github.com/sigstore/sigstore/pkg/signature/payload" diff --git a/cmd/cosign/cli/verify/verify_attestation.go b/cmd/cosign/cli/verify/verify_attestation.go index b330fb860..d713de66f 100644 --- a/cmd/cosign/cli/verify/verify_attestation.go +++ b/cmd/cosign/cli/verify/verify_attestation.go @@ -25,19 +25,19 @@ import ( "path/filepath" "github.com/google/go-containerregistry/pkg/name" - "github.com/sigstore/cosign/pkg/cosign/pkcs11key" - "github.com/sigstore/cosign/pkg/cosign/rego" - "github.com/sigstore/cosign/pkg/oci" + "github.com/sigstore/policy-controller/pkg/cosign/pkcs11key" + "github.com/sigstore/policy-controller/pkg/cosign/rego" + "github.com/sigstore/policy-controller/pkg/oci" "github.com/sigstore/sigstore/pkg/signature" - "github.com/sigstore/cosign/cmd/cosign/cli/fulcio" - "github.com/sigstore/cosign/cmd/cosign/cli/options" - "github.com/sigstore/cosign/cmd/cosign/cli/rekor" - "github.com/sigstore/cosign/pkg/cosign" - "github.com/sigstore/cosign/pkg/cosign/cue" - "github.com/sigstore/cosign/pkg/cosign/pivkey" - "github.com/sigstore/cosign/pkg/policy" - sigs "github.com/sigstore/cosign/pkg/signature" + "github.com/sigstore/policy-controller/cmd/cosign/cli/fulcio" + "github.com/sigstore/policy-controller/cmd/cosign/cli/options" + "github.com/sigstore/policy-controller/cmd/cosign/cli/rekor" + "github.com/sigstore/policy-controller/pkg/cosign" + "github.com/sigstore/policy-controller/pkg/cosign/cue" + "github.com/sigstore/policy-controller/pkg/cosign/pivkey" + "github.com/sigstore/policy-controller/pkg/policy" + sigs "github.com/sigstore/policy-controller/pkg/signature" ) // VerifyAttestationCommand verifies a signature on a supplied container image diff --git a/cmd/cosign/cli/verify/verify_blob.go b/cmd/cosign/cli/verify/verify_blob.go index 1768be6e4..028e07d3c 100644 --- a/cmd/cosign/cli/verify/verify_blob.go +++ b/cmd/cosign/cli/verify/verify_blob.go @@ -32,17 +32,17 @@ import ( "github.com/go-openapi/runtime" ssldsse "github.com/secure-systems-lab/go-securesystemslib/dsse" - "github.com/sigstore/cosign/cmd/cosign/cli/fulcio" - "github.com/sigstore/cosign/cmd/cosign/cli/options" - "github.com/sigstore/cosign/cmd/cosign/cli/rekor" - "github.com/sigstore/cosign/pkg/blob" - "github.com/sigstore/cosign/pkg/cosign" - "github.com/sigstore/cosign/pkg/cosign/pivkey" - "github.com/sigstore/cosign/pkg/cosign/pkcs11key" - "github.com/sigstore/cosign/pkg/cosign/tuf" - sigs "github.com/sigstore/cosign/pkg/signature" - - ctypes "github.com/sigstore/cosign/pkg/types" + "github.com/sigstore/policy-controller/cmd/cosign/cli/fulcio" + "github.com/sigstore/policy-controller/cmd/cosign/cli/options" + "github.com/sigstore/policy-controller/cmd/cosign/cli/rekor" + "github.com/sigstore/policy-controller/pkg/blob" + "github.com/sigstore/policy-controller/pkg/cosign" + "github.com/sigstore/policy-controller/pkg/cosign/pivkey" + "github.com/sigstore/policy-controller/pkg/cosign/pkcs11key" + "github.com/sigstore/policy-controller/pkg/cosign/tuf" + sigs "github.com/sigstore/policy-controller/pkg/signature" + + ctypes "github.com/sigstore/policy-controller/pkg/types" "github.com/sigstore/rekor/pkg/generated/client" "github.com/sigstore/rekor/pkg/generated/models" "github.com/sigstore/rekor/pkg/types" diff --git a/cmd/cosign/cli/verify/verify_blob_test.go b/cmd/cosign/cli/verify/verify_blob_test.go index faef49ad6..1eaba3986 100644 --- a/cmd/cosign/cli/verify/verify_blob_test.go +++ b/cmd/cosign/cli/verify/verify_blob_test.go @@ -22,7 +22,7 @@ import ( "testing" "github.com/secure-systems-lab/go-securesystemslib/dsse" - "github.com/sigstore/cosign/pkg/cosign" + "github.com/sigstore/policy-controller/pkg/cosign" ) func TestSignaturesRef(t *testing.T) { diff --git a/cmd/cosign/main.go b/cmd/cosign/main.go index 00bb0b81e..27681ef87 100644 --- a/cmd/cosign/main.go +++ b/cmd/cosign/main.go @@ -20,7 +20,7 @@ import ( "os" "strings" - "github.com/sigstore/cosign/cmd/cosign/cli" + "github.com/sigstore/policy-controller/cmd/cosign/cli" // Register the provider-specific plugins _ "github.com/sigstore/sigstore/pkg/signature/kms/aws" diff --git a/cmd/cosign/policy_webhook/depcheck_test.go b/cmd/cosign/policy_webhook/depcheck_test.go index 397a710ba..f87fb6ee8 100644 --- a/cmd/cosign/policy_webhook/depcheck_test.go +++ b/cmd/cosign/policy_webhook/depcheck_test.go @@ -23,7 +23,7 @@ import ( func TestNoDeps(t *testing.T) { depcheck.AssertNoDependency(t, map[string][]string{ - "github.com/sigstore/cosign/cmd/cosign/policy_webhook": { + "github.com/sigstore/policy-controller/cmd/cosign/policy_webhook": { // This conflicts with klog, we error on startup about // `-log_dir` being defined multiple times. "github.com/golang/glog", diff --git a/cmd/cosign/policy_webhook/main.go b/cmd/cosign/policy_webhook/main.go index 82f54c4fb..1909e3f6a 100644 --- a/cmd/cosign/policy_webhook/main.go +++ b/cmd/cosign/policy_webhook/main.go @@ -33,10 +33,10 @@ import ( "knative.dev/pkg/webhook/resourcesemantics/validation" "sigs.k8s.io/release-utils/version" - "github.com/sigstore/cosign/pkg/apis/policy" - "github.com/sigstore/cosign/pkg/apis/policy/v1alpha1" - "github.com/sigstore/cosign/pkg/apis/policy/v1beta1" - "github.com/sigstore/cosign/pkg/reconciler/clusterimagepolicy" + "github.com/sigstore/policy-controller/pkg/apis/policy" + "github.com/sigstore/policy-controller/pkg/apis/policy/v1alpha1" + "github.com/sigstore/policy-controller/pkg/apis/policy/v1beta1" + "github.com/sigstore/policy-controller/pkg/reconciler/clusterimagepolicy" // Register the provider-specific plugins _ "github.com/sigstore/sigstore/pkg/signature/kms/aws" diff --git a/cmd/cosign/webhook/depcheck_test.go b/cmd/cosign/webhook/depcheck_test.go index 30f64db61..5e494cae5 100644 --- a/cmd/cosign/webhook/depcheck_test.go +++ b/cmd/cosign/webhook/depcheck_test.go @@ -23,7 +23,7 @@ import ( func TestNoDeps(t *testing.T) { depcheck.AssertNoDependency(t, map[string][]string{ - "github.com/sigstore/cosign/cmd/cosign/webhook": { + "github.com/sigstore/policy-controller/cmd/cosign/webhook": { // This conflicts with klog, we error on startup about // `-log_dir` being defined multiple times. "github.com/golang/glog", diff --git a/cmd/cosign/webhook/main.go b/cmd/cosign/webhook/main.go index 6de012148..371399f02 100644 --- a/cmd/cosign/webhook/main.go +++ b/cmd/cosign/webhook/main.go @@ -38,8 +38,8 @@ import ( "knative.dev/pkg/webhook/resourcesemantics/validation" "sigs.k8s.io/release-utils/version" - "github.com/sigstore/cosign/pkg/apis/config" - cwebhook "github.com/sigstore/cosign/pkg/cosign/kubernetes/webhook" + "github.com/sigstore/policy-controller/pkg/apis/config" + cwebhook "github.com/sigstore/policy-controller/pkg/cosign/kubernetes/webhook" ) var secretName = flag.String("secret-name", "", "The name of the secret in the webhook's namespace that holds the public key for verification.") diff --git a/cmd/fig/fig.go b/cmd/fig/fig.go index cc5eead4f..dd666e789 100644 --- a/cmd/fig/fig.go +++ b/cmd/fig/fig.go @@ -17,7 +17,7 @@ package main import ( "fmt" - "github.com/sigstore/cosign/cmd/cosign/cli" + "github.com/sigstore/policy-controller/cmd/cosign/cli" genFigSpec "github.com/withfig/autocomplete-tools/packages/cobra" ) diff --git a/cmd/help/main.go b/cmd/help/main.go index a3f059356..233d6b5e9 100644 --- a/cmd/help/main.go +++ b/cmd/help/main.go @@ -18,7 +18,7 @@ import ( "fmt" "os" - "github.com/sigstore/cosign/cmd/cosign/cli" + "github.com/sigstore/policy-controller/cmd/cosign/cli" "github.com/spf13/cobra" "github.com/spf13/cobra/doc" ) diff --git a/cmd/schema/main.go b/cmd/schema/main.go index 62bcaf88d..8fec65291 100644 --- a/cmd/schema/main.go +++ b/cmd/schema/main.go @@ -20,14 +20,14 @@ import ( "knative.dev/hack/schema/commands" "knative.dev/hack/schema/registry" - v1alpha1 "github.com/sigstore/cosign/pkg/apis/policy/v1alpha1" + v1alpha1 "github.com/sigstore/policy-controller/pkg/apis/policy/v1alpha1" ) // schema is a tool to dump the schema for Eventing resources. func main() { registry.Register(&v1alpha1.ClusterImagePolicy{}) - if err := commands.New("github.com/sigstore/cosign").Execute(); err != nil { + if err := commands.New("github.com/sigstore/policy-controller").Execute(); err != nil { log.Fatal("Error during command execution: ", err) } } diff --git a/cmd/sget/cli/commands.go b/cmd/sget/cli/commands.go index e0be33878..9c842e8ef 100644 --- a/cmd/sget/cli/commands.go +++ b/cmd/sget/cli/commands.go @@ -24,8 +24,8 @@ import ( "github.com/spf13/cobra" "sigs.k8s.io/release-utils/version" - "github.com/sigstore/cosign/cmd/sget/cli/options" - "github.com/sigstore/cosign/pkg/sget" + "github.com/sigstore/policy-controller/cmd/sget/cli/options" + "github.com/sigstore/policy-controller/pkg/sget" ) var ( diff --git a/cmd/sget/cli/options/root.go b/cmd/sget/cli/options/root.go index c3a51ad89..e6ae72ae4 100644 --- a/cmd/sget/cli/options/root.go +++ b/cmd/sget/cli/options/root.go @@ -16,7 +16,7 @@ package options import ( - "github.com/sigstore/cosign/cmd/cosign/cli/options" + "github.com/sigstore/policy-controller/cmd/cosign/cli/options" "github.com/spf13/cobra" ) diff --git a/cmd/sget/main.go b/cmd/sget/main.go index 7651d5cf6..546746859 100644 --- a/cmd/sget/main.go +++ b/cmd/sget/main.go @@ -21,7 +21,7 @@ import ( "os" "strings" - "github.com/sigstore/cosign/cmd/sget/cli" + "github.com/sigstore/policy-controller/cmd/sget/cli" // Register the provider-specific plugins _ "github.com/sigstore/sigstore/pkg/signature/kms/aws" diff --git a/go.mod b/go.mod index 7b176ddd1..843907a36 100644 --- a/go.mod +++ b/go.mod @@ -1,4 +1,4 @@ -module github.com/sigstore/cosign +module github.com/sigstore/policy-controller go 1.17 diff --git a/hack/update-codegen.sh b/hack/update-codegen.sh index d84243ffb..13b13164c 100755 --- a/hack/update-codegen.sh +++ b/hack/update-codegen.sh @@ -32,7 +32,7 @@ export GOMODCACHE=${GOPATH}/pkg/mod export GOPATH=${TMP_DIR} -TMP_REPO_PATH="${TMP_DIR}/src/github.com/sigstore/cosign" +TMP_REPO_PATH="${TMP_DIR}/src/github.com/sigstore/policy-controller" mkdir -p "$(dirname "${TMP_REPO_PATH}")" && ln -s "${REPO_ROOT_DIR}" "${TMP_REPO_PATH}" echo "=== Update Codegen for ${MODULE_NAME}" @@ -44,7 +44,7 @@ group "Kubernetes Codegen" # k8s.io/kubernetes. The output-base is needed for the generators to output into the vendor dir # instead of the $GOPATH directly. For normal projects this can be dropped. ${CODEGEN_PKG}/generate-groups.sh "deepcopy,client,informer,lister" \ - github.com/sigstore/cosign/pkg/client github.com/sigstore/cosign/pkg/apis \ + github.com/sigstore/policy-controller/pkg/client github.com/sigstore/policy-controller/pkg/apis \ "policy:v1alpha1 policy:v1beta1" \ --go-header-file ${REPO_ROOT_DIR}/hack/boilerplate/boilerplate.go.txt @@ -52,7 +52,7 @@ group "Knative Codegen" # Knative Injection ${KNATIVE_CODEGEN_PKG}/hack/generate-knative.sh "injection" \ - github.com/sigstore/cosign/pkg/client github.com/sigstore/cosign/pkg/apis \ + github.com/sigstore/policy-controller/pkg/client github.com/sigstore/policy-controller/pkg/apis \ "policy:v1alpha1 policy:v1beta1" \ --go-header-file ${REPO_ROOT_DIR}/hack/boilerplate/boilerplate.go.txt diff --git a/internal/pkg/cosign/dsse.go b/internal/pkg/cosign/dsse.go index f76f65469..b54e045d4 100644 --- a/internal/pkg/cosign/dsse.go +++ b/internal/pkg/cosign/dsse.go @@ -19,7 +19,7 @@ import ( "crypto" "io" - "github.com/sigstore/cosign/pkg/oci" + "github.com/sigstore/policy-controller/pkg/oci" ) // DSSEAttestor creates attestations in the form of `oci.Signature`s diff --git a/internal/pkg/cosign/ephemeral/signer.go b/internal/pkg/cosign/ephemeral/signer.go index d23c144c2..d40ae2bc1 100644 --- a/internal/pkg/cosign/ephemeral/signer.go +++ b/internal/pkg/cosign/ephemeral/signer.go @@ -22,10 +22,10 @@ import ( "fmt" "io" - icosign "github.com/sigstore/cosign/internal/pkg/cosign" - "github.com/sigstore/cosign/pkg/cosign" - "github.com/sigstore/cosign/pkg/oci" - "github.com/sigstore/cosign/pkg/oci/static" + icosign "github.com/sigstore/policy-controller/internal/pkg/cosign" + "github.com/sigstore/policy-controller/pkg/cosign" + "github.com/sigstore/policy-controller/pkg/oci" + "github.com/sigstore/policy-controller/pkg/oci/static" "github.com/sigstore/sigstore/pkg/signature" ) diff --git a/internal/pkg/cosign/fulcio/signer.go b/internal/pkg/cosign/fulcio/signer.go index 18ba60c08..a10ead8a3 100644 --- a/internal/pkg/cosign/fulcio/signer.go +++ b/internal/pkg/cosign/fulcio/signer.go @@ -19,9 +19,9 @@ import ( "crypto" "io" - "github.com/sigstore/cosign/internal/pkg/cosign" - "github.com/sigstore/cosign/pkg/oci" - "github.com/sigstore/cosign/pkg/oci/mutate" + "github.com/sigstore/policy-controller/internal/pkg/cosign" + "github.com/sigstore/policy-controller/pkg/oci" + "github.com/sigstore/policy-controller/pkg/oci/mutate" ) // signerWrapper still needs to actually upload keys to Fulcio and receive diff --git a/internal/pkg/cosign/fulcio/signer_test.go b/internal/pkg/cosign/fulcio/signer_test.go index 610723835..c562164e5 100644 --- a/internal/pkg/cosign/fulcio/signer_test.go +++ b/internal/pkg/cosign/fulcio/signer_test.go @@ -22,8 +22,8 @@ import ( "strings" "testing" - "github.com/sigstore/cosign/internal/pkg/cosign/payload" - "github.com/sigstore/cosign/pkg/cosign" + "github.com/sigstore/policy-controller/internal/pkg/cosign/payload" + "github.com/sigstore/policy-controller/pkg/cosign" "github.com/sigstore/sigstore/pkg/signature" ) diff --git a/internal/pkg/cosign/payload/attestor.go b/internal/pkg/cosign/payload/attestor.go index b2ce76135..b44afe14a 100644 --- a/internal/pkg/cosign/payload/attestor.go +++ b/internal/pkg/cosign/payload/attestor.go @@ -22,10 +22,10 @@ import ( "io" "github.com/secure-systems-lab/go-securesystemslib/dsse" - "github.com/sigstore/cosign/internal/pkg/cosign" - "github.com/sigstore/cosign/pkg/oci" - "github.com/sigstore/cosign/pkg/oci/static" - "github.com/sigstore/cosign/pkg/types" + "github.com/sigstore/policy-controller/internal/pkg/cosign" + "github.com/sigstore/policy-controller/pkg/oci" + "github.com/sigstore/policy-controller/pkg/oci/static" + "github.com/sigstore/policy-controller/pkg/types" "github.com/sigstore/sigstore/pkg/signature" ) diff --git a/internal/pkg/cosign/payload/attestor_test.go b/internal/pkg/cosign/payload/attestor_test.go index 97f6d3d19..c17a58d94 100644 --- a/internal/pkg/cosign/payload/attestor_test.go +++ b/internal/pkg/cosign/payload/attestor_test.go @@ -24,7 +24,7 @@ import ( "testing" "github.com/secure-systems-lab/go-securesystemslib/dsse" - "github.com/sigstore/cosign/pkg/types" + "github.com/sigstore/policy-controller/pkg/types" "github.com/sigstore/sigstore/pkg/signature" ) diff --git a/internal/pkg/cosign/payload/signer.go b/internal/pkg/cosign/payload/signer.go index e36abaa83..8e673e685 100644 --- a/internal/pkg/cosign/payload/signer.go +++ b/internal/pkg/cosign/payload/signer.go @@ -22,9 +22,9 @@ import ( "fmt" "io" - "github.com/sigstore/cosign/internal/pkg/cosign" - "github.com/sigstore/cosign/pkg/oci" - "github.com/sigstore/cosign/pkg/oci/static" + "github.com/sigstore/policy-controller/internal/pkg/cosign" + "github.com/sigstore/policy-controller/pkg/oci" + "github.com/sigstore/policy-controller/pkg/oci/static" "github.com/sigstore/sigstore/pkg/signature" signatureoptions "github.com/sigstore/sigstore/pkg/signature/options" ) diff --git a/internal/pkg/cosign/payload/signer_test.go b/internal/pkg/cosign/payload/signer_test.go index 72ed3407d..ec250f2d7 100644 --- a/internal/pkg/cosign/payload/signer_test.go +++ b/internal/pkg/cosign/payload/signer_test.go @@ -22,7 +22,7 @@ import ( "strings" "testing" - "github.com/sigstore/cosign/pkg/cosign" + "github.com/sigstore/policy-controller/pkg/cosign" "github.com/sigstore/sigstore/pkg/signature" ) diff --git a/internal/pkg/cosign/rekor/signer.go b/internal/pkg/cosign/rekor/signer.go index 9293797df..e1ef87bab 100644 --- a/internal/pkg/cosign/rekor/signer.go +++ b/internal/pkg/cosign/rekor/signer.go @@ -22,11 +22,11 @@ import ( "io" "os" - "github.com/sigstore/cosign/internal/pkg/cosign" - cosignv1 "github.com/sigstore/cosign/pkg/cosign" - cbundle "github.com/sigstore/cosign/pkg/cosign/bundle" - "github.com/sigstore/cosign/pkg/oci" - "github.com/sigstore/cosign/pkg/oci/mutate" + "github.com/sigstore/policy-controller/internal/pkg/cosign" + cosignv1 "github.com/sigstore/policy-controller/pkg/cosign" + cbundle "github.com/sigstore/policy-controller/pkg/cosign/bundle" + "github.com/sigstore/policy-controller/pkg/oci" + "github.com/sigstore/policy-controller/pkg/oci/mutate" "github.com/sigstore/rekor/pkg/generated/client" "github.com/sigstore/rekor/pkg/generated/models" diff --git a/internal/pkg/cosign/rekor/signer_test.go b/internal/pkg/cosign/rekor/signer_test.go index cb7057186..e19a56694 100644 --- a/internal/pkg/cosign/rekor/signer_test.go +++ b/internal/pkg/cosign/rekor/signer_test.go @@ -22,9 +22,9 @@ import ( "strings" "testing" - "github.com/sigstore/cosign/internal/pkg/cosign/payload" - "github.com/sigstore/cosign/internal/pkg/cosign/rekor/mock" - "github.com/sigstore/cosign/pkg/cosign" + "github.com/sigstore/policy-controller/internal/pkg/cosign/payload" + "github.com/sigstore/policy-controller/internal/pkg/cosign/rekor/mock" + "github.com/sigstore/policy-controller/pkg/cosign" "github.com/sigstore/rekor/pkg/generated/client" "github.com/sigstore/sigstore/pkg/signature" ) diff --git a/internal/pkg/cosign/sign.go b/internal/pkg/cosign/sign.go index da2f7ace0..78a59b241 100644 --- a/internal/pkg/cosign/sign.go +++ b/internal/pkg/cosign/sign.go @@ -19,7 +19,7 @@ import ( "crypto" "io" - "github.com/sigstore/cosign/pkg/oci" + "github.com/sigstore/policy-controller/pkg/oci" ) // Signer signs payloads in the form of `oci.Signature`s diff --git a/pkg/apis/config/image_policies.go b/pkg/apis/config/image_policies.go index 9f7a69481..68e288d97 100644 --- a/pkg/apis/config/image_policies.go +++ b/pkg/apis/config/image_policies.go @@ -20,7 +20,7 @@ import ( "errors" "fmt" - webhookcip "github.com/sigstore/cosign/pkg/cosign/kubernetes/webhook/clusterimagepolicy" + webhookcip "github.com/sigstore/policy-controller/pkg/cosign/kubernetes/webhook/clusterimagepolicy" corev1 "k8s.io/api/core/v1" "sigs.k8s.io/yaml" ) diff --git a/pkg/apis/config/image_policies_test.go b/pkg/apis/config/image_policies_test.go index 6e14b59a6..63b090c9e 100644 --- a/pkg/apis/config/image_policies_test.go +++ b/pkg/apis/config/image_policies_test.go @@ -21,7 +21,7 @@ import ( "strings" "testing" - webhookcip "github.com/sigstore/cosign/pkg/cosign/kubernetes/webhook/clusterimagepolicy" + webhookcip "github.com/sigstore/policy-controller/pkg/cosign/kubernetes/webhook/clusterimagepolicy" . "knative.dev/pkg/configmap/testing" _ "knative.dev/pkg/system/testing" ) diff --git a/pkg/apis/config/store_test.go b/pkg/apis/config/store_test.go index cfb163f72..9b8308c74 100644 --- a/pkg/apis/config/store_test.go +++ b/pkg/apis/config/store_test.go @@ -20,7 +20,7 @@ import ( "github.com/google/go-cmp/cmp" "github.com/google/go-cmp/cmp/cmpopts" - "github.com/sigstore/cosign/pkg/oci/remote" + "github.com/sigstore/policy-controller/pkg/oci/remote" "k8s.io/apimachinery/pkg/api/resource" logtesting "knative.dev/pkg/logging/testing" diff --git a/pkg/apis/policy/v1alpha1/clusterimagepolicy_conversion.go b/pkg/apis/policy/v1alpha1/clusterimagepolicy_conversion.go index a48395fd7..cbbf6962a 100644 --- a/pkg/apis/policy/v1alpha1/clusterimagepolicy_conversion.go +++ b/pkg/apis/policy/v1alpha1/clusterimagepolicy_conversion.go @@ -18,7 +18,7 @@ import ( "context" "fmt" - "github.com/sigstore/cosign/pkg/apis/policy/v1beta1" + "github.com/sigstore/policy-controller/pkg/apis/policy/v1beta1" v1 "k8s.io/api/core/v1" "knative.dev/pkg/apis" ) diff --git a/pkg/apis/policy/v1alpha1/clusterimagepolicy_conversion_test.go b/pkg/apis/policy/v1alpha1/clusterimagepolicy_conversion_test.go index 617aabefb..d23351720 100644 --- a/pkg/apis/policy/v1alpha1/clusterimagepolicy_conversion_test.go +++ b/pkg/apis/policy/v1alpha1/clusterimagepolicy_conversion_test.go @@ -22,7 +22,7 @@ import ( v1 "k8s.io/api/core/v1" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" - "github.com/sigstore/cosign/pkg/apis/policy/v1beta1" + "github.com/sigstore/policy-controller/pkg/apis/policy/v1beta1" ) // Test v1alpha1 -> v1beta1 -> v1alpha1 diff --git a/pkg/apis/policy/v1alpha1/clusterimagepolicy_validation.go b/pkg/apis/policy/v1alpha1/clusterimagepolicy_validation.go index 445009fa0..a306038b7 100644 --- a/pkg/apis/policy/v1alpha1/clusterimagepolicy_validation.go +++ b/pkg/apis/policy/v1alpha1/clusterimagepolicy_validation.go @@ -23,7 +23,7 @@ import ( "strings" "github.com/aws/aws-sdk-go-v2/aws/arn" - "github.com/sigstore/cosign/pkg/apis/utils" + "github.com/sigstore/policy-controller/pkg/apis/utils" "knative.dev/pkg/apis" ) diff --git a/pkg/apis/policy/v1alpha1/register.go b/pkg/apis/policy/v1alpha1/register.go index fa2d638a0..bb3e131be 100644 --- a/pkg/apis/policy/v1alpha1/register.go +++ b/pkg/apis/policy/v1alpha1/register.go @@ -15,7 +15,7 @@ package v1alpha1 import ( - policy "github.com/sigstore/cosign/pkg/apis/policy" + policy "github.com/sigstore/policy-controller/pkg/apis/policy" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/apimachinery/pkg/runtime" diff --git a/pkg/apis/policy/v1beta1/clusterimagepolicy_validation.go b/pkg/apis/policy/v1beta1/clusterimagepolicy_validation.go index 48cf0d8a5..d92927bc9 100644 --- a/pkg/apis/policy/v1beta1/clusterimagepolicy_validation.go +++ b/pkg/apis/policy/v1beta1/clusterimagepolicy_validation.go @@ -23,7 +23,7 @@ import ( "strings" "github.com/aws/aws-sdk-go-v2/aws/arn" - "github.com/sigstore/cosign/pkg/apis/utils" + "github.com/sigstore/policy-controller/pkg/apis/utils" "knative.dev/pkg/apis" ) diff --git a/pkg/apis/policy/v1beta1/register.go b/pkg/apis/policy/v1beta1/register.go index e356f8826..a4fa27efe 100644 --- a/pkg/apis/policy/v1beta1/register.go +++ b/pkg/apis/policy/v1beta1/register.go @@ -15,7 +15,7 @@ package v1beta1 import ( - policy "github.com/sigstore/cosign/pkg/apis/policy" + policy "github.com/sigstore/policy-controller/pkg/apis/policy" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/apimachinery/pkg/runtime" diff --git a/pkg/client/clientset/versioned/clientset.go b/pkg/client/clientset/versioned/clientset.go index 7742a57c4..b5967d98e 100644 --- a/pkg/client/clientset/versioned/clientset.go +++ b/pkg/client/clientset/versioned/clientset.go @@ -20,8 +20,8 @@ import ( "fmt" "net/http" - policyv1alpha1 "github.com/sigstore/cosign/pkg/client/clientset/versioned/typed/policy/v1alpha1" - policyv1beta1 "github.com/sigstore/cosign/pkg/client/clientset/versioned/typed/policy/v1beta1" + policyv1alpha1 "github.com/sigstore/policy-controller/pkg/client/clientset/versioned/typed/policy/v1alpha1" + policyv1beta1 "github.com/sigstore/policy-controller/pkg/client/clientset/versioned/typed/policy/v1beta1" discovery "k8s.io/client-go/discovery" rest "k8s.io/client-go/rest" flowcontrol "k8s.io/client-go/util/flowcontrol" diff --git a/pkg/client/clientset/versioned/fake/clientset_generated.go b/pkg/client/clientset/versioned/fake/clientset_generated.go index f7801b5fd..58e29d787 100644 --- a/pkg/client/clientset/versioned/fake/clientset_generated.go +++ b/pkg/client/clientset/versioned/fake/clientset_generated.go @@ -17,11 +17,11 @@ package fake import ( - clientset "github.com/sigstore/cosign/pkg/client/clientset/versioned" - policyv1alpha1 "github.com/sigstore/cosign/pkg/client/clientset/versioned/typed/policy/v1alpha1" - fakepolicyv1alpha1 "github.com/sigstore/cosign/pkg/client/clientset/versioned/typed/policy/v1alpha1/fake" - policyv1beta1 "github.com/sigstore/cosign/pkg/client/clientset/versioned/typed/policy/v1beta1" - fakepolicyv1beta1 "github.com/sigstore/cosign/pkg/client/clientset/versioned/typed/policy/v1beta1/fake" + clientset "github.com/sigstore/policy-controller/pkg/client/clientset/versioned" + policyv1alpha1 "github.com/sigstore/policy-controller/pkg/client/clientset/versioned/typed/policy/v1alpha1" + fakepolicyv1alpha1 "github.com/sigstore/policy-controller/pkg/client/clientset/versioned/typed/policy/v1alpha1/fake" + policyv1beta1 "github.com/sigstore/policy-controller/pkg/client/clientset/versioned/typed/policy/v1beta1" + fakepolicyv1beta1 "github.com/sigstore/policy-controller/pkg/client/clientset/versioned/typed/policy/v1beta1/fake" "k8s.io/apimachinery/pkg/runtime" "k8s.io/apimachinery/pkg/watch" "k8s.io/client-go/discovery" diff --git a/pkg/client/clientset/versioned/fake/register.go b/pkg/client/clientset/versioned/fake/register.go index 93148e266..81301ea17 100644 --- a/pkg/client/clientset/versioned/fake/register.go +++ b/pkg/client/clientset/versioned/fake/register.go @@ -17,8 +17,8 @@ package fake import ( - policyv1alpha1 "github.com/sigstore/cosign/pkg/apis/policy/v1alpha1" - policyv1beta1 "github.com/sigstore/cosign/pkg/apis/policy/v1beta1" + policyv1alpha1 "github.com/sigstore/policy-controller/pkg/apis/policy/v1alpha1" + policyv1beta1 "github.com/sigstore/policy-controller/pkg/apis/policy/v1beta1" v1 "k8s.io/apimachinery/pkg/apis/meta/v1" runtime "k8s.io/apimachinery/pkg/runtime" schema "k8s.io/apimachinery/pkg/runtime/schema" diff --git a/pkg/client/clientset/versioned/scheme/register.go b/pkg/client/clientset/versioned/scheme/register.go index 70cd652d8..d1b5e846c 100644 --- a/pkg/client/clientset/versioned/scheme/register.go +++ b/pkg/client/clientset/versioned/scheme/register.go @@ -17,8 +17,8 @@ package scheme import ( - policyv1alpha1 "github.com/sigstore/cosign/pkg/apis/policy/v1alpha1" - policyv1beta1 "github.com/sigstore/cosign/pkg/apis/policy/v1beta1" + policyv1alpha1 "github.com/sigstore/policy-controller/pkg/apis/policy/v1alpha1" + policyv1beta1 "github.com/sigstore/policy-controller/pkg/apis/policy/v1beta1" v1 "k8s.io/apimachinery/pkg/apis/meta/v1" runtime "k8s.io/apimachinery/pkg/runtime" schema "k8s.io/apimachinery/pkg/runtime/schema" diff --git a/pkg/client/clientset/versioned/typed/policy/v1alpha1/clusterimagepolicy.go b/pkg/client/clientset/versioned/typed/policy/v1alpha1/clusterimagepolicy.go index bf5f6b52d..0bad2f84e 100644 --- a/pkg/client/clientset/versioned/typed/policy/v1alpha1/clusterimagepolicy.go +++ b/pkg/client/clientset/versioned/typed/policy/v1alpha1/clusterimagepolicy.go @@ -20,8 +20,8 @@ import ( "context" "time" - v1alpha1 "github.com/sigstore/cosign/pkg/apis/policy/v1alpha1" - scheme "github.com/sigstore/cosign/pkg/client/clientset/versioned/scheme" + v1alpha1 "github.com/sigstore/policy-controller/pkg/apis/policy/v1alpha1" + scheme "github.com/sigstore/policy-controller/pkg/client/clientset/versioned/scheme" v1 "k8s.io/apimachinery/pkg/apis/meta/v1" types "k8s.io/apimachinery/pkg/types" watch "k8s.io/apimachinery/pkg/watch" diff --git a/pkg/client/clientset/versioned/typed/policy/v1alpha1/fake/fake_clusterimagepolicy.go b/pkg/client/clientset/versioned/typed/policy/v1alpha1/fake/fake_clusterimagepolicy.go index 92be94398..26482fe62 100644 --- a/pkg/client/clientset/versioned/typed/policy/v1alpha1/fake/fake_clusterimagepolicy.go +++ b/pkg/client/clientset/versioned/typed/policy/v1alpha1/fake/fake_clusterimagepolicy.go @@ -19,7 +19,7 @@ package fake import ( "context" - v1alpha1 "github.com/sigstore/cosign/pkg/apis/policy/v1alpha1" + v1alpha1 "github.com/sigstore/policy-controller/pkg/apis/policy/v1alpha1" v1 "k8s.io/apimachinery/pkg/apis/meta/v1" labels "k8s.io/apimachinery/pkg/labels" schema "k8s.io/apimachinery/pkg/runtime/schema" diff --git a/pkg/client/clientset/versioned/typed/policy/v1alpha1/fake/fake_policy_client.go b/pkg/client/clientset/versioned/typed/policy/v1alpha1/fake/fake_policy_client.go index a9f0c553b..3dc8ac126 100644 --- a/pkg/client/clientset/versioned/typed/policy/v1alpha1/fake/fake_policy_client.go +++ b/pkg/client/clientset/versioned/typed/policy/v1alpha1/fake/fake_policy_client.go @@ -17,7 +17,7 @@ package fake import ( - v1alpha1 "github.com/sigstore/cosign/pkg/client/clientset/versioned/typed/policy/v1alpha1" + v1alpha1 "github.com/sigstore/policy-controller/pkg/client/clientset/versioned/typed/policy/v1alpha1" rest "k8s.io/client-go/rest" testing "k8s.io/client-go/testing" ) diff --git a/pkg/client/clientset/versioned/typed/policy/v1alpha1/policy_client.go b/pkg/client/clientset/versioned/typed/policy/v1alpha1/policy_client.go index 198ccf262..4724b40fc 100644 --- a/pkg/client/clientset/versioned/typed/policy/v1alpha1/policy_client.go +++ b/pkg/client/clientset/versioned/typed/policy/v1alpha1/policy_client.go @@ -19,8 +19,8 @@ package v1alpha1 import ( "net/http" - v1alpha1 "github.com/sigstore/cosign/pkg/apis/policy/v1alpha1" - "github.com/sigstore/cosign/pkg/client/clientset/versioned/scheme" + v1alpha1 "github.com/sigstore/policy-controller/pkg/apis/policy/v1alpha1" + "github.com/sigstore/policy-controller/pkg/client/clientset/versioned/scheme" rest "k8s.io/client-go/rest" ) diff --git a/pkg/client/clientset/versioned/typed/policy/v1beta1/clusterimagepolicy.go b/pkg/client/clientset/versioned/typed/policy/v1beta1/clusterimagepolicy.go index 195c55b89..d300b643f 100644 --- a/pkg/client/clientset/versioned/typed/policy/v1beta1/clusterimagepolicy.go +++ b/pkg/client/clientset/versioned/typed/policy/v1beta1/clusterimagepolicy.go @@ -20,8 +20,8 @@ import ( "context" "time" - v1beta1 "github.com/sigstore/cosign/pkg/apis/policy/v1beta1" - scheme "github.com/sigstore/cosign/pkg/client/clientset/versioned/scheme" + v1beta1 "github.com/sigstore/policy-controller/pkg/apis/policy/v1beta1" + scheme "github.com/sigstore/policy-controller/pkg/client/clientset/versioned/scheme" v1 "k8s.io/apimachinery/pkg/apis/meta/v1" types "k8s.io/apimachinery/pkg/types" watch "k8s.io/apimachinery/pkg/watch" diff --git a/pkg/client/clientset/versioned/typed/policy/v1beta1/fake/fake_clusterimagepolicy.go b/pkg/client/clientset/versioned/typed/policy/v1beta1/fake/fake_clusterimagepolicy.go index 74a35bde2..7bf7e5401 100644 --- a/pkg/client/clientset/versioned/typed/policy/v1beta1/fake/fake_clusterimagepolicy.go +++ b/pkg/client/clientset/versioned/typed/policy/v1beta1/fake/fake_clusterimagepolicy.go @@ -19,7 +19,7 @@ package fake import ( "context" - v1beta1 "github.com/sigstore/cosign/pkg/apis/policy/v1beta1" + v1beta1 "github.com/sigstore/policy-controller/pkg/apis/policy/v1beta1" v1 "k8s.io/apimachinery/pkg/apis/meta/v1" labels "k8s.io/apimachinery/pkg/labels" schema "k8s.io/apimachinery/pkg/runtime/schema" diff --git a/pkg/client/clientset/versioned/typed/policy/v1beta1/fake/fake_policy_client.go b/pkg/client/clientset/versioned/typed/policy/v1beta1/fake/fake_policy_client.go index b5f52e2d7..e5307af53 100644 --- a/pkg/client/clientset/versioned/typed/policy/v1beta1/fake/fake_policy_client.go +++ b/pkg/client/clientset/versioned/typed/policy/v1beta1/fake/fake_policy_client.go @@ -17,7 +17,7 @@ package fake import ( - v1beta1 "github.com/sigstore/cosign/pkg/client/clientset/versioned/typed/policy/v1beta1" + v1beta1 "github.com/sigstore/policy-controller/pkg/client/clientset/versioned/typed/policy/v1beta1" rest "k8s.io/client-go/rest" testing "k8s.io/client-go/testing" ) diff --git a/pkg/client/clientset/versioned/typed/policy/v1beta1/policy_client.go b/pkg/client/clientset/versioned/typed/policy/v1beta1/policy_client.go index 5146b989a..842f62c07 100644 --- a/pkg/client/clientset/versioned/typed/policy/v1beta1/policy_client.go +++ b/pkg/client/clientset/versioned/typed/policy/v1beta1/policy_client.go @@ -19,8 +19,8 @@ package v1beta1 import ( "net/http" - v1beta1 "github.com/sigstore/cosign/pkg/apis/policy/v1beta1" - "github.com/sigstore/cosign/pkg/client/clientset/versioned/scheme" + v1beta1 "github.com/sigstore/policy-controller/pkg/apis/policy/v1beta1" + "github.com/sigstore/policy-controller/pkg/client/clientset/versioned/scheme" rest "k8s.io/client-go/rest" ) diff --git a/pkg/client/informers/externalversions/factory.go b/pkg/client/informers/externalversions/factory.go index 097c2aecb..6405112ab 100644 --- a/pkg/client/informers/externalversions/factory.go +++ b/pkg/client/informers/externalversions/factory.go @@ -21,9 +21,9 @@ import ( sync "sync" time "time" - versioned "github.com/sigstore/cosign/pkg/client/clientset/versioned" - internalinterfaces "github.com/sigstore/cosign/pkg/client/informers/externalversions/internalinterfaces" - policy "github.com/sigstore/cosign/pkg/client/informers/externalversions/policy" + versioned "github.com/sigstore/policy-controller/pkg/client/clientset/versioned" + internalinterfaces "github.com/sigstore/policy-controller/pkg/client/informers/externalversions/internalinterfaces" + policy "github.com/sigstore/policy-controller/pkg/client/informers/externalversions/policy" v1 "k8s.io/apimachinery/pkg/apis/meta/v1" runtime "k8s.io/apimachinery/pkg/runtime" schema "k8s.io/apimachinery/pkg/runtime/schema" diff --git a/pkg/client/informers/externalversions/generic.go b/pkg/client/informers/externalversions/generic.go