Skip to content

Commit dc76628

Browse files
author
Cesar Rodriguez
committed
Updates references to Tenable
1 parent b9ba040 commit dc76628

File tree

16 files changed

+76
-76
lines changed

16 files changed

+76
-76
lines changed

.github/CODEOWNERS

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2,4 +2,4 @@
22
# This file designates required PR reviewers for this repository
33
# https://help.github.com/articles/about-codeowners/
44

5-
* @accurics/terrascan-maintainers @bkizer-tenable @tenable/terrascan-maintainers @tenable/terrascan-devrel
5+
* @bkizer-tenable @tenable/terrascan-maintainers @tenable/terrascan-devrel

CONTRIBUTING.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -12,5 +12,5 @@ information on using pull requests.
1212

1313
## Community Guidelines
1414

15-
This project follows
16-
[Accurics by Terrascan Code of Conduct](https://github.com/accurics/terrascan/blob/master/code_of_conduct.md).
15+
This project follows the
16+
[Terrascan Code of Conduct](https://github.com/tenable/terrascan/blob/master/code_of_conduct.md).

content/en/_index.html

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@
99
<a class="btn btn-lg btn-primary mr-3 mb-4" href="{{< relref "/docs" >}}">
1010
Learn More <i class="fas fa-graduation-cap ml-2"></i>
1111
</a>
12-
<a class="btn btn-lg btn-secondary mr-3 mb-4" href="https://github.com/accurics/terrascan">
12+
<a class="btn btn-lg btn-secondary mr-3 mb-4" href="https://github.com/tenable/terrascan">
1313
Download <i class="fas fa-download"></i> </a>
1414
<center>
1515
<script async src="https://cse.google.com/cse.js?cx=52d81aac5e2710292"></script>
@@ -40,8 +40,8 @@
4040
{{% /blocks/feature %}}
4141

4242

43-
{{% blocks/feature icon="fab fa-github" title="Contributions welcome!" url="https://github.com/accurics/terrascan" %}}
44-
We do a [Pull Request](https://github.com/accurics/terrascan/pulls) contributions on **GitHub**. New users are always welcome!
43+
{{% blocks/feature icon="fab fa-github" title="Contributions welcome!" url="https://github.com/tenable/terrascan" %}}
44+
We do a [Pull Request](https://github.com/tenable/terrascan/pulls) contributions on **GitHub**. New users are always welcome!
4545
{{% /blocks/feature %}}
4646

4747

content/en/docs/Contribution guidelines/_index.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ You can contribute in many ways:
1515

1616
### Report Bugs
1717

18-
Report bugs at https://github.com/accurics/terrascan/issues.
18+
Report bugs at https://github.com/tenable/terrascan/issues.
1919

2020
If you are reporting a bug, please include:
2121

@@ -41,7 +41,7 @@ articles, videos, and such.
4141

4242
### Submit Feedback
4343

44-
The best way to send feedback is to file an issue at https://github.com/accurics/terrascan/issues.
44+
The best way to send feedback is to file an issue at https://github.com/tenable/terrascan/issues.
4545

4646
If you are proposing a feature:
4747

content/en/docs/Getting started/_index.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -12,8 +12,8 @@ Terrascan is a static code analyzer for Infrastructure as Code. It can be instal
1212

1313
Quickly get started with these common first tasks:
1414

15-
- [Installing Terrascan](#installing-terrascan)
16-
- [Scanning with Terrascan](#scanning-with-terrascan)
15+
- [Installing Terrascan](#installing-terrascan)
16+
- [Scanning with Terrascan](#scanning-with-terrascan)
1717

1818
## Installing Terrascan
1919
Terrascan is a portable executable that does not strictly require installation, and is also available as a container image in Docker Hub. You can use Terrascan in two different methods based on your preference:
@@ -22,7 +22,7 @@ Terrascan is a portable executable that does not strictly require installation,
2222
2. [Using a Docker container](#using-a-docker-container)
2323

2424
### Native executable
25-
Terrascan's [release page](https://github.com/accurics/terrascan/releases) includes latest version of builds for common platforms. Download and extract the package for your platform. Follow instructions that apply to your platform:
25+
Terrascan's [release page](https://github.com/tenable/terrascan/releases) includes latest version of builds for common platforms. Download and extract the package for your platform. Follow instructions that apply to your platform:
2626

2727
#### macOS and Linux
2828
Download the latest version of builds for macOS and enter the following command.
@@ -62,7 +62,7 @@ Terrascan is also available as a Docker image in Docker Hub and can be used as f
6262
$ docker run --rm tenable/terrascan version
6363
```
6464

65-
If you want to use the Docker image for the rest of this "Getting Started" guide, please refer to the following command. Note the volume `(-v)` that is being mapped to the docker, and modify it if necessary to suit your environment.
65+
If you want to use the Docker image for the rest of this "Getting Started" guide, please refer to the following command. Note the volume `(-v)` that is being mapped to the docker, and modify it if necessary to suit your environment.
6666

6767
``` Bash
6868
$ alias terrascan="docker run --rm -it -v "$(pwd):/iac" -w /iac tenable/terrascan"

content/en/docs/Integrations/Atlantis.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -57,7 +57,7 @@ workflows:
5757
```
5858
### Script configuration
5959
60-
Modify the `terrascan-remote-scan.sh` script according your environment. The script is [located here](https://github.com/accurics/terrascan/tree/master/scripts). Open the script with your any editor of your choice and review the following six settings which is found at the top of the file:
60+
Modify the `terrascan-remote-scan.sh` script according your environment. The script is [located here](https://github.com/tenable/terrascan/tree/master/scripts). Open the script with your any editor of your choice and review the following six settings which is found at the top of the file:
6161

6262
```
6363
TERRASCAN_SERVER=192.168.1.55
@@ -113,7 +113,7 @@ In code repository, usage is exactly the same as atlantis, add a comment `atlant
113113
##### To use the default built-in container image:
114114

115115
```
116-
docker pull accurics/terrascan_atlantis
116+
docker pull tenable/terrascan_atlantis
117117
```
118118