index 3c6ef7753..9d2063ae9 100644 --- a/pkg/client/informers/externalversions/generic.go +++ b/pkg/client/informers/externalversions/generic.go @@ -19,8 +19,8 @@ package externalversions import ( "fmt" - v1alpha1 "github.com/sigstore/cosign/pkg/apis/policy/v1alpha1" - v1beta1 "github.com/sigstore/cosign/pkg/apis/policy/v1beta1" + v1alpha1 "github.com/sigstore/policy-controller/pkg/apis/policy/v1alpha1" + v1beta1 "github.com/sigstore/policy-controller/pkg/apis/policy/v1beta1" schema "k8s.io/apimachinery/pkg/runtime/schema" cache "k8s.io/client-go/tools/cache" ) diff --git a/pkg/client/informers/externalversions/internalinterfaces/factory_interfaces.go b/pkg/client/informers/externalversions/internalinterfaces/factory_interfaces.go index 5ffe812aa..87fa43e90 100644 --- a/pkg/client/informers/externalversions/internalinterfaces/factory_interfaces.go +++ b/pkg/client/informers/externalversions/internalinterfaces/factory_interfaces.go @@ -19,7 +19,7 @@ package internalinterfaces import ( time "time" - versioned "github.com/sigstore/cosign/pkg/client/clientset/versioned" + versioned "github.com/sigstore/policy-controller/pkg/client/clientset/versioned" v1 "k8s.io/apimachinery/pkg/apis/meta/v1" runtime "k8s.io/apimachinery/pkg/runtime" cache "k8s.io/client-go/tools/cache" diff --git a/pkg/client/informers/externalversions/policy/interface.go b/pkg/client/informers/externalversions/policy/interface.go index c997ffc4f..b58d6dd01 100644 --- a/pkg/client/informers/externalversions/policy/interface.go +++ b/pkg/client/informers/externalversions/policy/interface.go @@ -17,9 +17,9 @@ package policy import ( - internalinterfaces "github.com/sigstore/cosign/pkg/client/informers/externalversions/internalinterfaces" - v1alpha1 "github.com/sigstore/cosign/pkg/client/informers/externalversions/policy/v1alpha1" - v1beta1 "github.com/sigstore/cosign/pkg/client/informers/externalversions/policy/v1beta1" + internalinterfaces "github.com/sigstore/policy-controller/pkg/client/informers/externalversions/internalinterfaces" + v1alpha1 "github.com/sigstore/policy-controller/pkg/client/informers/externalversions/policy/v1alpha1" + v1beta1 "github.com/sigstore/policy-controller/pkg/client/informers/externalversions/policy/v1beta1" ) // Interface provides access to each of this group's versions. diff --git a/pkg/client/informers/externalversions/policy/v1alpha1/clusterimagepolicy.go b/pkg/client/informers/externalversions/policy/v1alpha1/clusterimagepolicy.go index 26bd1d1b3..b268c0c47 100644 --- a/pkg/client/informers/externalversions/policy/v1alpha1/clusterimagepolicy.go +++ b/pkg/client/informers/externalversions/policy/v1alpha1/clusterimagepolicy.go @@ -20,10 +20,10 @@ import ( "context" time "time" - policyv1alpha1 "github.com/sigstore/cosign/pkg/apis/policy/v1alpha1" - versioned "github.com/sigstore/cosign/pkg/client/clientset/versioned" - internalinterfaces "github.com/sigstore/cosign/pkg/client/informers/externalversions/internalinterfaces" - v1alpha1 "github.com/sigstore/cosign/pkg/client/listers/policy/v1alpha1" + policyv1alpha1 "github.com/sigstore/policy-controller/pkg/apis/policy/v1alpha1" + versioned "github.com/sigstore/policy-controller/pkg/client/clientset/versioned" + internalinterfaces "github.com/sigstore/policy-controller/pkg/client/informers/externalversions/internalinterfaces" + v1alpha1 "github.com/sigstore/policy-controller/pkg/client/listers/policy/v1alpha1" v1 "k8s.io/apimachinery/pkg/apis/meta/v1" runtime "k8s.io/apimachinery/pkg/runtime" watch "k8s.io/apimachinery/pkg/watch" diff --git a/pkg/client/informers/externalversions/policy/v1alpha1/interface.go b/pkg/client/informers/externalversions/policy/v1alpha1/interface.go index 903c4cea6..dcab52e88 100644 --- a/pkg/client/informers/externalversions/policy/v1alpha1/interface.go +++ b/pkg/client/informers/externalversions/policy/v1alpha1/interface.go @@ -17,7 +17,7 @@ package v1alpha1 import ( - internalinterfaces "github.com/sigstore/cosign/pkg/client/informers/externalversions/internalinterfaces" + internalinterfaces "github.com/sigstore/policy-controller/pkg/client/informers/externalversions/internalinterfaces" ) // Interface provides access to all the informers in this group version. diff --git a/pkg/client/informers/externalversions/policy/v1beta1/clusterimagepolicy.go b/pkg/client/informers/externalversions/policy/v1beta1/clusterimagepolicy.go index 5e365c0ac..7c230bee8 100644 --- a/pkg/client/informers/externalversions/policy/v1beta1/clusterimagepolicy.go +++ b/pkg/client/informers/externalversions/policy/v1beta1/clusterimagepolicy.go @@ -20,10 +20,10 @@ import ( "context" time "time" - policyv1beta1 "github.com/sigstore/cosign/pkg/apis/policy/v1beta1" - versioned "github.com/sigstore/cosign/pkg/client/clientset/versioned" - internalinterfaces "github.com/sigstore/cosign/pkg/client/informers/externalversions/internalinterfaces" - v1beta1 "github.com/sigstore/cosign/pkg/client/listers/policy/v1beta1" + policyv1beta1 "github.com/sigstore/policy-controller/pkg/apis/policy/v1beta1" + versioned "github.com/sigstore/policy-controller/pkg/client/clientset/versioned" + internalinterfaces "github.com/sigstore/policy-controller/pkg/client/informers/externalversions/internalinterfaces" + v1beta1 "github.com/sigstore/policy-controller/pkg/client/listers/policy/v1beta1" v1 "k8s.io/apimachinery/pkg/apis/meta/v1" runtime "k8s.io/apimachinery/pkg/runtime" watch "k8s.io/apimachinery/pkg/watch" diff --git a/pkg/client/informers/externalversions/policy/v1beta1/interface.go b/pkg/client/informers/externalversions/policy/v1beta1/interface.go index 8d1bab936..c8f62532f 100644 --- a/pkg/client/informers/externalversions/policy/v1beta1/interface.go +++ b/pkg/client/informers/externalversions/policy/v1beta1/interface.go @@ -17,7 +17,7 @@ package v1beta1 import ( - internalinterfaces "github.com/sigstore/cosign/pkg/client/informers/externalversions/internalinterfaces" + internalinterfaces "github.com/sigstore/policy-controller/pkg/client/informers/externalversions/internalinterfaces" ) // Interface provides access to all the informers in this group version. diff --git a/pkg/client/injection/client/client.go b/pkg/client/injection/client/client.go index a45933165..f672f43d0 100644 --- a/pkg/client/injection/client/client.go +++ b/pkg/client/injection/client/client.go @@ -22,11 +22,11 @@ import ( errors "errors" fmt "fmt" - v1alpha1 "github.com/sigstore/cosign/pkg/apis/policy/v1alpha1" - v1beta1 "github.com/sigstore/cosign/pkg/apis/policy/v1beta1" - versioned "github.com/sigstore/cosign/pkg/client/clientset/versioned" - typedpolicyv1alpha1 "github.com/sigstore/cosign/pkg/client/clientset/versioned/typed/policy/v1alpha1" - typedpolicyv1beta1 "github.com/sigstore/cosign/pkg/client/clientset/versioned/typed/policy/v1beta1" + v1alpha1 "github.com/sigstore/policy-controller/pkg/apis/policy/v1alpha1" + v1beta1 "github.com/sigstore/policy-controller/pkg/apis/policy/v1beta1" + versioned "github.com/sigstore/policy-controller/pkg/client/clientset/versioned" + typedpolicyv1alpha1 "github.com/sigstore/policy-controller/pkg/client/clientset/versioned/typed/policy/v1alpha1" + typedpolicyv1beta1 "github.com/sigstore/policy-controller/pkg/client/clientset/versioned/typed/policy/v1beta1" v1 "k8s.io/apimachinery/pkg/apis/meta/v1" unstructured "k8s.io/apimachinery/pkg/apis/meta/v1/unstructured" runtime "k8s.io/apimachinery/pkg/runtime" @@ -66,10 +66,10 @@ func Get(ctx context.Context) versioned.Interface { if untyped == nil { if injection.GetConfig(ctx) == nil { logging.FromContext(ctx).Panic( - "Unable to fetch github.com/sigstore/cosign/pkg/client/clientset/versioned.Interface from context. This context is not the application context (which is typically given to constructors via sharedmain).") + "Unable to fetch github.com/sigstore/policy-controller/pkg/client/clientset/versioned.Interface from context. This context is not the application context (which is typically given to constructors via sharedmain).") } else { logging.FromContext(ctx).Panic( - "Unable to fetch github.com/sigstore/cosign/pkg/client/clientset/versioned.Interface from context.") + "Unable to fetch github.com/sigstore/policy-controller/pkg/client/clientset/versioned.Interface from context.") } } return untyped.(versioned.Interface) diff --git a/pkg/client/injection/client/fake/fake.go b/pkg/client/injection/client/fake/fake.go index 284880515..ea7a113f3 100644 --- a/pkg/client/injection/client/fake/fake.go +++ b/pkg/client/injection/client/fake/fake.go @@ -19,8 +19,8 @@ package fake import ( context "context" - fake "github.com/sigstore/cosign/pkg/client/clientset/versioned/fake" - client "github.com/sigstore/cosign/pkg/client/injection/client" + fake "github.com/sigstore/policy-controller/pkg/client/clientset/versioned/fake" + client "github.com/sigstore/policy-controller/pkg/client/injection/client" runtime "k8s.io/apimachinery/pkg/runtime" rest "k8s.io/client-go/rest" injection "knative.dev/pkg/injection" @@ -49,7 +49,7 @@ func Get(ctx context.Context) *fake.Clientset { untyped := ctx.Value(client.Key{}) if untyped == nil { logging.FromContext(ctx).Panic( - "Unable to fetch github.com/sigstore/cosign/pkg/client/clientset/versioned/fake.Clientset from context.") + "Unable to fetch github.com/sigstore/policy-controller/pkg/client/clientset/versioned/fake.Clientset from context.") } return untyped.(*fake.Clientset) } diff --git a/pkg/client/injection/informers/factory/factory.go b/pkg/client/injection/informers/factory/factory.go index fa08b6590..86b016660 100644 --- a/pkg/client/injection/informers/factory/factory.go +++ b/pkg/client/injection/informers/factory/factory.go @@ -19,8 +19,8 @@ package factory import ( context "context" - externalversions "github.com/sigstore/cosign/pkg/client/informers/externalversions" - client "github.com/sigstore/cosign/pkg/client/injection/client" + externalversions "github.com/sigstore/policy-controller/pkg/client/informers/externalversions" + client "github.com/sigstore/policy-controller/pkg/client/injection/client" controller "knative.dev/pkg/controller" injection "knative.dev/pkg/injection" logging "knative.dev/pkg/logging" @@ -48,7 +48,7 @@ func Get(ctx context.Context) externalversions.SharedInformerFactory { untyped := ctx.Value(Key{}) if untyped == nil { logging.FromContext(ctx).Panic( - "Unable to fetch github.com/sigstore/cosign/pkg/client/informers/externalversions.SharedInformerFactory from context.") + "Unable to fetch github.com/sigstore/policy-controller/pkg/client/informers/externalversions.SharedInformerFactory from context.") } return untyped.(externalversions.SharedInformerFactory) } diff --git a/pkg/client/injection/informers/factory/fake/fake.go b/pkg/client/injection/informers/factory/fake/fake.go index eab5e299c..bf4d53418 100644 --- a/pkg/client/injection/informers/factory/fake/fake.go +++ b/pkg/client/injection/informers/factory/fake/fake.go @@ -19,9 +19,9 @@ package fake import ( context "context" - externalversions "github.com/sigstore/cosign/pkg/client/informers/externalversions" - fake "github.com/sigstore/cosign/pkg/client/injection/client/fake" - factory "github.com/sigstore/cosign/pkg/client/injection/informers/factory" + externalversions "github.com/sigstore/policy-controller/pkg/client/informers/externalversions" + fake "github.com/sigstore/policy-controller/pkg/client/injection/client/fake" + factory "github.com/sigstore/policy-controller/pkg/client/injection/informers/factory" controller "knative.dev/pkg/controller" injection "knative.dev/pkg/injection" ) diff --git a/pkg/client/injection/informers/factory/filtered/fake/fake_filtered_factory.go b/pkg/client/injection/informers/factory/filtered/fake/fake_filtered_factory.go index 6d851215f..3aaf28a6b 100644 --- a/pkg/client/injection/informers/factory/filtered/fake/fake_filtered_factory.go +++ b/pkg/client/injection/informers/factory/filtered/fake/fake_filtered_factory.go @@ -19,9 +19,9 @@ package fakeFilteredFactory import ( context "context" - externalversions "github.com/sigstore/cosign/pkg/client/informers/externalversions" - fake "github.com/sigstore/cosign/pkg/client/injection/client/fake" - filtered "github.com/sigstore/cosign/pkg/client/injection/informers/factory/filtered" + externalversions "github.com/sigstore/policy-controller/pkg/client/informers/externalversions" + fake "github.com/sigstore/policy-controller/pkg/client/injection/client/fake" + filtered "github.com/sigstore/policy-controller/pkg/client/injection/informers/factory/filtered" v1 "k8s.io/apimachinery/pkg/apis/meta/v1" controller "knative.dev/pkg/controller" injection "knative.dev/pkg/injection" diff --git a/pkg/client/injection/informers/factory/filtered/filtered_factory.go b/pkg/client/injection/informers/factory/filtered/filtered_factory.go index db5d62244..f5e659743 100644 --- a/pkg/client/injection/informers/factory/filtered/filtered_factory.go +++ b/pkg/client/injection/informers/factory/filtered/filtered_factory.go @@ -19,8 +19,8 @@ package filteredFactory import ( context "context" - externalversions "github.com/sigstore/cosign/pkg/client/informers/externalversions" - client "github.com/sigstore/cosign/pkg/client/injection/client" + externalversions "github.com/sigstore/policy-controller/pkg/client/informers/externalversions" + client "github.com/sigstore/policy-controller/pkg/client/injection/client" v1 "k8s.io/apimachinery/pkg/apis/meta/v1" controller "knative.dev/pkg/controller" injection "knative.dev/pkg/injection" @@ -69,7 +69,7 @@ func Get(ctx context.Context, selector string) externalversions.SharedInformerFa untyped := ctx.Value(Key{Selector: selector}) if untyped == nil { logging.FromContext(ctx).Panicf( - "Unable to fetch github.com/sigstore/cosign/pkg/client/informers/externalversions.SharedInformerFactory with selector %s from context.", selector) + "Unable to fetch github.com/sigstore/policy-controller/pkg/client/informers/externalversions.SharedInformerFactory with selector %s from context.", selector) } return untyped.(externalversions.SharedInformerFactory) } diff --git a/pkg/client/injection/informers/policy/v1alpha1/clusterimagepolicy/clusterimagepolicy.go b/pkg/client/injection/informers/policy/v1alpha1/clusterimagepolicy/clusterimagepolicy.go index 53173e524..f5fb3c5b6 100644 --- a/pkg/client/injection/informers/policy/v1alpha1/clusterimagepolicy/clusterimagepolicy.go +++ b/pkg/client/injection/informers/policy/v1alpha1/clusterimagepolicy/clusterimagepolicy.go @@ -19,12 +19,12 @@ package clusterimagepolicy import ( context "context" - apispolicyv1alpha1 "github.com/sigstore/cosign/pkg/apis/policy/v1alpha1" - versioned "github.com/sigstore/cosign/pkg/client/clientset/versioned" - v1alpha1 "github.com/sigstore/cosign/pkg/client/informers/externalversions/policy/v1alpha1" - client "github.com/sigstore/cosign/pkg/client/injection/client" - factory "github.com/sigstore/cosign/pkg/client/injection/informers/factory" - policyv1alpha1 "github.com/sigstore/cosign/pkg/client/listers/policy/v1alpha1" + apispolicyv1alpha1 "github.com/sigstore/policy-controller/pkg/apis/policy/v1alpha1" + versioned "github.com/sigstore/policy-controller/pkg/client/clientset/versioned" + v1alpha1 "github.com/sigstore/policy-controller/pkg/client/informers/externalversions/policy/v1alpha1" + client "github.com/sigstore/policy-controller/pkg/client/injection/client" + factory "github.com/sigstore/policy-controller/pkg/client/injection/informers/factory" + policyv1alpha1 "github.com/sigstore/policy-controller/pkg/client/listers/policy/v1alpha1" v1 "k8s.io/apimachinery/pkg/apis/meta/v1" labels "k8s.io/apimachinery/pkg/labels" cache "k8s.io/client-go/tools/cache" @@ -57,7 +57,7 @@ func Get(ctx context.Context) v1alpha1.ClusterImagePolicyInformer { untyped := ctx.Value(Key{}) if untyped == nil { logging.FromContext(ctx).Panic( - "Unable to fetch github.com/sigstore/cosign/pkg/client/informers/externalversions/policy/v1alpha1.ClusterImagePolicyInformer from context.") + "Unable to fetch github.com/sigstore/policy-controller/pkg/client/informers/externalversions/policy/v1alpha1.ClusterImagePolicyInformer from context.") } return untyped.