119119
##### To build your own container image:
@@ -128,15 +128,15 @@ docker run \
128128
--env-file=<.env-file> \
129129
-p 4141:4141 \
130130
-v <pwd>/config_data/:/etc/terrascan/ \
131-
accurics/terrascan_atlantis server \
131+
tenable/terrascan_atlantis server \
132132
--gh-user="$USERNAME" --gh-token="$TOKEN" --gh-webhook-secret="$SECRET" \
133133
--repo-allowlist="$REPO_ALLOWLIST" \
134134
-c /etc/terrascan/config.toml
135135
```
136136

137137
The syntax of the Atlantis server command here is same as in [atlantis docs](https://www.runatlantis.io/docs/), except for an optional `-c` flag which can be used to specify the file path for the toml config to be used by Terrascan. Another way to provide the toml config filepath would be the TERRASCAN_CONFIG environment variable. You need to provide all the environment variables that terraform requires to operate with your respective cloud providers.
138138

139-
> **Note**: As a good practice, Terrascan recommends use of a [specific tag](https://hub.docker.com/r/accurics/terrascan_atlantis/tags) of the container image rather than the latest tag.
139+
> **Note**: As a good practice, Terrascan recommends use of a [specific tag](https://hub.docker.com/r/tenable/terrascan_atlantis/tags) of the container image rather than the latest tag.
140140
141141
[comment]: <> (Moved the workflow yaml note to above where its mentioned)
142142

content/en/docs/Integrations/argocd.md

Lines changed: 14 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: "Argo CD"
33
linkTitle: "Argo CD"
44
weight: 20
55
description: >
6-
Terrascan can be configured as an Argo CD job during the application sync process using ArgoCD’s resource hook.
6+
Terrascan can be configured as an Argo CD job during the application sync process using ArgoCD’s resource hook.
77
---
88

99
## Terrascan can be integrated with Argo CD in two ways
@@ -46,7 +46,7 @@ spec:
4646
- name: ssh-key-secret
4747
secret:
4848
secretName: ssh-key-secret
49-
#add a secret for git config file
49+
#add a secret for git config file
5050
- name: ssh-config
5151
secret:
5252
secretName: ssh-config-secret
@@ -148,7 +148,7 @@ fi
148148
For private repositories, the private following keys must be added as kubernetes secret:
149149
- `private key` and ssh `config` as Secret
150150
- `known_hosts`as ConfigMap
151-
151+
152152
```
153153
kubectl create secret generic ssh-key-secret \
154154
--from-file=ssh-privatekey= < path to your private key > \
@@ -159,7 +159,7 @@ For private repositories, the private following keys must be added as kubernetes
159159
160160
```
161161
kubectl create configmap ssh-known-hosts --from-file=< path to your known hosts file >
162-
```
162+
```
163163
164164
```
165165
kubectl create configmap slack-notifications --from-file=< path to your notification script >
@@ -170,7 +170,7 @@ For private repositories, the private following keys must be added as kubernetes
170170
```
171171
kubectl create secret generic ssh-config-secret \
172172
--from-file=< path to your ssh config file >
173-
```
173+
```
174174
175175
##### Example ssh config file
176176
@@ -229,7 +229,7 @@ template:
229229
value: yoursecretapikey
230230
volumeMounts:
231231
- mountPath: /data/certs
232-
name: terrascan-certs-secret
232+
name: terrascan-certs-secret
233233
readOnly: true
234234
- mountPath: /data/config
235235
name: terrascan-config
@@ -256,23 +256,23 @@ template:
256256
- name: ssh-key-secret
257257
secret:
258258
secretName: ssh-key-secret
259-
#add a secret for git config file
259+
#add a secret for git config file
260260
- name: ssh-config
261261
secret:
262262
secretName: ssh-config-secret
263263
#add a configmap for the ssh known_hosts file
264264
- name: ssh-known-hosts
265265
configMap:
266266
name: known-hosts-config
267-
#add a configmap for the terrascan config.toml file
267+
#add a configmap for the terrascan config.toml file
268268
- name: terrascan-config
269269
configMap:
270270
name: terrascan-config
271-
#add a secret for the tls certificates
271+
#add a secret for the tls certificates
272272
- name: terrascan-certs-secret
273273
secret:
274-
secretName: terrascan-certs-secret
275-
```
274+
secretName: terrascan-certs-secret
275+
```
276276
**Service example**
277277

278278
```yaml
@@ -332,7 +332,7 @@ Host github.com
332332
333333
After making changes to the webhook deployment file, apply this yaml in your cluster.
334334
335-
You can also run terrascan admission controller server outside cluster, for more information and instructions on configuring terrascan as an admission controller webhook, see https://docs.accurics.com/projects/accurics-terrascan/en/latest/integrations/admission-controller-webhooks-usage.
335+
You can also run terrascan admission controller server outside cluster, for more information and instructions on configuring terrascan as an admission controller webhook, see https://runterrascan.io/docs/integrations/k8s/.
336336
337337
#### Step 2: Create a Dockerfile
338338
@@ -427,7 +427,7 @@ metadata:
427427
generateName: terrascan-hook-
428428
namespace: <YOUR APP NAMESPACE>
429429
annotations:
430-
argocd.argoproj.io/hook: PreSync
430+
argocd.argoproj.io/hook: PreSync
431431
spec:
432432
ttlSecondsAfterFinished: 3600
433433
template:
@@ -457,7 +457,7 @@ template:
457457
- name: CLOUD_PROVIDER
458458
value: <TYPE OF CLOUD PROVIDER> #If not provided default value is 'all'
459459
- name: REMOTE_TYPE
460-
value: <TYPE OF REMOTE> #If not provided default value is 'git'
460+
value: <TYPE OF REMOTE> #If not provided default value is 'git'
461461
args:
462462
- sh
463463
- /home/terrascan/bin/terrascan-remote-scan.sh

content/en/docs/Integrations/cicd.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -22,7 +22,7 @@ Using Terrascan's SARIF output, the action can include issues found during the s
2222