(v1alpha1.ClusterImagePolicyInformer) } diff --git a/pkg/client/injection/informers/policy/v1alpha1/clusterimagepolicy/fake/fake.go b/pkg/client/injection/informers/policy/v1alpha1/clusterimagepolicy/fake/fake.go index 242ed864d..41d06fc74 100644 --- a/pkg/client/injection/informers/policy/v1alpha1/clusterimagepolicy/fake/fake.go +++ b/pkg/client/injection/informers/policy/v1alpha1/clusterimagepolicy/fake/fake.go @@ -19,8 +19,8 @@ package fake import ( context "context" - fake "github.com/sigstore/cosign/pkg/client/injection/informers/factory/fake" - clusterimagepolicy "github.com/sigstore/cosign/pkg/client/injection/informers/policy/v1alpha1/clusterimagepolicy" + fake "github.com/sigstore/policy-controller/pkg/client/injection/informers/factory/fake" + clusterimagepolicy "github.com/sigstore/policy-controller/pkg/client/injection/informers/policy/v1alpha1/clusterimagepolicy" controller "knative.dev/pkg/controller" injection "knative.dev/pkg/injection" ) diff --git a/pkg/client/injection/informers/policy/v1alpha1/clusterimagepolicy/filtered/clusterimagepolicy.go b/pkg/client/injection/informers/policy/v1alpha1/clusterimagepolicy/filtered/clusterimagepolicy.go index b352b6f07..61fa03f05 100644 --- a/pkg/client/injection/informers/policy/v1alpha1/clusterimagepolicy/filtered/clusterimagepolicy.go +++ b/pkg/client/injection/informers/policy/v1alpha1/clusterimagepolicy/filtered/clusterimagepolicy.go @@ -19,12 +19,12 @@ package filtered import ( context "context" - apispolicyv1alpha1 "github.com/sigstore/cosign/pkg/apis/policy/v1alpha1" - versioned "github.com/sigstore/cosign/pkg/client/clientset/versioned" - v1alpha1 "github.com/sigstore/cosign/pkg/client/informers/externalversions/policy/v1alpha1" - client "github.com/sigstore/cosign/pkg/client/injection/client" - filtered "github.com/sigstore/cosign/pkg/client/injection/informers/factory/filtered" - policyv1alpha1 "github.com/sigstore/cosign/pkg/client/listers/policy/v1alpha1" + apispolicyv1alpha1 "github.com/sigstore/policy-controller/pkg/apis/policy/v1alpha1" + versioned "github.com/sigstore/policy-controller/pkg/client/clientset/versioned" + v1alpha1 "github.com/sigstore/policy-controller/pkg/client/informers/externalversions/policy/v1alpha1" + client "github.com/sigstore/policy-controller/pkg/client/injection/client" + filtered "github.com/sigstore/policy-controller/pkg/client/injection/informers/factory/filtered" + policyv1alpha1 "github.com/sigstore/policy-controller/pkg/client/listers/policy/v1alpha1" v1 "k8s.io/apimachinery/pkg/apis/meta/v1" labels "k8s.io/apimachinery/pkg/labels" cache "k8s.io/client-go/tools/cache" @@ -79,7 +79,7 @@ func Get(ctx context.Context, selector string) v1alpha1.ClusterImagePolicyInform untyped := ctx.Value(Key{Selector: selector}) if untyped == nil { logging.FromContext(ctx).Panicf( - "Unable to fetch github.com/sigstore/cosign/pkg/client/informers/externalversions/policy/v1alpha1.ClusterImagePolicyInformer with selector %s from context.", selector) + "Unable to fetch github.com/sigstore/policy-controller/pkg/client/informers/externalversions/policy/v1alpha1.ClusterImagePolicyInformer with selector %s from context.", selector) } return untyped.(v1alpha1.ClusterImagePolicyInformer) } diff --git a/pkg/client/injection/informers/policy/v1alpha1/clusterimagepolicy/filtered/fake/fake.go b/pkg/client/injection/informers/policy/v1alpha1/clusterimagepolicy/filtered/fake/fake.go index 501a7f460..c71673c9f 100644 --- a/pkg/client/injection/informers/policy/v1alpha1/clusterimagepolicy/filtered/fake/fake.go +++ b/pkg/client/injection/informers/policy/v1alpha1/clusterimagepolicy/filtered/fake/fake.go @@ -19,8 +19,8 @@ package fake import ( context "context" - factoryfiltered "github.com/sigstore/cosign/pkg/client/injection/informers/factory/filtered" - filtered "github.com/sigstore/cosign/pkg/client/injection/informers/policy/v1alpha1/clusterimagepolicy/filtered" + factoryfiltered "github.com/sigstore/policy-controller/pkg/client/injection/informers/factory/filtered" + filtered "github.com/sigstore/policy-controller/pkg/client/injection/informers/policy/v1alpha1/clusterimagepolicy/filtered" controller "knative.dev/pkg/controller" injection "knative.dev/pkg/injection" logging "knative.dev/pkg/logging" diff --git a/pkg/client/injection/informers/policy/v1beta1/clusterimagepolicy/clusterimagepolicy.go b/pkg/client/injection/informers/policy/v1beta1/clusterimagepolicy/clusterimagepolicy.go index abccbbbaa..c2d81e440 100644 --- a/pkg/client/injection/informers/policy/v1beta1/clusterimagepolicy/clusterimagepolicy.go +++ b/pkg/client/injection/informers/policy/v1beta1/clusterimagepolicy/clusterimagepolicy.go @@ -19,12 +19,12 @@ package clusterimagepolicy import ( context "context" - apispolicyv1beta1 "github.com/sigstore/cosign/pkg/apis/policy/v1beta1" - versioned "github.com/sigstore/cosign/pkg/client/clientset/versioned" - v1beta1 "github.com/sigstore/cosign/pkg/client/informers/externalversions/policy/v1beta1" - client "github.com/sigstore/cosign/pkg/client/injection/client" - factory "github.com/sigstore/cosign/pkg/client/injection/informers/factory" - policyv1beta1 "github.com/sigstore/cosign/pkg/client/listers/policy/v1beta1" + apispolicyv1beta1 "github.com/sigstore/policy-controller/pkg/apis/policy/v1beta1" + versioned "github.com/sigstore/policy-controller/pkg/client/clientset/versioned" + v1beta1 "github.com/sigstore/policy-controller/pkg/client/informers/externalversions/policy/v1beta1" + client "github.com/sigstore/policy-controller/pkg/client/injection/client" + factory "github.com/sigstore/policy-controller/pkg/client/injection/informers/factory" + policyv1beta1 "github.com/sigstore/policy-controller/pkg/client/listers/policy/v1beta1" v1 "k8s.io/apimachinery/pkg/apis/meta/v1" labels "k8s.io/apimachinery/pkg/labels" cache "k8s.io/client-go/tools/cache" @@ -57,7 +57,7 @@ func Get(ctx context.Context) v1beta1.ClusterImagePolicyInformer { untyped := ctx.Value(Key{}) if untyped == nil { logging.FromContext(ctx).Panic( - "Unable to fetch github.com/sigstore/cosign/pkg/client/informers/externalversions/policy/v1beta1.ClusterImagePolicyInformer from context.") + "Unable to fetch github.com/sigstore/policy-controller/pkg/client/informers/externalversions/policy/v1beta1.ClusterImagePolicyInformer from context.") } return untyped.(v1beta1.ClusterImagePolicyInformer) } diff --git a/pkg/client/injection/informers/policy/v1beta1/clusterimagepolicy/fake/fake.go b/pkg/client/injection/informers/policy/v1beta1/clusterimagepolicy/fake/fake.go index 34d20f591..babc81f74 100644 --- a/pkg/client/injection/informers/policy/v1beta1/clusterimagepolicy/fake/fake.go +++ b/pkg/client/injection/informers/policy/v1beta1/clusterimagepolicy/fake/fake.go @@ -19,8 +19,8 @@ package fake import ( context "context" - fake "github.com/sigstore/cosign/pkg/client/injection/informers/factory/fake" - clusterimagepolicy "github.com/sigstore/cosign/pkg/client/injection/informers/policy/v1beta1/clusterimagepolicy" + fake "github.com/sigstore/policy-controller/pkg/client/injection/informers/factory/fake" + clusterimagepolicy "github.com/sigstore/policy-controller/pkg/client/injection/informers/policy/v1beta1/clusterimagepolicy" controller "knative.dev/pkg/controller" injection "knative.dev/pkg/injection" ) diff --git a/pkg/client/injection/informers/policy/v1beta1/clusterimagepolicy/filtered/clusterimagepolicy.go b/pkg/client/injection/informers/policy/v1beta1/clusterimagepolicy/filtered/clusterimagepolicy.go index a620e1d5c..aed80558c 100644 --- a/pkg/client/injection/informers/policy/v1beta1/clusterimagepolicy/filtered/clusterimagepolicy.go +++ b/pkg/client/injection/informers/policy/v1beta1/clusterimagepolicy/filtered/clusterimagepolicy.go @@ -19,12 +19,12 @@ package filtered import ( context "context" - apispolicyv1beta1 "github.com/sigstore/cosign/pkg/apis/policy/v1beta1" - versioned "github.com/sigstore/cosign/pkg/client/clientset/versioned" - v1beta1 "github.com/sigstore/cosign/pkg/client/informers/externalversions/policy/v1beta1" - client "github.com/sigstore/cosign/pkg/client/injection/client" - filtered "github.com/sigstore/cosign/pkg/client/injection/informers/factory/filtered" - policyv1beta1 "github.com/sigstore/cosign/pkg/client/listers/policy/v1beta1" + apispolicyv1beta1 "github.com/sigstore/policy-controller/pkg/apis/policy/v1beta1" + versioned "github.com/sigstore/policy-controller/pkg/client/clientset/versioned" + v1beta1 "github.com/sigstore/policy-controller/pkg/client/informers/externalversions/policy/v1beta1" + client "github.com/sigstore/policy-controller/pkg/client/injection/client" + filtered "github.com/sigstore/policy-controller/pkg/client/injection/informers/factory/filtered" + policyv1beta1 "github.com/sigstore/policy-controller/pkg/client/listers/policy/v1beta1" v1 "k8s.io/apimachinery/pkg/apis/meta/v1" labels "k8s.io/apimachinery/pkg/labels" cache "k8s.io/client-go/tools/cache" @@ -79,7 +79,7 @@ func Get(ctx context.Context, selector string) v1beta1.ClusterImagePolicyInforme untyped := ctx.Value(Key{Selector: selector}) if untyped == nil { logging.FromContext(ctx).Panicf( - "Unable to fetch github.com/sigstore/cosign/pkg/client/informers/externalversions/policy/v1beta1.ClusterImagePolicyInformer with selector %s from context.", selector) + "Unable to fetch github.com/sigstore/policy-controller/pkg/client/informers/externalversions/policy/v1beta1.ClusterImagePolicyInformer with selector %s from context.", selector) } return untyped.(v1beta1.ClusterImagePolicyInformer) } diff --git a/pkg/client/injection/informers/policy/v1beta1/clusterimagepolicy/filtered/fake/fake.go b/pkg/client/injection/informers/policy/v1beta1/clusterimagepolicy/filtered/fake/fake.go index 45d4c791f..59fa09547 100644 --- a/pkg/client/injection/informers/policy/v1beta1/clusterimagepolicy/filtered/fake/fake.go +++ b/pkg/client/injection/informers/policy/v1beta1/clusterimagepolicy/filtered/fake/fake.go @@ -19,8 +19,8 @@ package fake import ( context "context" - factoryfiltered "github.com/sigstore/cosign/pkg/client/injection/informers/factory/filtered" - filtered "github.com/sigstore/cosign/pkg/client/injection/informers/policy/v1beta1/clusterimagepolicy/filtered" + factoryfiltered "github.com/sigstore/policy-controller/pkg/client/injection/informers/factory/filtered" + filtered "github.com/sigstore/policy-controller/pkg/client/injection/informers/policy/v1beta1/clusterimagepolicy/filtered" controller "knative.dev/pkg/controller" injection "knative.dev/pkg/injection" logging "knative.dev/pkg/logging" diff --git a/pkg/client/injection/reconciler/policy/v1alpha1/clusterimagepolicy/controller.go b/pkg/client/injection/reconciler/policy/v1alpha1/clusterimagepolicy/controller.go index 1a0cb9112..738da8b3b 100644 --- a/pkg/client/injection/reconciler/policy/v1alpha1/clusterimagepolicy/controller.go +++ b/pkg/client/injection/reconciler/policy/v1alpha1/clusterimagepolicy/controller.go @@ -22,9 +22,9 @@ import ( reflect "reflect" strings "strings" - versionedscheme "github.com/sigstore/cosign/pkg/client/clientset/versioned/scheme" - client "github.com/sigstore/cosign/pkg/client/injection/client" - clusterimagepolicy "github.com/sigstore/cosign/pkg/client/injection/informers/policy/v1alpha1/clusterimagepolicy" + versionedscheme "github.com/sigstore/policy-controller/pkg/client/clientset/versioned/scheme" + client "github.com/sigstore/policy-controller/pkg/client/injection/client" + clusterimagepolicy "github.com/sigstore/policy-controller/pkg/client/injection/informers/policy/v1alpha1/clusterimagepolicy" zap "go.uber.org/zap" corev1 "k8s.io/api/core/v1" labels "k8s.io/apimachinery/pkg/labels" diff --git a/pkg/client/injection/reconciler/policy/v1alpha1/clusterimagepolicy/reconciler.go b/pkg/client/injection/reconciler/policy/v1alpha1/clusterimagepolicy/reconciler.go index f79846ab7..d95ded5f5 100644 --- a/pkg/client/injection/reconciler/policy/v1alpha1/clusterimagepolicy/reconciler.go +++ b/pkg/client/injection/reconciler/policy/v1alpha1/clusterimagepolicy/reconciler.go @@ -21,9 +21,9 @@ import ( json "encoding/json" fmt "fmt" - v1alpha1 "github.com/sigstore/cosign/pkg/apis/policy/v1alpha1" - versioned "github.com/sigstore/cosign/pkg/client/clientset/versioned" - policyv1alpha1 "github.com/sigstore/cosign/pkg/client/listers/policy/v1alpha1" + v1alpha1 "github.com/sigstore/policy-controller/pkg/apis/policy/v1alpha1" + versioned "github.com/sigstore/policy-controller/pkg/client/clientset/versioned" + policyv1alpha1 "github.com/sigstore/policy-controller/pkg/client/listers/policy/v1alpha1" zap "go.uber.org/zap" v1 "k8s.io/api/core/v1" errors "k8s.io/apimachinery/pkg/api/errors" diff --git a/pkg/client/injection/reconciler/policy/v1alpha1/clusterimagepolicy/state.go b/pkg/client/injection/reconciler/policy/v1alpha1/clusterimagepolicy/state.go index d55dc2a2f..b4f2d17e9 100644 --- a/pkg/client/injection/reconciler/policy/v1alpha1/clusterimagepolicy/state.go +++ b/pkg/client/injection/reconciler/policy/v1alpha1/clusterimagepolicy/state.go @@ -19,7 +19,7 @@ package clusterimagepolicy import ( fmt "fmt" - v1alpha1 "github.com/sigstore/cosign/pkg/apis/policy/v1alpha1" + v1alpha1 "github.com/sigstore/policy-controller/pkg/apis/policy/v1alpha1" types "k8s.io/apimachinery/pkg/types" cache "k8s.io/client-go/tools/cache" reconciler "knative.dev/pkg/reconciler" diff --git a/pkg/client/injection/reconciler/policy/v1beta1/clusterimagepolicy/controller.go b/pkg/client/injection/reconciler/policy/v1beta1/clusterimagepolicy/controller.go index 127446ba9..eeb4bb881 100644 --- a/pkg/client/injection/reconciler/policy/v1beta1/clusterimagepolicy/controller.go +++ b/pkg/client/injection/reconciler/policy/v1beta1/clusterimagepolicy/controller.go @@ -22,9 +22,9 @@ import ( reflect "reflect" strings "strings" - versionedscheme "github.com/sigstore/cosign/pkg/client/clientset/versioned/scheme" - client "github.com/sigstore/cosign/pkg/client/injection/client" - clusterimagepolicy "github.com/sigstore/cosign/pkg/client/injection/informers/policy/v1beta1/clusterimagepolicy" + versionedscheme "github.com/sigstore/policy-controller/pkg/client/clientset/versioned/scheme" + client "github.com/sigstore/policy-controller/pkg/client/injection/client" + clusterimagepolicy "github.com/sigstore/policy-controller/pkg/client/injection/informers/policy/v1beta1/clusterimagepolicy" zap "go.uber.org/zap" corev1 "k8s.io/api/core/v1" labels "k8s.io/apimachinery/pkg/labels" diff --git a/pkg/client/injection/reconciler/policy/v1beta1/clusterimagepolicy/reconciler.go b/pkg/client/injection/reconciler/policy/v1beta1/clusterimagepolicy/reconciler.go index 38a5f020a..31bdda07c 100644 --- a/pkg/client/injection/reconciler/policy/v1beta1/clusterimagepolicy/reconciler.go +++ b/pkg/client/injection/reconciler/policy/v1beta1/clusterimagepolicy/reconciler.go @@ -21,9 +21,9 @@ import ( json "encoding/json" fmt "fmt" - v1beta1 "github.com/sigstore/cosign/pkg/apis/policy/v1beta1" - versioned "github.com/sigstore/cosign/pkg/client/clientset/versioned" - policyv1beta1 "github.com/sigstore/cosign/pkg/client/listers/policy/v1beta1" + v1beta1 "github.com/sigstore/policy-controller/pkg/apis/policy/v1beta1" + versioned "github.com/sigstore/policy-controller/pkg/client/clientset/versioned" + policyv1beta1 "github.com/sigstore/policy-controller/pkg/client/listers/policy/v1beta1" zap "go.uber.org/zap" v1 "k8s.io/api/core/v1" errors "k8s.io/apimachinery/pkg/api/errors" diff --git a/pkg/client/injection/reconciler/policy/v1beta1/clusterimagepolicy/state.go b/pkg/client/injection/reconciler/policy/v1beta1/clusterimagepolicy/state.go index 730c9309a..2fcf0a863 100644 --- a/pkg/client/injection/reconciler/policy/v1beta1/clusterimagepolicy/state.go +++ b/pkg/client/injection/reconciler/policy/v1beta1/clusterimagepolicy/state.go @@ -19,7 +19,7 @@ package clusterimagepolicy import ( fmt "fmt" - v1beta1 "github.com/sigstore/cosign/pkg/apis/policy/v1beta1" + v1beta1 "github.com/sigstore/policy-controller/pkg/apis/policy/v1beta1" types "k8s.io/apimachinery/pkg/types" cache "k8s.io/client-go/tools/cache" reconciler "knative.dev/pkg/reconciler" diff --git a/pkg/client/listers/policy/v1alpha1/clusterimagepolicy.go b/pkg/client/listers/policy/v1alpha1/clusterimagepolicy.go index 6323417d5..d42393ebe 100644 --- a/pkg/client/listers/policy/v1alpha1/clusterimagepolicy.go +++ b/pkg/client/listers/policy/v1alpha1/clusterimagepolicy.go @@ -17,7 +17,7 @@ package v1alpha1 import ( - v1alpha1 "github.com/sigstore/cosign/pkg/apis/policy/v1alpha1" + v1alpha1 "github.com/sigstore/policy-controller/pkg/apis/policy/v1alpha1" "k8s.io/apimachinery/pkg/api/errors" "k8s.io/apimachinery/pkg/labels" "k8s.io/client-go/tools/cache" diff --git a/pkg/client/listers/policy/v1beta1/clusterimagepolicy.go b/pkg/client/listers/policy/v1beta1/clusterimagepolicy.go index 5fc7517a6..8e112f964 100644 --- a/pkg/client/listers/policy/v1beta1/clusterimagepolicy.go +++ b/pkg/client/listers/policy/v1beta1/clusterimagepolicy.go @@ -17,7 +17,7 @@ package v1beta1 import ( - v1beta1 "github.com/sigstore/cosign/pkg/apis/policy/v1beta1" + v1beta1 "github.com/sigstore/policy-controller/pkg/apis/policy/v1beta1" "k8s.io/apimachinery/pkg/api/errors" "k8s.io/apimachinery/pkg/labels" "k8s.io/client-go/tools/cache" diff --git a/pkg/cosign/fetch.go b/pkg/cosign/fetch.go index 03324498b..823c60b24 100644 --- a/pkg/cosign/fetch.go +++ b/pkg/cosign/fetch.go @@ -24,8 +24,8 @@ import ( "runtime" "github.com/google/go-containerregistry/pkg/name" - "github.com/sigstore/cosign/pkg/cosign/bundle" - ociremote "github.com/sigstore/cosign/pkg/oci/remote" + "github.com/sigstore/policy-controller/pkg/cosign/bundle" + ociremote "github.com/sigstore/policy-controller/pkg/oci/remote" "knative.dev/pkg/pool" ) diff --git a/pkg/cosign/git/git.go b/pkg/cosign/git/git.go index 17d6f64f3..b5b524c1d 100644 --- a/pkg/cosign/git/git.go +++ b/pkg/cosign/git/git.go @@ -18,9 +18,9 @@ package git import ( "context" - "github.com/sigstore/cosign/pkg/cosign" - "github.com/sigstore/cosign/pkg/cosign/git/github" - "github.com/sigstore/cosign/pkg/cosign/git/gitlab" + "github.com/sigstore/policy-controller/pkg/cosign" + "github.com/sigstore/policy-controller/pkg/cosign/git/github" + "github.com/sigstore/policy-controller/pkg/cosign/git/gitlab" ) var providerMap = map[string]Git{ diff --git a/pkg/cosign/git/github/github.go b/pkg/cosign/git/github/github.go index 9bfb6d9b9..f83bec000 100644 --- a/pkg/cosign/git/github/github.go +++ b/pkg/cosign/git/github/github.go @@ -28,7 +28,7 @@ import ( "github.com/google/go-github/v42/github" "golang.org/x/oauth2" - "github.com/sigstore/cosign/pkg/cosign" + "github.com/sigstore/policy-controller/pkg/cosign" ) const ( diff --git a/pkg/cosign/git/gitlab/gitlab.go b/pkg/cosign/git/gitlab/gitlab.go index d06b21785..0b37e02b0 100644 --- a/pkg/cosign/git/gitlab/gitlab.go +++ b/pkg/cosign/git/gitlab/gitlab.go @@ -22,7 +22,7 @@ import ( "io" "os" - "github.com/sigstore/cosign/pkg/cosign" + "github.com/sigstore/policy-controller/pkg/cosign" "github.com/xanzy/go-gitlab" ) diff --git a/pkg/cosign/keys.go b/pkg/cosign/keys.go index a3cd8053e..2b68b8c64 100644 --- a/pkg/cosign/keys.go +++ b/pkg/cosign/keys.go @@ -32,7 +32,7 @@ import ( "github.com/theupdateframework/go-tuf/encrypted" - "github.com/sigstore/cosign/pkg/oci/static" + "github.com/sigstore/policy-controller/pkg/oci/static" "github.com/sigstore/sigstore/pkg/cryptoutils" "github.com/sigstore/sigstore/pkg/signature" ) diff --git a/pkg/cosign/kubernetes/secret.go b/pkg/cosign/kubernetes/secret.go index 1461c314c..1161617cd 100644 --- a/pkg/cosign/kubernetes/secret.go +++ b/pkg/cosign/kubernetes/secret.go @@ -27,7 +27,7 @@ import ( k8serrors "k8s.io/apimachinery/pkg/api/errors" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" - "github.com/sigstore/cosign/pkg/cosign" + "github.com/sigstore/policy-controller/pkg/cosign" ) const ( diff --git a/pkg/cosign/kubernetes/secret_test.go b/pkg/cosign/kubernetes/secret_test.go index 9ed86be71..1e19f3829 100644 --- a/pkg/cosign/kubernetes/secret_test.go +++ b/pkg/cosign/kubernetes/secret_test.go @@ -23,7 +23,7 @@ import ( v1 "k8s.io/api/core/v1" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" - "github.com/sigstore/cosign/pkg/cosign" + "github.com/sigstore/policy-controller/pkg/cosign" ) func TestSecret(t *testing.T) { diff --git a/pkg/cosign/kubernetes/webhook/clusterimagepolicy/clusterimagepolicy_types.go b/pkg/cosign/kubernetes/webhook/clusterimagepolicy/clusterimagepolicy_types.go index dfe2b092f..c02c7a3f0 100644 --- a/pkg/cosign/kubernetes/webhook/clusterimagepolicy/clusterimagepolicy_types.go +++ b/pkg/cosign/kubernetes/webhook/clusterimagepolicy/clusterimagepolicy_types.go @@ -25,8 +25,8 @@ import ( "github.com/google/go-containerregistry/pkg/authn/k8schain" "github.com/google/go-containerregistry/pkg/name" "github.com/google/go-containerregistry/pkg/v1/remote" - "github.com/sigstore/cosign/pkg/apis/policy/v1alpha1" - ociremote "github.com/sigstore/cosign/pkg/oci/remote" + "github.com/sigstore/policy-controller/pkg/apis/policy/v1alpha1" + ociremote "github.com/sigstore/policy-controller/pkg/oci/remote" "knative.dev/pkg/apis" kubeclient "knative.dev/pkg/client/injection/kube/client" "knative.dev/pkg/logging" diff --git a/pkg/cosign/kubernetes/webhook/validation.go b/pkg/cosign/kubernetes/webhook/validation.go index c1d0fb405..00b461a70 100644 --- a/pkg/cosign/kubernetes/webhook/validation.go +++ b/pkg/cosign/kubernetes/webhook/validation.go @@ -27,11 +27,11 @@ import ( "knative.dev/pkg/apis" "knative.dev/pkg/logging" - "github.com/sigstore/cosign/cmd/cosign/cli/fulcio/fulcioroots" - v1alpha1 "github.com/sigstore/cosign/pkg/apis/policy/v1alpha1" - "github.com/sigstore/cosign/pkg/cosign" - "github.com/sigstore/cosign/pkg/oci" - ociremote "github.com/sigstore/cosign/pkg/oci/remote" + "github.com/sigstore/policy-controller/cmd/cosign/cli/fulcio/fulcioroots" + v1alpha1 "github.com/sigstore/policy-controller/pkg/apis/policy/v1alpha1" + "github.com/sigstore/policy-controller/pkg/cosign" + "github.com/sigstore/policy-controller/pkg/oci" + ociremote "github.com/sigstore/policy-controller/pkg/oci/remote" "github.com/sigstore/rekor/pkg/generated/client" "github.com/sigstore/sigstore/pkg/signature" ) diff --git a/pkg/cosign/kubernetes/webhook/validator.go b/pkg/cosign/kubernetes/webhook/validator.go index 34efe16fe..ff505f0a4 100644 --- a/pkg/cosign/kubernetes/webhook/validator.go +++ b/pkg/cosign/kubernetes/webhook/validator.go @@ -26,11 +26,11 @@ import ( "github.com/google/go-containerregistry/pkg/authn/k8schain" "github.com/google/go-containerregistry/pkg/name" "github.com/google/go-containerregistry/pkg/v1/remote" - "github.com/sigstore/cosign/pkg/apis/config" - webhookcip "github.com/sigstore/cosign/pkg/cosign/kubernetes/webhook/clusterimagepolicy" - "github.com/sigstore/cosign/pkg/oci" - ociremote "github.com/sigstore/cosign/pkg/oci/remote" - "github.com/sigstore/cosign/pkg/policy" + "github.com/sigstore/policy-controller/pkg/apis/config" + webhookcip "github.com/sigstore/policy-controller/pkg/cosign/kubernetes/webhook/clusterimagepolicy" + "github.com/sigstore/policy-controller/pkg/oci" + ociremote "github.com/sigstore/policy-controller/pkg/oci/remote" + "github.com/sigstore/policy-controller/pkg/policy" "github.com/sigstore/fulcio/pkg/api" rekor "github.com/sigstore/rekor/pkg/client" "github.com/sigstore/rekor/pkg/generated/client" @@ -430,7 +430,7 @@ func ValidatePolicySignaturesForAuthority(ctx context.Context, ref name.Referenc // TODO(vaikas): What should happen if there are multiple keys // Is it even allowed? 'valid' returns success if any key // matches. - // https://github.com/sigstore/cosign/issues/1652 + // https://github.com/sigstore/policy-controller/issues/1652 sps, err := valid(ctx, ref, rekorClient, authority.Key.PublicKeys, remoteOpts...) if err != nil { return nil, fmt.Errorf("failed to validate public keys with authority %s for %s: %w", name, ref.Name(), err) diff --git a/pkg/cosign/kubernetes/webhook/validator_test.go b/pkg/cosign/kubernetes/webhook/validator_test.go index 76ebbecda..c9a5dc5ea 100644 --- a/pkg/cosign/kubernetes/webhook/validator_test.go +++ b/pkg/cosign/kubernetes/webhook/validator_test.go @@ -34,13 +34,13 @@ import ( "github.com/google/go-cmp/cmp" "github.com/google/go-containerregistry/pkg/authn/k8schain" "github.com/google/go-containerregistry/pkg/name" - "github.com/sigstore/cosign/pkg/apis/config" - "github.com/sigstore/cosign/pkg/apis/policy/v1alpha1" - "github.com/sigstore/cosign/pkg/cosign" - webhookcip "github.com/sigstore/cosign/pkg/cosign/kubernetes/webhook/clusterimagepolicy" - "github.com/sigstore/cosign/pkg/oci" - "github.com/sigstore/cosign/pkg/oci/remote" - "github.com/sigstore/cosign/pkg/oci/static" + "github.com/sigstore/policy-controller/pkg/apis/config" + "github.com/sigstore/policy-controller/pkg/apis/policy/v1alpha1" + "github.com/sigstore/policy-controller/pkg/cosign" + webhookcip "github.com/sigstore/policy-controller/pkg/cosign/kubernetes/webhook/clusterimagepolicy" + "github.com/sigstore/policy-controller/pkg/oci" + "github.com/sigstore/policy-controller/pkg/oci/remote" + "github.com/sigstore/policy-controller/pkg/oci/static" batchv1 "k8s.io/api/batch/v1" corev1 "k8s.io/api/core/v1" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" diff --git a/pkg/cosign/remote/index.go b/pkg/cosign/remote/index.go index d40deb2a8..2a263291d 100644 --- a/pkg/cosign/remote/index.go +++ b/pkg/cosign/remote/index.go @@ -27,7 +27,7 @@ import ( "github.com/google/go-containerregistry/pkg/v1/mutate" "github.com/google/go-containerregistry/pkg/v1/remote" "github.com/google/go-containerregistry/pkg/v1/types" - "github.com/sigstore/cosign/pkg/oci/static" + "github.com/sigstore/policy-controller/pkg/oci/static" ) type File interface { diff --git a/pkg/cosign/remote/remote.go b/pkg/cosign/remote/remote.go index 787a19723..6a7edbe15 100644 --- a/pkg/cosign/remote/remote.go +++ b/pkg/cosign/remote/remote.go @@ -22,9 +22,9 @@ import ( "fmt" "os" - "github.com/sigstore/cosign/pkg/oci" - "github.com/sigstore/cosign/pkg/oci/mutate" - "github.com/sigstore/cosign/pkg/oci/static" + "github.com/sigstore/policy-controller/pkg/oci" + "github.com/sigstore/policy-controller/pkg/oci/mutate" + "github.com/sigstore/policy-controller/pkg/oci/static" "github.com/sigstore/sigstore/pkg/signature" ) diff --git a/pkg/cosign/tlog.go b/pkg/cosign/tlog.go index 8d31cea8d..6775ceac3 100644 --- a/pkg/cosign/tlog.go +++ b/pkg/cosign/tlog.go @@ -33,8 +33,8 @@ import ( "github.com/transparency-dev/merkle/proof" "github.com/transparency-dev/merkle/rfc6962" - "github.com/sigstore/cosign/pkg/cosign/bundle" - "github.com/sigstore/cosign/pkg/cosign/tuf" + "github.com/sigstore/policy-controller/pkg/cosign/bundle" + "github.com/sigstore/policy-controller/pkg/cosign/tuf" "github.com/sigstore/rekor/pkg/generated/client" "github.com/sigstore/rekor/pkg/generated/client/entries" "github.com/sigstore/rekor/pkg/generated/client/index" diff --git a/pkg/cosign/verifiers.go b/pkg/cosign/verifiers.go index 7e9efea20..0a638532f 100644 --- a/pkg/cosign/verifiers.go +++ b/pkg/cosign/verifiers.go @@ -25,7 +25,7 @@ import ( "github.com/in-toto/in-toto-golang/in_toto" "github.com/secure-systems-lab/go-securesystemslib/dsse" - "github.com/sigstore/cosign/pkg/oci" + "github.com/sigstore/policy-controller/pkg/oci" "github.com/sigstore/sigstore/pkg/signature/payload" ) diff --git a/pkg/cosign/verifiers_test.go b/pkg/cosign/verifiers_test.go index c8aa4889e..0a1703458 100644 --- a/pkg/cosign/verifiers_test.go +++ b/pkg/cosign/verifiers_test.go @@ -18,7 +18,7 @@ import ( "testing" v1 "github.com/google/go-containerregistry/pkg/v1" - "github.com/sigstore/cosign/pkg/oci/static" + "github.com/sigstore/policy-controller/pkg/oci/static" ) /* diff --git a/pkg/cosign/verify.go b/pkg/cosign/verify.go index ddc228282..a50e3c28d 100644 --- a/pkg/cosign/verify.go +++ b/pkg/cosign/verify.go @@ -32,22 +32,22 @@ import ( "strings" "time" - "github.com/sigstore/cosign/cmd/cosign/cli/fulcio/fulcioverifier/ctl" - cbundle "github.com/sigstore/cosign/pkg/cosign/bundle" - "github.com/sigstore/cosign/pkg/cosign/tuf" + "github.com/sigstore/policy-controller/cmd/cosign/cli/fulcio/fulcioverifier/ctl" + cbundle "github.com/sigstore/policy-controller/pkg/cosign/bundle" + "github.com/sigstore/policy-controller/pkg/cosign/tuf" - "github.com/sigstore/cosign/pkg/blob" - "github.com/sigstore/cosign/pkg/oci/static" - "github.com/sigstore/cosign/pkg/types" + "github.com/sigstore/policy-controller/pkg/blob" + "github.com/sigstore/policy-controller/pkg/oci/static" + "github.com/sigstore/policy-controller/pkg/types" "github.com/cyberphone/json-canonicalization/go/src/webpki.org/jsoncanonicalizer" "github.com/google/go-containerregistry/pkg/name" v1 "github.com/google/go-containerregistry/pkg/v1" ssldsse "github.com/secure-systems-lab/go-securesystemslib/dsse" - "github.com/sigstore/cosign/pkg/oci" - "github.com/sigstore/cosign/pkg/oci/layout" - ociremote "github.com/sigstore/cosign/pkg/oci/remote" + "github.com/sigstore/policy-controller/pkg/oci" + "github.com/sigstore/policy-controller/pkg/oci/layout" + ociremote "github.com/sigstore/policy-controller/pkg/oci/remote" "github.com/sigstore/rekor/pkg/generated/client" "github.com/sigstore/rekor/pkg/generated/models" "github.com/sigstore/sigstore/pkg/cryptoutils" diff --git a/pkg/cosign/verify_test.go b/pkg/cosign/verify_test.go index 115aba520..599211ab2 100644 --- a/pkg/cosign/verify_test.go +++ b/pkg/cosign/verify_test.go @@ -40,11 +40,11 @@ import ( v1 "github.com/google/go-containerregistry/pkg/v1" "github.com/in-toto/in-toto-golang/in_toto" "github.com/secure-systems-lab/go-securesystemslib/dsse" - "github.com/sigstore/cosign/internal/pkg/cosign/rekor/mock" - "github.com/sigstore/cosign/pkg/cosign/bundle" - "github.com/sigstore/cosign/pkg/oci/static" - "github.com/sigstore/cosign/pkg/types" - "github.com/sigstore/cosign/test" + "github.com/sigstore/policy-controller/internal/pkg/cosign/rekor/mock" + "github.com/sigstore/policy-controller/pkg/cosign/bundle" + "github.com/sigstore/policy-controller/pkg/oci/static" + "github.com/sigstore/policy-controller/pkg/types" + "github.com/sigstore/policy-controller/test" "github.com/sigstore/rekor/pkg/generated/client" rtypes "github.com/sigstore/rekor/pkg/types" "github.com/sigstore/sigstore/pkg/cryptoutils" @@ -345,7 +345,7 @@ func TestVerifyImageSignatureWithExistingSub(t *testing.T) { // This test ensures that image signature validation fails properly if we are // using a SigVerifier with Rekor. -// See https://github.com/sigstore/cosign/issues/1816 for more details. +// See https://github.com/sigstore/policy-controller/issues/1816 for more details. func TestVerifyImageSignatureWithSigVerifierAndRekor(t *testing.T) { sv, privKey, err := signature.NewDefaultECDSASignerVerifier() if err != nil { diff --git a/pkg/oci/empty/empty.go b/pkg/oci/empty/empty.go index 1b2437e72..7e11c72f3 100644 --- a/pkg/oci/empty/empty.go +++ b/pkg/oci/empty/empty.go @@ -21,7 +21,7 @@ import ( "github.com/google/go-containerregistry/pkg/v1/mutate" "github.com/google/go-containerregistry/pkg/v1/types" - "github.com/sigstore/cosign/pkg/oci" + "github.com/sigstore/policy-controller/pkg/oci" ) // Signatures constructs an empty oci.Signatures. diff --git a/pkg/oci/empty/empty_test.go b/pkg/oci/empty/empty_test.go index a73a28d03..a745e2dba 100644 --- a/pkg/oci/empty/empty_test.go +++ b/pkg/oci/empty/empty_test.go @@ -21,7 +21,7 @@ import ( "github.com/google/go-containerregistry/pkg/v1/types" - "github.com/sigstore/cosign/pkg/oci" + "github.com/sigstore/policy-controller/pkg/oci" ) func TestEmptyImage(t *testing.T) { diff --git a/pkg/oci/empty/signed.go b/pkg/oci/empty/signed.go index 402ed72f2..42c221713 100644 --- a/pkg/oci/empty/signed.go +++ b/pkg/oci/empty/signed.go @@ -22,7 +22,7 @@ import ( "github.com/google/go-containerregistry/pkg/name" v1 "github.com/google/go-containerregistry/pkg/v1" "github.com/google/go-containerregistry/pkg/v1/empty" - "github.com/sigstore/cosign/pkg/oci" + "github.com/sigstore/policy-controller/pkg/oci" ) type signedImage struct { diff --git a/pkg/oci/internal/signature/layer.go b/pkg/oci/internal/signature/layer.go index 3a815d3c6..d4b029bd3 100644 --- a/pkg/oci/internal/signature/layer.go +++ b/pkg/oci/internal/signature/layer.go @@ -23,8 +23,8 @@ import ( "strings" v1 "github.com/google/go-containerregistry/pkg/v1" - "github.com/sigstore/cosign/pkg/cosign/bundle" - "github.com/sigstore/cosign/pkg/oci" + "github.com/sigstore/policy-controller/pkg/cosign/bundle" + "github.com/sigstore/policy-controller/pkg/oci" "github.com/sigstore/sigstore/pkg/cryptoutils" ) diff --git a/pkg/oci/internal/signature/layer_test.go b/pkg/oci/internal/signature/layer_test.go index 929dd9756..7fcbdc7f2 100644 --- a/pkg/oci/internal/signature/layer_test.go +++ b/pkg/oci/internal/signature/layer_test.go @@ -26,7 +26,7 @@ import ( v1 "github.com/google/go-containerregistry/pkg/v1" "github.com/google/go-containerregistry/pkg/v1/random" "github.com/google/go-containerregistry/pkg/v1/types" - "github.com/sigstore/cosign/pkg/cosign/bundle" + "github.com/sigstore/policy-controller/pkg/cosign/bundle" ) func