2323

2424
``` YAML
25-
25+
2626
on: [push]
2727

2828
jobs:
@@ -34,7 +34,7 @@ jobs:
3434
uses: actions/checkout@v2
3535
- name: Run Terrascan
3636
id: terrascan
37-
uses: accurics/terrascan-action@main
37+
uses: tenable/terrascan-action@main
3838
with:
3939
iac_type: 'terraform'
4040
iac_version: 'v14'
@@ -53,21 +53,21 @@ jobs:
5353
```
5454
5555
56-
A detailed explanation of the action's input variables is available in the [terrascan-action](https://github.com/accurics/terrascan-action/) repository.
56+
A detailed explanation of the action's input variables is available in the [terrascan-action](https://github.com/tenable/terrascan-action/) repository.
5757
5858
## GitLab CI
5959
6060
[GitLab CI](https://docs.gitlab.com/ee/ci/README.html) can use [Docker images](https://docs.gitlab.com/ee/ci/docker/using_docker_images.html) as part of a pipeline. We can take advantage of this functionality and use Terrascan's docker image as part of your [pipeline](https://docs.gitlab.com/ee/ci/pipelines/) to scan infrastructure as code.
6161
62-
To do this you can update your .gitlab-ci.yml file to use the "accurics/terrascan:latest" image with the ["bin/sh", "-c"] entrypoint. Terrascan can be found on "/go/bin" in the image and you can use any [Terrascan command line options](http://ubusvr:8000/getting-started/usage/#terrascan-commands) according to your needs. Here's an example .gitlab-ci.yml file:
62+
To do this you can update your .gitlab-ci.yml file to use the "tenable/terrascan:latest" image with the ["bin/sh", "-c"] entrypoint. Terrascan can be found on "/go/bin" in the image and you can use any [Terrascan command line options](http://ubusvr:8000/getting-started/usage/#terrascan-commands) according to your needs. Here's an example .gitlab-ci.yml file:
6363
6464
``` YAML
6565
stages:
6666
- scan
6767

6868
terrascan:
6969
image:
70-
name: accurics/terrascan:latest
70+
name: tenable/terrascan:latest
7171
entrypoint: ["/bin/sh", "-c"]
7272
stage: scan
7373
script:
@@ -194,7 +194,7 @@ The `Dockerfile` is, of course, used to build the container. In this case, we s
194194

195195
``` SH
196196
# Dockerfile
197-
FROM accurics/terrascan:929e377
197+
FROM tenable/terrascan:929e377
198198

199199
ENTRYPOINT []
200200

content/en/docs/Integrations/k8s.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ description: >
99

1010
## Overview
1111
Terrascan can be integrated with K8s [admissions webhooks](https://kubernetes.io/docs/reference/access-authn-authz/extensible-admission-controllers/).
12-
Admission controllers help you control resources created on a kubernetes cluster. By using Terrascan as an admission controller, resources violating security policies can be prevented from getting created in a Kubernetes cluster. For more details and instructions, [click here to see our blog](https://www.accurics.com/blog/terrascan-blog/kubernetes-security-terrascan-validating-admission-controller/).
12+
Admission controllers help you control resources created on a kubernetes cluster. By using Terrascan as an admission controller, resources violating security policies can be prevented from getting created in a Kubernetes cluster.
1313

1414
> **Note on SSL certificates**: You can use valid SSL certificates or create self signed certificates and have your Kubernetes cluster trust it.
1515
@@ -28,7 +28,7 @@ Create an instance of Terrascan. To scan K8s configurations, your Terrascan inst
2828

2929
1. Make sure Terrascan is accessible via HTTPS. Ensure your cloud firewall is configured to allow this.
3030
2. Have a valid SSL certificate for the served domain name using one of the suggested methods below:
31-
- Use a subdomain of your choice (e.g dev-terrascan-k8s.accurics.com) and create a valid certificate for this subdomain through your SSL certificate provider. You can use [Let's Encrypt](https://letsencrypt.org/) which is a free, simple to use certificate authority.
31+
- Use a subdomain of your choice (e.g dev-terrascan-k8s.tenable.com) and create a valid certificate for this subdomain through your SSL certificate provider. You can use [Let's Encrypt](https://letsencrypt.org/) which is a free, simple to use certificate authority.
3232
- Use a reverse-proxy to serve SSL requests; for example, use Cloudflare Flexible to get a certificate by a trusted-CA to your [self-signed certificate](https://www.digitalocean.com/community/tutorials/openssl-essentials-working-with-ssl-certificates-private-keys-and-csrs).
3333
- Generate a self-signed certificate and configure your K8s cluster to trust it. To add a trusted CA to ca-pemstore, as demonstrated in [paraspatidar's blog post](https://medium.com/@paraspatidar/add-ssl-tls-certificate-or-pem-file-to-kubernetes-pod-s-trusted-root-ca-store-7bed5cd683d).
3434
3. Use the Terrascan docker as demonstrated in this document, or run it from the sources.
@@ -78,7 +78,7 @@ You can specify the following configurations:
7878
Run Terrascan docker image in your server using the following command:
7979