mustDecode(s string) []byte { diff --git a/pkg/oci/layout/index.go b/pkg/oci/layout/index.go index a7e556045..43b03cc94 100644 --- a/pkg/oci/layout/index.go +++ b/pkg/oci/layout/index.go @@ -20,8 +20,8 @@ import ( v1 "github.com/google/go-containerregistry/pkg/v1" "github.com/google/go-containerregistry/pkg/v1/layout" - "github.com/sigstore/cosign/pkg/oci" - "github.com/sigstore/cosign/pkg/oci/signed" + "github.com/sigstore/policy-controller/pkg/oci" + "github.com/sigstore/policy-controller/pkg/oci/signed" ) const ( diff --git a/pkg/oci/layout/signatures.go b/pkg/oci/layout/signatures.go index c95388082..1ff3f0024 100644 --- a/pkg/oci/layout/signatures.go +++ b/pkg/oci/layout/signatures.go @@ -17,8 +17,8 @@ package layout import ( v1 "github.com/google/go-containerregistry/pkg/v1" - "github.com/sigstore/cosign/pkg/oci" - "github.com/sigstore/cosign/pkg/oci/internal/signature" + "github.com/sigstore/policy-controller/pkg/oci" + "github.com/sigstore/policy-controller/pkg/oci/internal/signature" ) type sigs struct { diff --git a/pkg/oci/layout/write.go b/pkg/oci/layout/write.go index 2bc1f7f98..2db782c48 100644 --- a/pkg/oci/layout/write.go +++ b/pkg/oci/layout/write.go @@ -21,7 +21,7 @@ import ( v1 "github.com/google/go-containerregistry/pkg/v1" "github.com/google/go-containerregistry/pkg/v1/empty" "github.com/google/go-containerregistry/pkg/v1/layout" - "github.com/sigstore/cosign/pkg/oci" + "github.com/sigstore/policy-controller/pkg/oci" ) // WriteSignedImage writes the image and all related signatures, attestations and attachments diff --git a/pkg/oci/layout/write_test.go b/pkg/oci/layout/write_test.go index f9f4c0506..204ca7674 100644 --- a/pkg/oci/layout/write_test.go +++ b/pkg/oci/layout/write_test.go @@ -23,15 +23,15 @@ import ( "github.com/google/go-cmp/cmp" v1 "github.com/google/go-containerregistry/pkg/v1" "github.com/google/go-containerregistry/pkg/v1/random" - "github.com/sigstore/cosign/pkg/oci" - "github.com/sigstore/cosign/pkg/oci/mutate" - "github.com/sigstore/cosign/pkg/oci/signed" - "github.com/sigstore/cosign/pkg/oci/static" + "github.com/sigstore/policy-controller/pkg/oci" + "github.com/sigstore/policy-controller/pkg/oci/mutate" + "github.com/sigstore/policy-controller/pkg/oci/signed" + "github.com/sigstore/policy-controller/pkg/oci/static" ) func TestReadWrite(t *testing.T) { if runtime.GOOS == "windows" { - t.Skip("test is flaky on windows, see https://github.com/sigstore/cosign/issues/1389") + t.Skip("test is flaky on windows, see https://github.com/sigstore/policy-controller/issues/1389") } // write random signed image to disk si := randomSignedImage(t) diff --git a/pkg/oci/mutate/map.go b/pkg/oci/mutate/map.go index 61326fa42..55b813591 100644 --- a/pkg/oci/mutate/map.go +++ b/pkg/oci/mutate/map.go @@ -24,7 +24,7 @@ import ( "github.com/google/go-containerregistry/pkg/v1/empty" "github.com/google/go-containerregistry/pkg/v1/mutate" "github.com/google/go-containerregistry/pkg/v1/types" - "github.com/sigstore/cosign/pkg/oci" + "github.com/sigstore/policy-controller/pkg/oci" ) // Fn is the signature of the callback supplied to Map. diff --git a/pkg/oci/mutate/map_test.go b/pkg/oci/mutate/map_test.go index 77c706d59..53a7d12d8 100644 --- a/pkg/oci/mutate/map_test.go +++ b/pkg/oci/mutate/map_test.go @@ -23,8 +23,8 @@ import ( "github.com/google/go-containerregistry/pkg/v1/mutate" "github.com/google/go-containerregistry/pkg/v1/random" "github.com/google/go-containerregistry/pkg/v1/types" - "github.com/sigstore/cosign/pkg/oci" - "github.com/sigstore/cosign/pkg/oci/signed" + "github.com/sigstore/policy-controller/pkg/oci" + "github.com/sigstore/policy-controller/pkg/oci/signed" ) func TestMapImage(t *testing.T) { diff --git a/pkg/oci/mutate/mutate.go b/pkg/oci/mutate/mutate.go index 2c6a3f142..e921e2b9d 100644 --- a/pkg/oci/mutate/mutate.go +++ b/pkg/oci/mutate/mutate.go @@ -21,9 +21,9 @@ import ( v1 "github.com/google/go-containerregistry/pkg/v1" "github.com/google/go-containerregistry/pkg/v1/mutate" - "github.com/sigstore/cosign/pkg/oci" - "github.com/sigstore/cosign/pkg/oci/empty" - "github.com/sigstore/cosign/pkg/oci/signed" + "github.com/sigstore/policy-controller/pkg/oci" + "github.com/sigstore/policy-controller/pkg/oci/empty" + "github.com/sigstore/policy-controller/pkg/oci/signed" ) // Appendable is our signed version of mutate.Appendable diff --git a/pkg/oci/mutate/mutate_test.go b/pkg/oci/mutate/mutate_test.go index 9e1eef4b9..1119cd28b 100644 --- a/pkg/oci/mutate/mutate_test.go +++ b/pkg/oci/mutate/mutate_test.go @@ -25,9 +25,9 @@ import ( v1 "github.com/google/go-containerregistry/pkg/v1" "github.com/google/go-containerregistry/pkg/v1/mutate" "github.com/google/go-containerregistry/pkg/v1/random" - "github.com/sigstore/cosign/pkg/oci" - "github.com/sigstore/cosign/pkg/oci/signed" - "github.com/sigstore/cosign/pkg/oci/static" + "github.com/sigstore/policy-controller/pkg/oci" + "github.com/sigstore/policy-controller/pkg/oci/signed" + "github.com/sigstore/policy-controller/pkg/oci/static" ) func TestAppendManifests(t *testing.T) { diff --git a/pkg/oci/mutate/options.go b/pkg/oci/mutate/options.go index 0c19f3da7..6d79c1436 100644 --- a/pkg/oci/mutate/options.go +++ b/pkg/oci/mutate/options.go @@ -17,8 +17,8 @@ package mutate import ( "github.com/google/go-containerregistry/pkg/v1/types" - "github.com/sigstore/cosign/pkg/cosign/bundle" - "github.com/sigstore/cosign/pkg/oci" + "github.com/sigstore/policy-controller/pkg/cosign/bundle" + "github.com/sigstore/policy-controller/pkg/oci" ) // DupeDetector scans a list of signatures looking for a duplicate. diff --git a/pkg/oci/mutate/signature.go b/pkg/oci/mutate/signature.go index ed07f4540..fb5acec2c 100644 --- a/pkg/oci/mutate/signature.go +++ b/pkg/oci/mutate/signature.go @@ -23,9 +23,9 @@ import ( v1 "github.com/google/go-containerregistry/pkg/v1" "github.com/google/go-containerregistry/pkg/v1/types" - "github.com/sigstore/cosign/pkg/cosign/bundle" - "github.com/sigstore/cosign/pkg/oci" - "github.com/sigstore/cosign/pkg/oci/static" + "github.com/sigstore/policy-controller/pkg/cosign/bundle" + "github.com/sigstore/policy-controller/pkg/oci" + "github.com/sigstore/policy-controller/pkg/oci/static" "github.com/sigstore/sigstore/pkg/cryptoutils" ) diff --git a/pkg/oci/mutate/signature_test.go b/pkg/oci/mutate/signature_test.go index 1e17e9bcf..669e9cb86 100644 --- a/pkg/oci/mutate/signature_test.go +++ b/pkg/oci/mutate/signature_test.go @@ -21,9 +21,9 @@ import ( "github.com/google/go-cmp/cmp" "github.com/google/go-containerregistry/pkg/v1/types" - "github.com/sigstore/cosign/pkg/cosign/bundle" - "github.com/sigstore/cosign/pkg/oci" - "github.com/sigstore/cosign/pkg/oci/static" + "github.com/sigstore/policy-controller/pkg/cosign/bundle" + "github.com/sigstore/policy-controller/pkg/oci" + "github.com/sigstore/policy-controller/pkg/oci/static" ) var ( diff --git a/pkg/oci/mutate/signatures.go b/pkg/oci/mutate/signatures.go index 53f750d9e..ddd089a90 100644 --- a/pkg/oci/mutate/signatures.go +++ b/pkg/oci/mutate/signatures.go @@ -19,7 +19,7 @@ import ( v1 "github.com/google/go-containerregistry/pkg/v1" "github.com/google/go-containerregistry/pkg/v1/empty" "github.com/google/go-containerregistry/pkg/v1/mutate" - "github.com/sigstore/cosign/pkg/oci" + "github.com/sigstore/policy-controller/pkg/oci" ) // AppendSignatures produces a new oci.Signatures with the provided signatures diff --git a/pkg/oci/mutate/signatures_test.go b/pkg/oci/mutate/signatures_test.go index 14978ce78..0a8a26403 100644 --- a/pkg/oci/mutate/signatures_test.go +++ b/pkg/oci/mutate/signatures_test.go @@ -18,8 +18,8 @@ package mutate import ( "testing" - "github.com/sigstore/cosign/pkg/oci/empty" - "github.com/sigstore/cosign/pkg/oci/static" + "github.com/sigstore/policy-controller/pkg/oci/empty" + "github.com/sigstore/policy-controller/pkg/oci/static" ) func TestAppendSignatures(t *testing.T) { diff --git a/pkg/oci/remote/image.go b/pkg/oci/remote/image.go index ce532cd24..7d0f363aa 100644 --- a/pkg/oci/remote/image.go +++ b/pkg/oci/remote/image.go @@ -22,7 +22,7 @@ import ( "github.com/google/go-containerregistry/pkg/name" v1 "github.com/google/go-containerregistry/pkg/v1" "github.com/google/go-containerregistry/pkg/v1/remote/transport" - "github.com/sigstore/cosign/pkg/oci" + "github.com/sigstore/policy-controller/pkg/oci" ) // SignedImage provides access to a remote image reference, and its signatures. diff --git a/pkg/oci/remote/index.go b/pkg/oci/remote/index.go index 5be65da71..5751b3762 100644 --- a/pkg/oci/remote/index.go +++ b/pkg/oci/remote/index.go @@ -22,7 +22,7 @@ import ( "github.com/google/go-containerregistry/pkg/name" v1 "github.com/google/go-containerregistry/pkg/v1" "github.com/google/go-containerregistry/pkg/v1/remote/transport" - "github.com/sigstore/cosign/pkg/oci" + "github.com/sigstore/policy-controller/pkg/oci" ) // SignedImageIndex provides access to a remote index reference, and its signatures. diff --git a/pkg/oci/remote/index_test.go b/pkg/oci/remote/index_test.go index f761894c7..0af5d6859 100644 --- a/pkg/oci/remote/index_test.go +++ b/pkg/oci/remote/index_test.go @@ -25,7 +25,7 @@ import ( "github.com/google/go-containerregistry/pkg/v1/random" "github.com/google/go-containerregistry/pkg/v1/remote" "github.com/google/go-containerregistry/pkg/v1/types" - "github.com/sigstore/cosign/pkg/oci" + "github.com/sigstore/policy-controller/pkg/oci" ) func TestSignedImageIndex(t *testing.T) { diff --git a/pkg/oci/remote/remote.go b/pkg/oci/remote/remote.go index 146569d9c..8ceb19d8b 100644 --- a/pkg/oci/remote/remote.go +++ b/pkg/oci/remote/remote.go @@ -26,7 +26,7 @@ import ( "github.com/google/go-containerregistry/pkg/v1/remote" "github.com/google/go-containerregistry/pkg/v1/remote/transport" "github.com/google/go-containerregistry/pkg/v1/types" - "github.com/sigstore/cosign/pkg/oci" + "github.com/sigstore/policy-controller/pkg/oci" ) // These enable mocking for unit testing without faking an entire registry. diff --git a/pkg/oci/remote/signatures.go b/pkg/oci/remote/signatures.go index 172d7f6f5..610757ddf 100644 --- a/pkg/oci/remote/signatures.go +++ b/pkg/oci/remote/signatures.go @@ -22,9 +22,9 @@ import ( "github.com/google/go-containerregistry/pkg/name" v1 "github.com/google/go-containerregistry/pkg/v1" "github.com/google/go-containerregistry/pkg/v1/remote/transport" - "github.com/sigstore/cosign/pkg/oci" - "github.com/sigstore/cosign/pkg/oci/empty" - "github.com/sigstore/cosign/pkg/oci/internal/signature" + "github.com/sigstore/policy-controller/pkg/oci" + "github.com/sigstore/policy-controller/pkg/oci/empty" + "github.com/sigstore/policy-controller/pkg/oci/internal/signature" ) // Signatures fetches the signatures image represented by the named reference. diff --git a/pkg/oci/remote/write.go b/pkg/oci/remote/write.go index 603ff6eeb..9535e16fd 100644 --- a/pkg/oci/remote/write.go +++ b/pkg/oci/remote/write.go @@ -21,7 +21,7 @@ import ( "github.com/google/go-containerregistry/pkg/name" v1 "github.com/google/go-containerregistry/pkg/v1" "github.com/google/go-containerregistry/pkg/v1/remote" - "github.com/sigstore/cosign/pkg/oci" + "github.com/sigstore/policy-controller/pkg/oci" ) // WriteSignedImageIndexImages writes the images within the image index diff --git a/pkg/oci/remote/write_test.go b/pkg/oci/remote/write_test.go index f978ac528..db6647fe9 100644 --- a/pkg/oci/remote/write_test.go +++ b/pkg/oci/remote/write_test.go @@ -23,9 +23,9 @@ import ( v1 "github.com/google/go-containerregistry/pkg/v1" "github.com/google/go-containerregistry/pkg/v1/random" "github.com/google/go-containerregistry/pkg/v1/remote" - "github.com/sigstore/cosign/pkg/oci/mutate" - "github.com/sigstore/cosign/pkg/oci/signed" - "github.com/sigstore/cosign/pkg/oci/static" + "github.com/sigstore/policy-controller/pkg/oci/mutate" + "github.com/sigstore/policy-controller/pkg/oci/signed" + "github.com/sigstore/policy-controller/pkg/oci/static" ) func TestWriteSignatures(t *testing.T) { diff --git a/pkg/oci/signature/layer.go b/pkg/oci/signature/layer.go index 3a815d3c6..d4b029bd3 100644 --- a/pkg/oci/signature/layer.go +++ b/pkg/oci/signature/layer.go @@ -23,8 +23,8 @@ import ( "strings" v1 "github.com/google/go-containerregistry/pkg/v1" - "github.com/sigstore/cosign/pkg/cosign/bundle" - "github.com/sigstore/cosign/pkg/oci" + "github.com/sigstore/policy-controller/pkg/cosign/bundle" + "github.com/sigstore/policy-controller/pkg/oci" "github.com/sigstore/sigstore/pkg/cryptoutils" ) diff --git a/pkg/oci/signature/layer_test.go b/pkg/oci/signature/layer_test.go index 929dd9756..7fcbdc7f2 100644 --- a/pkg/oci/signature/layer_test.go +++ b/pkg/oci/signature/layer_test.go @@ -26,7 +26,7 @@ import ( v1 "github.com/google/go-containerregistry/pkg/v1" "github.com/google/go-containerregistry/pkg/v1/random" "github.com/google/go-containerregistry/pkg/v1/types" - "github.com/sigstore/cosign/pkg/cosign/bundle" + "github.com/sigstore/policy-controller/pkg/cosign/bundle" ) func mustDecode(s string) []byte { diff --git a/pkg/oci/signatures.go b/pkg/oci/signatures.go index e66b7c6c9..71a5516b0 100644 --- a/pkg/oci/signatures.go +++ b/pkg/oci/signatures.go @@ -19,7 +19,7 @@ import ( "crypto/x509" v1 "github.com/google/go-containerregistry/pkg/v1" - "github.com/sigstore/cosign/pkg/cosign/bundle" + "github.com/sigstore/policy-controller/pkg/cosign/bundle" ) // Signatures represents a set of signatures that are associated with a particular diff --git a/pkg/oci/signed/image.go b/pkg/oci/signed/image.go index 19321e1f7..3462aa9a4 100644 --- a/pkg/oci/signed/image.go +++ b/pkg/oci/signed/image.go @@ -20,8 +20,8 @@ import ( v1 "github.com/google/go-containerregistry/pkg/v1" - "github.com/sigstore/cosign/pkg/oci" - "github.com/sigstore/cosign/pkg/oci/empty" + "github.com/sigstore/policy-controller/pkg/oci" + "github.com/sigstore/policy-controller/pkg/oci/empty" ) // Image returns an oci.SignedImage form of the v1.Image with no signatures. diff --git a/pkg/oci/signed/index.go b/pkg/oci/signed/index.go index d611ccea9..89ea7b273 100644 --- a/pkg/oci/signed/index.go +++ b/pkg/oci/signed/index.go @@ -20,8 +20,8 @@ import ( v1 "github.com/google/go-containerregistry/pkg/v1" - "github.com/sigstore/cosign/pkg/oci" - "github.com/sigstore/cosign/pkg/oci/empty" + "github.com/sigstore/policy-controller/pkg/oci" + "github.com/sigstore/policy-controller/pkg/oci/empty" ) // ImageIndex returns an oci.SignedImageIndex form of the v1.ImageIndex with diff --git a/pkg/oci/signed/index_test.go b/pkg/oci/signed/index_test.go index 207592e0e..5c66fbfbd 100644 --- a/pkg/oci/signed/index_test.go +++ b/pkg/oci/signed/index_test.go @@ -22,7 +22,7 @@ import ( "github.com/google/go-containerregistry/pkg/v1/mutate" "github.com/google/go-containerregistry/pkg/v1/random" "github.com/google/go-containerregistry/pkg/v1/types" - "github.com/sigstore/cosign/pkg/oci" + "github.com/sigstore/policy-controller/pkg/oci" ) func TestImageIndex(t *testing.T) { diff --git a/pkg/oci/static/file.go b/pkg/oci/static/file.go index 270b5a6b7..bf6b9479a 100644 --- a/pkg/oci/static/file.go +++ b/pkg/oci/static/file.go @@ -22,8 +22,8 @@ import ( "github.com/google/go-containerregistry/pkg/v1/empty" "github.com/google/go-containerregistry/pkg/v1/mutate" "github.com/google/go-containerregistry/pkg/v1/types" - "github.com/sigstore/cosign/pkg/oci" - "github.com/sigstore/cosign/pkg/oci/signed" + "github.com/sigstore/policy-controller/pkg/oci" + "github.com/sigstore/policy-controller/pkg/oci/signed" ) // NewFile constructs a new v1.Image with the provided payload. diff --git a/pkg/oci/static/options.go b/pkg/oci/static/options.go index e00b6cdb4..165760798 100644 --- a/pkg/oci/static/options.go +++ b/pkg/oci/static/options.go @@ -19,8 +19,8 @@ import ( "encoding/json" "github.com/google/go-containerregistry/pkg/v1/types" - "github.com/sigstore/cosign/pkg/cosign/bundle" - ctypes "github.com/sigstore/cosign/pkg/types" + "github.com/sigstore/policy-controller/pkg/cosign/bundle" + ctypes "github.com/sigstore/policy-controller/pkg/types" ) // Option is a functional option for customizing static signatures. diff --git a/pkg/oci/static/options_test.go b/pkg/oci/static/options_test.go index 63600c791..441ac7661 100644 --- a/pkg/oci/static/options_test.go +++ b/pkg/oci/static/options_test.go @@ -21,8 +21,8 @@ import ( "github.com/google/go-cmp/cmp" "github.com/google/go-containerregistry/pkg/v1/types" - "github.com/sigstore/cosign/pkg/cosign/bundle" - ctypes "github.com/sigstore/cosign/pkg/types" + "github.com/sigstore/policy-controller/pkg/cosign/bundle" + ctypes "github.com/sigstore/policy-controller/pkg/types" ) func TestOptions(t *testing.T) { diff --git a/pkg/oci/static/signature.go b/pkg/oci/static/signature.go index 882ff87e7..e6076cd20 100644 --- a/pkg/oci/static/signature.go +++ b/pkg/oci/static/signature.go @@ -22,8 +22,8 @@ import ( v1 "github.com/google/go-containerregistry/pkg/v1" "github.com/google/go-containerregistry/pkg/v1/types" - "github.com/sigstore/cosign/pkg/cosign/bundle" - "github.com/sigstore/cosign/pkg/oci" + "github.com/sigstore/policy-controller/pkg/cosign/bundle" + "github.com/sigstore/policy-controller/pkg/oci" "github.com/sigstore/sigstore/pkg/cryptoutils" ) diff --git a/pkg/oci/static/signature_test.go b/pkg/oci/static/signature_test.go index 1ef5beccb..71e886640 100644 --- a/pkg/oci/static/signature_test.go +++ b/pkg/oci/static/signature_test.go @@ -24,7 +24,7 @@ import ( "github.com/google/go-cmp/cmp" v1 "github.com/google/go-containerregistry/pkg/v1" "github.com/google/go-containerregistry/pkg/v1/types" - "github.com/sigstore/cosign/pkg/cosign/bundle" + "github.com/sigstore/policy-controller/pkg/cosign/bundle" ) func TestNewSignatureBasic(t *testing.T) { diff --git a/pkg/oci/walk/walk.go b/pkg/oci/walk/walk.go index 0ba7a30f1..46cbf6114 100644 --- a/pkg/oci/walk/walk.go +++ b/pkg/oci/walk/walk.go @@ -18,8 +18,8 @@ package walk import ( "context" - "github.com/sigstore/cosign/pkg/oci" - "github.com/sigstore/cosign/pkg/oci/mutate" + "github.com/sigstore/policy-controller/pkg/oci" + "github.com/sigstore/policy-controller/pkg/oci/mutate" ) // Fn is the signature of the callback supplied to SignedEntity. diff --git a/pkg/oci/walk/walk_test.go b/pkg/oci/walk/walk_test.go index 50e903c79..3b4cd91a2 100644 --- a/pkg/oci/walk/walk_test.go +++ b/pkg/oci/walk/walk_test.go @@ -22,8 +22,8 @@ import ( "github.com/google/go-containerregistry/pkg/v1/mutate" "github.com/google/go-containerregistry/pkg/v1/random" - "github.com/sigstore/cosign/pkg/oci" - "github.com/sigstore/cosign/pkg/oci/signed" + "github.com/sigstore/policy-controller/pkg/oci" + "github.com/sigstore/policy-controller/pkg/oci/signed" ) func TestMapImage(t *testing.T) { diff --git a/pkg/policy/attestation.go b/pkg/policy/attestation.go index 0a10bf2a1..f7cc3a223 100644 --- a/pkg/policy/attestation.go +++ b/pkg/policy/attestation.go @@ -22,10 +22,10 @@ import ( "fmt" "github.com/in-toto/in-toto-golang/in_toto" - "github.com/sigstore/cosign/pkg/oci" + "github.com/sigstore/policy-controller/pkg/oci" - "github.com/sigstore/cosign/cmd/cosign/cli/options" - "github.com/sigstore/cosign/pkg/cosign/attestation" + "github.com/sigstore/policy-controller/cmd/cosign/cli/options" + "github.com/sigstore/policy-controller/pkg/cosign/attestation" ) // AttestationToPayloadJSON takes in a verified Attestation (oci.Signature) and diff --git a/pkg/policy/attestation_test.go b/pkg/policy/attestation_test.go index c79fb4bab..0893ef0f0 100644 --- a/pkg/policy/attestation_test.go +++ b/pkg/policy/attestation_test.go @@ -28,10 +28,10 @@ import ( v1 "github.com/google/go-containerregistry/pkg/v1" "github.com/google/go-containerregistry/pkg/v1/types" "github.com/in-toto/in-toto-golang/in_toto" - "github.com/sigstore/cosign/pkg/cosign/attestation" - "github.com/sigstore/cosign/pkg/cosign/bundle" - "github.com/sigstore/cosign/pkg/oci" - "github.com/sigstore/cosign/pkg/oci/static" + "github.com/sigstore/policy-controller/pkg/cosign/attestation" + "github.com/sigstore/policy-controller/pkg/cosign/bundle" + "github.com/sigstore/policy-controller/pkg/oci" + "github.com/sigstore/policy-controller/pkg/oci/static" ) type failingAttestation struct { diff --git a/pkg/policy/eval.go b/pkg/policy/eval.go index 36892fd39..5e5186032 100644 --- a/pkg/policy/eval.go +++ b/pkg/policy/eval.go @@ -20,7 +20,7 @@ import ( "fmt" "cuelang.org/go/cue/cuecontext" - "github.com/sigstore/cosign/pkg/cosign/rego" + "github.com/sigstore/policy-controller/pkg/cosign/rego" "knative.dev/pkg/logging" ) diff --git a/pkg/providers/all/all.go b/pkg/providers/all/all.go index de82b4bae..14891cb70 100644 --- a/pkg/providers/all/all.go +++ b/pkg/providers/all/all.go @@ -16,13 +16,13 @@ package all import ( - "github.com/sigstore/cosign/pkg/providers" + "github.com/sigstore/policy-controller/pkg/providers" // Link in all of the providers. - _ "github.com/sigstore/cosign/pkg/providers/filesystem" - _ "github.com/sigstore/cosign/pkg/providers/github" - _ "github.com/sigstore/cosign/pkg/providers/google" - _ "github.com/sigstore/cosign/pkg/providers/spiffe" + _ "github.com/sigstore/policy-controller/pkg/providers/filesystem" + _ "github.com/sigstore/policy-controller/pkg/providers/github" + _ "github.com/sigstore/policy-controller/pkg/providers/google" + _ "github.com/sigstore/policy-controller/pkg/providers/spiffe" ) // Alias these methods, so that folks can import this to get all providers. diff --git a/pkg/providers/filesystem/filesystem.go b/pkg/providers/filesystem/filesystem.go index cc0366ff5..50e0d6947 100644 --- a/pkg/providers/filesystem/filesystem.go +++ b/pkg/providers/filesystem/filesystem.go @@ -19,7 +19,7 @@ import ( "context" "os" - "github.com/sigstore/cosign/pkg/providers" + "github.com/sigstore/policy-controller/pkg/providers" ) func init() { @@ -34,7 +34,7 @@ const ( // FilesystemTokenPath is the path to where we read an OIDC // token from the filesystem. // nolint - FilesystemTokenPath = "/var/run/sigstore/cosign/oidc-token" + FilesystemTokenPath = "/var/run/sigstore/policy-controller/oidc-token" ) // Enabled implements providers.Interface diff --git a/pkg/providers/github/github.go b/pkg/providers/github/github.go index db207af43..fcf17c996 100644 --- a/pkg/providers/github/github.go +++ b/pkg/providers/github/github.go @@ -21,7 +21,7 @@ import ( "net/http" "os" - "github.com/sigstore/cosign/pkg/providers" + "github.com/sigstore/policy-controller/pkg/providers" ) func init() { diff --git a/pkg/providers/google/google.go b/pkg/providers/google/google.go index f7638d197..5096784bd 100644 --- a/pkg/providers/google/google.go +++ b/pkg/providers/google/google.go @@ -23,7 +23,7 @@ import ( "google.golang.org/api/idtoken" "google.golang.org/api/impersonate" - "github.com/sigstore/cosign/pkg/providers" + "github.com/sigstore/policy-controller/pkg/providers" ) func init() { diff --git a/pkg/providers/spiffe/spiffe.go b/pkg/providers/spiffe/spiffe.go index b8b63382c..a9047a60c 100644 --- a/pkg/providers/spiffe/spiffe.go +++ b/pkg/providers/spiffe/spiffe.go @@ -21,7 +21,7 @@ import ( "github.com/spiffe/go-spiffe/v2/svid/jwtsvid" - "github.com/sigstore/cosign/pkg/providers" + "github.com/sigstore/policy-controller/pkg/providers" "github.com/spiffe/go-spiffe/v2/workloadapi" ) diff --git a/pkg/reconciler/clusterimagepolicy/clusterimagepolicy.go b/pkg/reconciler/clusterimagepolicy/clusterimagepolicy.go index 72b501c90..e432ccb0b 100644 --- a/pkg/reconciler/clusterimagepolicy/clusterimagepolicy.go +++ b/pkg/reconciler/clusterimagepolicy/clusterimagepolicy.go @@ -20,12 +20,12 @@ import ( "fmt" "strings" - "github.com/sigstore/cosign/pkg/apis/config" - "github.com/sigstore/cosign/pkg/apis/policy/v1alpha1" - "github.com/sigstore/cosign/pkg/apis/utils" - clusterimagepolicyreconciler "github.com/sigstore/cosign/pkg/client/injection/reconciler/policy/v1alpha1/clusterimagepolicy" - webhookcip "github.com/sigstore/cosign/pkg/cosign/kubernetes/webhook/clusterimagepolicy" - "github.com/sigstore/cosign/pkg/reconciler/clusterimagepolicy/resources" + "github.com/sigstore/policy-controller/pkg/apis/config" + "github.com/sigstore/policy-controller/pkg/apis/policy/v1alpha1" + "github.com/sigstore/policy-controller/pkg/apis/utils" + clusterimagepolicyreconciler "github.com/sigstore/policy-controller/pkg/client/injection/reconciler/policy/v1alpha1/clusterimagepolicy" + webhookcip "github.com/sigstore/policy-controller/pkg/cosign/kubernetes/webhook/clusterimagepolicy" + "github.com/sigstore/policy-controller/pkg/reconciler/clusterimagepolicy/resources" corev1 "k8s.io/api/core/v1" apierrs "k8s.io/apimachinery/pkg/api/errors" @@ -39,7 +39,7 @@ import ( "knative.dev/pkg/system" "knative.dev/pkg/tracker" - sigs "github.com/sigstore/cosign/pkg/signature" + sigs "github.com/sigstore/policy-controller/pkg/signature" "github.com/sigstore/sigstore/pkg/signature/kms" signatureoptions "github.com/sigstore/sigstore/pkg/signature/options" ) @@ -189,7 +189,7 @@ func getKMSPublicKey(ctx context.Context, keyID string) (string, error) { // is modified. // There's still some discussion about how to handle multiple keys in a secret // for now, just grab one from it. For reference, the discussion is here: -// TODO(vaikas): https://github.com/sigstore/cosign/issues/1573 +// TODO(vaikas): https://github.com/sigstore/policy-controller/issues/1573 func (r *Reconciler) inlineAndTrackSecret(ctx context.Context, cip *v1alpha1.ClusterImagePolicy, keyref *v1alpha1.KeyRef) error { if err := r.tracker.TrackReference(tracker.Reference{ APIVersion: "v1", diff --git a/pkg/reconciler/clusterimagepolicy/clusterimagepolicy_test.go b/pkg/reconciler/clusterimagepolicy/clusterimagepolicy_test.go index b5f9c168b..88f6469ca 100644 --- a/pkg/reconciler/clusterimagepolicy/clusterimagepolicy_test.go +++ b/pkg/reconciler/clusterimagepolicy/clusterimagepolicy_test.go @@ -24,10 +24,10 @@ import ( logtesting "knative.dev/pkg/logging/testing" - "github.com/sigstore/cosign/pkg/apis/config" - "github.com/sigstore/cosign/pkg/apis/policy/v1alpha1" - fakecosignclient "github.com/sigstore/cosign/pkg/client/injection/client/fake" - "github.com/sigstore/cosign/pkg/client/injection/reconciler/policy/v1alpha1/clusterimagepolicy" + "github.com/sigstore/policy-controller/pkg/apis/config" + "github.com/sigstore/policy-controller/pkg/apis/policy/v1alpha1" + fakecosignclient "github.com/sigstore/policy-controller/pkg/client/injection/client/fake" + "github.com/sigstore/policy-controller/pkg/client/injection/reconciler/policy/v1alpha1/clusterimagepolicy" corev1 "k8s.io/api/core/v1" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/apimachinery/pkg/runtime" @@ -38,7 +38,7 @@ import ( "knative.dev/pkg/system" "knative.dev/pkg/tracker" - . "github.com/sigstore/cosign/pkg/reconciler/testing/v1alpha1" + . "github.com/sigstore/policy-controller/pkg/reconciler/testing/v1alpha1" . "knative.dev/pkg/reconciler/testing" _ "knative.dev/pkg/system/testing" diff --git a/pkg/reconciler/clusterimagepolicy/controller.go b/pkg/reconciler/clusterimagepolicy/controller.go index 57ae94f99..1e7765903 100644 --- a/pkg/reconciler/clusterimagepolicy/controller.go +++ b/pkg/reconciler/clusterimagepolicy/controller.go @@ -31,9 +31,9 @@ import ( pkgreconciler "knative.dev/pkg/reconciler" "knative.dev/pkg/system" - "github.com/sigstore/cosign/pkg/apis/config" - clusterimagepolicyinformer "github.com/sigstore/cosign/pkg/client/injection/informers/policy/v1alpha1/clusterimagepolicy" - clusterimagepolicyreconciler "github.com/sigstore/cosign/pkg/client/injection/reconciler/policy/v1alpha1/clusterimagepolicy" + "github.com/sigstore/policy-controller/pkg/apis/config" + clusterimagepolicyinformer "github.com/sigstore/policy-controller/pkg/client/injection/informers/policy/v1alpha1/clusterimagepolicy" + clusterimagepolicyreconciler "github.com/sigstore/policy-controller/pkg/client/injection/reconciler/policy/v1alpha1/clusterimagepolicy" cminformer "knative.dev/pkg/injection/clients/namespacedkube/informers/core/v1/configmap" secretinformer "knative.dev/pkg/injection/clients/namespacedkube/informers/core/v1/secret" ) diff --git a/pkg/reconciler/clusterimagepolicy/controller_test.go b/pkg/reconciler/clusterimagepolicy/controller_test.go index e4a4c2038..d8d3563ef 100644 --- a/pkg/reconciler/clusterimagepolicy/controller_test.go +++ b/pkg/reconciler/clusterimagepolicy/controller_test.go @@ -21,7 +21,7 @@ import ( rtesting "knative.dev/pkg/reconciler/testing" // Fake injection informers - _ "github.com/sigstore/cosign/pkg/client/injection/informers/policy/v1alpha1/clusterimagepolicy/fake" + _ "github.com/sigstore/policy-controller/pkg/client/injection/informers/policy/v1alpha1/clusterimagepolicy/fake" _ "knative.dev/pkg/client/injection/kube/informers/core/v1/configmap/fake" _ "knative.dev/pkg/injection/clients/namespacedkube/informers/core/v1/configmap/fake" _ "knative.dev/pkg/injection/clients/namespacedkube/informers/core/v1/secret/fake" diff --git a/pkg/reconciler/clusterimagepolicy/resources/configmap.go b/pkg/reconciler/clusterimagepolicy/resources/configmap.go index 24d7c94ad..7069c0d2a 100644 --- a/pkg/reconciler/clusterimagepolicy/resources/configmap.go +++ b/pkg/reconciler/clusterimagepolicy/resources/configmap.go @@ -18,7 +18,7 @@ import ( "encoding/json" "fmt" - webhookcip "github.com/sigstore/cosign/pkg/cosign/kubernetes/webhook/clusterimagepolicy" + webhookcip "github.com/sigstore/policy-controller/pkg/cosign/kubernetes/webhook/clusterimagepolicy" corev1 "k8s.io/api/core/v1" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "knative.dev/pkg/apis/duck" diff --git a/pkg/reconciler/testing/v1alpha1/clusterimagepolicy.go b/pkg/reconciler/testing/v1alpha1/clusterimagepolicy.go index e2cd2242c..24e6654de 100644 --- a/pkg/reconciler/testing/v1alpha1/clusterimagepolicy.go +++ b/pkg/reconciler/testing/v1alpha1/clusterimagepolicy.go @@ -18,7 +18,7 @@ import ( "context" "time" - "github.com/sigstore/cosign/pkg/apis/policy/v1alpha1" + "github.com/sigstore/policy-controller/pkg/apis/policy/v1alpha1" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" ) diff --git a/pkg/reconciler/testing/v1alpha1/factory.go b/pkg/reconciler/testing/v1alpha1/factory.go index f40d5afaa..a272c7478 100644 --- a/pkg/reconciler/testing/v1alpha1/factory.go +++ b/pkg/reconciler/testing/v1alpha1/factory.go @@ -36,7 +36,7 @@ import ( ktesting "k8s.io/client-go/testing" "knative.dev/pkg/controller" - fakecosignclient "github.com/sigstore/cosign/pkg/client/injection/client/fake" + fakecosignclient "github.com/sigstore/policy-controller/pkg/client/injection/client/fake" fakekubeclient "knative.dev/pkg/client/injection/kube/client/fake" fakedynamicclient "knative.dev/pkg/injection/clients/dynamicclient/fake" diff --git a/pkg/reconciler/testing/v1alpha1/listers.go b/pkg/reconciler/testing/v1alpha1/listers.go index d08dece61..68f6a7c94 100644 --- a/pkg/reconciler/testing/v1alpha1/listers.go +++ b/pkg/reconciler/testing/v1alpha1/listers.go @@ -15,9 +15,9 @@ package testing import ( - "github.com/sigstore/cosign/pkg/apis/policy/v1alpha1" - fakecosignclientset "github.com/sigstore/cosign/pkg/client/clientset/versioned/fake" - cosignlisters "github.com/sigstore/cosign/pkg/client/listers/policy/v1alpha1" + "github.com/sigstore/policy-controller/pkg/apis/policy/v1alpha1" + fakecosignclientset "github.com/sigstore/policy-controller/pkg/client/clientset/versioned/fake" + cosignlisters "github.com/sigstore/policy-controller/pkg/client/listers/policy/v1alpha1" corev1 "k8s.io/api/core/v1" "k8s.io/apimachinery/pkg/runtime" fakekubeclientset "k8s.io/client-go/kubernetes/fake" diff --git a/pkg/sget/sget.go b/pkg/sget/sget.go index 9236f8e2d..5cf9307b7 100644 --- a/pkg/sget/sget.go +++ b/pkg/sget/sget.go @@ -25,12 +25,12 @@ import ( "github.com/google/go-containerregistry/pkg/name" "github.com/google/go-containerregistry/pkg/v1/remote" - "github.com/sigstore/cosign/cmd/cosign/cli/fulcio" - "github.com/sigstore/cosign/cmd/cosign/cli/options" - "github.com/sigstore/cosign/cmd/cosign/cli/verify" - "github.com/sigstore/cosign/pkg/cosign" - ociremote "github.com/sigstore/cosign/pkg/oci/remote" - sigs "github.com/sigstore/cosign/pkg/signature" + "github.com/sigstore/policy-controller/cmd/cosign/cli/fulcio" + "github.com/sigstore/policy-controller/cmd/cosign/cli/options" + "github.com/sigstore/policy-controller/cmd/cosign/cli/verify" + "github.com/sigstore/policy-controller/pkg/cosign" + ociremote "github.com/sigstore/policy-controller/pkg/oci/remote" + sigs "github.com/sigstore/policy-controller/pkg/signature" ) func New(image, key string, out io.Writer) *SecureGet { diff --git a/pkg/signature/keys.go b/pkg/signature/keys.go index 90d3e6d19..3d6f0dd93 100644 --- a/pkg/signature/keys.go +++ b/pkg/signature/keys.go @@ -22,12 +22,12 @@ import ( "fmt" "strings" - "github.com/sigstore/cosign/pkg/blob" - "github.com/sigstore/cosign/pkg/cosign" - "github.com/sigstore/cosign/pkg/cosign/git" - "github.com/sigstore/cosign/pkg/cosign/git/gitlab" - "github.com/sigstore/cosign/pkg/cosign/kubernetes" - "github.com/sigstore/cosign/pkg/cosign/pkcs11key" + "github.com/sigstore/policy-controller/pkg/blob" + "github.com/sigstore/policy-controller/pkg/cosign" + "github.com/sigstore/policy-controller/pkg/cosign/git" + "github.com/sigstore/policy-controller/pkg/cosign/git/gitlab" + "github.com/sigstore/policy-controller/pkg/cosign/kubernetes" + "github.com/sigstore/policy-controller/pkg/cosign/pkcs11key" "github.com/sigstore/sigstore/pkg/cryptoutils" "github.com/sigstore/sigstore/pkg/signature" diff --git a/pkg/signature/keys_test.go b/pkg/signature/keys_test.go index 5f1c0ac43..47bb21a10 100644 --- a/pkg/signature/keys_test.go +++ b/pkg/signature/keys_test.go @@ -22,7 +22,7 @@ import ( "os" "testing" - "github.com/sigstore/cosign/pkg/cosign" + "github.com/sigstore/policy-controller/pkg/cosign" ) func generateKeyFile(t *testing.T, tmpDir string, pf cosign.PassFunc) (privFile, pubFile string) { diff --git a/test/cmd/getoidctoken/main.go b/test/cmd/getoidctoken/main.go index 82333c59d..5fb9740a4 100644 --- a/test/cmd/getoidctoken/main.go +++ b/test/cmd/getoidctoken/main.go @@ -24,7 +24,7 @@ import ( ) type envConfig struct { - FileName string `envconfig:"OIDC_FILE" default:"/var/run/sigstore/cosign/oidc-token" required:"true"` + FileName string `envconfig:"OIDC_FILE" default:"/var/run/sigstore/policy-controller/oidc-token" required:"true"` } func tokenWriter(filename string) func(http.ResponseWriter, *http.Request) { diff --git a/test/config/gettoken/gettoken.yaml b/test/config/gettoken/gettoken.yaml index 20ec657fe..bf2d36253 100644 --- a/test/config/gettoken/gettoken.yaml +++ b/test/config/gettoken/gettoken.yaml @@ -21,7 +21,7 @@ spec: spec: containers: - name: gettoken - image: ko://github.com/sigstore/cosign/test/cmd/getoidctoken + image: ko://github.com/sigstore/policy-controller/test/cmd/getoidctoken env: - name: OIDC_FILE value: "/var/run/sigstore/cosign/oidc-token" diff --git a/third_party/VENDOR-LICENSE/github.com/sigstore/cosign/LICENSE b/third_party/VENDOR-LICENSE/github.com/sigstore/cosign/LICENSE deleted file mode 100644 index 261eeb9e9..000000000 --- a/third_party/VENDOR-LICENSE/github.com/sigstore/cosign/LICENSE +++ /dev/null @@ -1,201 +0,0 @@ - Apache License - Version 2.0, January 2004 - http://www.apache.org/licenses/ - - TERMS AND CONDITIONS FOR USE, REPRODUCTION, AND DISTRIBUTION - - 1. Definitions. - - "License" shall mean the terms and conditions for use, reproduction, - and distribution as defined by Sections 1 through 9 of this document. - - "Licensor" shall mean the copyright owner or entity authorized by - the copyright owner that is granting the License. - - "Legal Entity" shall mean the union of the acting entity and all - other entities that control, are controlled by, or are under common - control with that entity. For the purposes of this definition, - "control" means (i) the power, direct or indirect, to cause the - direction or management of such entity, whether by contract or - otherwise, or (ii) ownership of fifty percent (50%) or more of the - outstanding shares, or (iii) beneficial ownership of such entity. - - "You" (or "Your") shall mean an individual or Legal Entity - exercising permissions granted by this License. - - "Source" form shall mean the preferred form for making modifications, - including but not limited to software source code, documentation - source, and configuration files. - - "Object" form shall mean any form resulting from mechanical - transformation or translation of a Source form, including but - not limited to compiled object code, generated documentation, - and conversions to other media types. - - "Work" shall mean the work of authorship, whether in Source or - Object form, made available under the License, as indicated by a - copyright notice that is included in or attached to the work - (an example is provided in the Appendix below). - - "Derivative Works" shall mean any work, whether in Source or Object - form, that is based on (or derived from) the Work and for which the - editorial revisions, annotations, elaborations, or other modifications - represent, as a whole, an original work of authorship. For the purposes - of this License, Derivative Works shall not include works that remain - separable from, or merely link (or bind by name) to the interfaces of, - the Work and Derivative Works thereof. - - "Contribution" shall mean any work of authorship, including - the original version of the Work and any modifications or additions - to that Work or Derivative Works thereof, that is intentionally - submitted to Licensor for inclusion in the Work by the copyright owner - or by an individual or Legal Entity authorized to submit on behalf of - the copyright owner. For the purposes of this definition, "submitted" - means any form of electronic, verbal, or written communication sent - to the Licensor or its representatives, including but not limited to - communication on electronic mailing lists, source code control systems, - and issue tracking systems that are managed by, or on behalf of, the - Licensor for the purpose of discussing and improving the Work, but - excluding communication that is conspicuously marked or otherwise - designated in writing by the copyright owner as "Not a Contribution." - - "Contributor" shall mean Licensor and any individual or Legal Entity - on behalf of whom a Contribution has been received by Licensor and - subsequently incorporated within the Work. - - 2. Grant of Copyright License. Subject to the terms and conditions of - this License, each Contributor hereby grants to You a perpetual, - worldwide, non-exclusive, no-charge, royalty-free, irrevocable - copyright license to reproduce, prepare Derivative Works of, - publicly display, publicly perform, sublicense, and distribute the - Work and such Derivative Works in Source or Object form. - - 3. Grant of Patent License. Subject to the terms and conditions of - this License, each Contributor hereby grants to You a perpetual, - worldwide, non-exclusive, no-charge, royalty-free, irrevocable - (except as stated in this section) patent license to make, have made, - use, offer to sell, sell, import, and otherwise transfer the Work, - where such license applies only to those patent claims licensable - by such Contributor that are necessarily infringed by their - Contribution(s) alone or by combination of their Contribution(s) - with the Work to which such Contribution(s) was submitted. If You - institute patent litigation against any entity (including a - cross-claim or counterclaim in a lawsuit) alleging that the Work - or a Contribution incorporated within the Work constitutes direct - or contributory patent infringement, then any patent licenses - granted to You under this License for that Work shall terminate - as of the date such litigation is filed. - - 4. Redistribution. You may reproduce and distribute copies of the - Work or Derivative Works thereof in any medium, with or without - modifications, and in Source or Object form, provided that You - meet the following conditions: - - (a) You must give any other recipients of the Work or - Derivative Works a copy of this License; and - - (b) You must cause any modified files to carry prominent notices - stating that You changed the files; and - - (c) You must retain, in the Source form of any Derivative Works - that You distribute, all copyright, patent, trademark, and - attribution notices from the Source form of the Work, - excluding those notices that do not pertain to any part of - the Derivative Works; and - - (d) If the Work includes a "NOTICE" text file as part of its - distribution, then any Derivative Works that You distribute must - include a readable copy of the attribution notices contained - within such NOTICE file, excluding those notices that do not - pertain to any part of the Derivative Works, in at least one - of the following places: within a NOTICE text file distributed - as part of the Derivative Works; within the Source form or - documentation, if provided along with the Derivative Works; or, - within a display generated by the Derivative Works, if and - wherever such third-party notices normally appear. The contents - of the NOTICE file are for informational purposes only and - do not modify the License. You may add Your own attribution - notices within Derivative Works that You distribute, alongside - or as an addendum to the NOTICE text from the Work, provided - that such additional attribution notices cannot be construed - as modifying the License. - - You may add Your own copyright statement to Your modifications and - may provide additional or different license terms and conditions - for use, reproduction, or distribution of Your modifications, or - for any such Derivative Works as a whole, provided Your use, - reproduction, and distribution of the Work otherwise complies with - the conditions stated in this License. - - 5. Submission of Contributions. Unless You explicitly state otherwise, - any Contribution intentionally submitted for inclusion in the Work - by You to the Licensor shall be under the terms and conditions of - this License, without any additional terms or conditions. - Notwithstanding the above, nothing herein shall supersede or modify - the terms of any separate license agreement you may have executed - with Licensor regarding such Contributions. - - 6. Trademarks. This License does not grant permission to use the trade - names, trademarks, service marks, or product names of the Licensor, - except as required for reasonable and customary use in describing the - origin of the Work and reproducing the content of the NOTICE file. - - 7. Disclaimer of Warranty. Unless required by applicable law or - agreed to in writing, Licensor provides the Work (and each - Contributor provides its Contributions) on an "AS IS" BASIS, - WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or - implied, including, without limitation, any warranties or conditions - of TITLE, NON-INFRINGEMENT, MERCHANTABILITY, or FITNESS FOR A - PARTICULAR PURPOSE. You are solely responsible for determining the - appropriateness of using or redistributing the Work and assume any - risks associated with Your exercise of permissions under this License. - - 8. Limitation of Liability. In no event and under no legal theory, - whether in tort (including negligence), contract, or otherwise, - unless required by applicable law (such as deliberate and grossly - negligent acts) or agreed to in writing, shall any Contributor be - liable to You for damages, including any direct, indirect, special, - incidental, or consequential damages of any character arising as a - result of this License or out of the use or inability to use the - Work (including but not limited to damages for loss of goodwill, - work stoppage, computer failure or malfunction, or any and all - other commercial damages or losses), even if such Contributor - has been advised of the possibility of such damages. - - 9. Accepting Warranty or Additional Liability. While redistributing - the Work or Derivative Works thereof, You may choose to offer, - and charge a fee for, acceptance of support, warranty, indemnity, - or other liability obligations and/or rights consistent with this - License. However, in accepting such obligations, You may act only - on Your own behalf and on Your sole responsibility, not on behalf - of any other Contributor, and only if You agree to indemnify, - defend, and hold each Contributor harmless for any liability - incurred by, or claims asserted against, such Contributor by reason - of your accepting any such warranty or additional liability. - - END OF TERMS AND CONDITIONS - - APPENDIX: How to apply the Apache License to your work. - - To apply the Apache License to your work, attach the following - boilerplate notice, with the fields enclosed by brackets "[]" - replaced with your own identifying information. (Don't include - the brackets!) The text should be enclosed in the appropriate - comment syntax for the file format. We also recommend that a - file or class name and description of purpose be included on the - same "printed page" as the copyright notice for easier - identification within third-party archives. - - Copyright [yyyy] [name of copyright owner] - - Licensed under the Apache License, Version 2.0 (the "License"); - you may not use this file except in compliance with the License. - You may obtain a copy of the License at - - http://www.apache.org/licenses/LICENSE-2.0 - - Unless required by applicable law or agreed to in writing, software - distributed under the License is distributed on an "AS IS" BASIS, - WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. - See the License for the specific language governing permissions and - limitations under the License. From ed1d16607ee2c9b97697db49d4c839a8296abfa0 Mon Sep 17 00:00:00 2001 From: Ville Aikas Date: Wed, 8 Jun 2022 16:08:24 +0300 Subject: [PATCH 2/2] lint + ko path Signed-off-by: Ville Aikas --- cmd/cosign/cli/fulcio/fulcio.go | 2 +- cmd/cosign/cli/fulcio/fulcio_test.go | 2 +- config/policy-webhook.yaml | 2 +- config/webhook.yaml | 2 +- pkg/cosign/kubernetes/webhook/validator.go | 2 +- 5 files changed, 5 insertions(+), 5 deletions(-) diff --git a/cmd/cosign/cli/fulcio/fulcio.go b/cmd/cosign/cli/fulcio/fulcio.go index 86cb0392f..ed12b9084 100644 --- a/cmd/cosign/cli/fulcio/fulcio.go +++ b/cmd/cosign/cli/fulcio/fulcio.go @@ -29,11 +29,11 @@ import ( "golang.org/x/term" + "github.com/sigstore/fulcio/pkg/api" "github.com/sigstore/policy-controller/cmd/cosign/cli/fulcio/fulcioroots" "github.com/sigstore/policy-controller/cmd/cosign/cli/options" "github.com/sigstore/policy-controller/pkg/cosign" "github.com/sigstore/policy-controller/pkg/providers" - "github.com/sigstore/fulcio/pkg/api" "github.com/sigstore/sigstore/pkg/oauthflow" "github.com/sigstore/sigstore/pkg/signature" ) diff --git a/cmd/cosign/cli/fulcio/fulcio_test.go b/cmd/cosign/cli/fulcio/fulcio_test.go index 50ea7f116..5ff586499 100644 --- a/cmd/cosign/cli/fulcio/fulcio_test.go +++ b/cmd/cosign/cli/fulcio/fulcio_test.go @@ -25,8 +25,8 @@ import ( "net/http/httptest" "testing" - "github.com/sigstore/policy-controller/cmd/cosign/cli/options" "github.com/sigstore/fulcio/pkg/api" + "github.com/sigstore/policy-controller/cmd/cosign/cli/options" "github.com/sigstore/sigstore/pkg/oauthflow" ) diff --git a/config/policy-webhook.yaml b/config/policy-webhook.yaml index d66607c50..ec48b2544 100644 --- a/config/policy-webhook.yaml +++ b/config/policy-webhook.yaml @@ -44,7 +44,7 @@ spec: - name: policy-webhook # This is the Go import path for the binary that is containerized # and substituted here. - image: ko://github.com/sigstore/cosign/cmd/cosign/policy_webhook + image: ko://github.com/sigstore/policy-controller/cmd/cosign/policy_webhook resources: requests: cpu: 20m diff --git a/config/webhook.yaml b/config/webhook.yaml index 884ff5865..becbaeb78 100644 --- a/config/webhook.yaml +++ b/config/webhook.yaml @@ -43,7 +43,7 @@ spec: - name: webhook # This is the Go import path for the binary that is containerized # and substituted here. - image: ko://github.com/sigstore/cosign/cmd/cosign/webhook + image: ko://github.com/sigstore/policy-controller/cmd/cosign/webhook args: ["-secret-name=verification-key"] resources: requests: diff --git a/pkg/cosign/kubernetes/webhook/validator.go b/pkg/cosign/kubernetes/webhook/validator.go index ff505f0a4..6c48c52f0 100644 --- a/pkg/cosign/kubernetes/webhook/validator.go +++ b/pkg/cosign/kubernetes/webhook/validator.go @@ -26,12 +26,12 @@ import ( "github.com/google/go-containerregistry/pkg/authn/k8schain" "github.com/google/go-containerregistry/pkg/name" "github.com/google/go-containerregistry/pkg/v1/remote" + "github.com/sigstore/fulcio/pkg/api" "github.com/sigstore/policy-controller/pkg/apis/config" webhookcip "github.com/sigstore/policy-controller/pkg/cosign/kubernetes/webhook/clusterimagepolicy" "github.com/sigstore/policy-controller/pkg/oci" ociremote "github.com/sigstore/policy-controller/pkg/oci/remote" "github.com/sigstore/policy-controller/pkg/policy" - "github.com/sigstore/fulcio/pkg/api" rekor "github.com/sigstore/rekor/pkg/client" "github.com/sigstore/rekor/pkg/generated/client" "github.com/sigstore/sigstore/pkg/signature"