8080
``` Bash
81-
sudo docker run -p 443:9443 -v <DATA_PATH>:/data -u root -e K8S_WEBHOOK_API_KEY=<API_KEY> accurics/terrascan server --cert-path /data/cert.pem --key-path /data/key.pem -c /data/config.toml
81+
sudo docker run -p 443:9443 -v <DATA_PATH>:/data -u root -e K8S_WEBHOOK_API_KEY=<API_KEY> tenable/terrascan server --cert-path /data/cert.pem --key-path /data/key.pem -c /data/config.toml
8282
```
8383
Where,
8484

content/en/docs/Integrations/pre-commit-integration.md

Lines changed: 25 additions & 25 deletions
Original file line numberDiff line numberDiff line change
@@ -5,11 +5,11 @@ weight: 50
55
description: >
66
Integrating Terrascan with Pre-commit to detect vulnerabilities in your IaC before you commit them.
77
---
8-
# Integrating Terrascan with Pre-commit
8+
# Integrating Terrascan with Pre-commit
99

10-
## Overview
11-
Terrascan scan can be used as a pre-commit hook in order to automatically scan your IaC before every commit.
12-
For more information about pre-commit hooks see https://pre-commit.com/#intro
10+
## Overview
11+
Terrascan scan can be used as a pre-commit hook in order to automatically scan your IaC before every commit.
12+
For more information about pre-commit hooks see https://pre-commit.com/#intro
1313

1414
___
1515

@@ -18,53 +18,53 @@ ___
1818
* Ensure Terrascan is properly installed (See https://runterrascan.io/docs/getting-started/#installing-terrascan)
1919
* Have Pre-commit package manager installed (See https://pre-commit.com/#install)
2020
___
21-
## Integration Method
21+
## Integration Method
2222
___
23-
### Add config file
24-
1. Add file called .pre-commit-config.yaml to root of repo you wish to scan with pre-commit. It should look like this:
23+
### Add config file
24+
1. Add file called .pre-commit-config.yaml to root of repo you wish to scan with pre-commit. It should look like this:
2525
```yaml
2626
repos:
27-
- repo: https://github.com/accurics/terrascan
28-
rev: <COMMIT/VERSION>
27+
- repo: https://github.com/tenable/terrascan
28+
rev: <COMMIT/VERSION>
2929
hooks:
3030
- id: terraform-pre-commit
31-
args: [ '-i <IAC PROVIDER>'] #optional
31+
args: [ '-i <IAC PROVIDER>'] #optional
3232
```
3333
**Note:**
34-
The optional args line allows you to specify the IaC provider. For example,
34+
The optional args line allows you to specify the IaC provider. For example,
3535
```yaml
3636
repos:
37-
- repo: https://github.com/accurics/terrascan
38-
rev: <COMMIT/VERSION>
37+
- repo: https://github.com/tenable/terrascan
38+
rev: <COMMIT/VERSION>
3939
hooks:
4040
- id: terraform-pre-commit
41-
args: [ '-i k8s']
41+
args: [ '-i k8s']
4242
```
43-
will cause
43+
will cause
4444
```bash
45-
'terrascan scan -i k8s'
45+
'terrascan scan -i k8s'
4646
```
47-
to run and thus scan kubernetes yaml files. You may exclude the args like so:
47+
to run and thus scan kubernetes yaml files. You may exclude the args like so:
4848
```yaml
4949
repos:
50-
- repo: https://github.com/accurics/terrascan
51-
rev: <COMMIT/VERSION>
50+
- repo: https://github.com/tenable/terrascan
51+
rev: <COMMIT/VERSION>
5252
hooks:
5353
- id: terraform-pre-commit
5454
```
55-
which causes the default
55+
which causes the default
5656
```bash
57-
'terrascan scan'
57+
'terrascan scan'
5858
```
59-
to be run, scanning all IaC provider types.
59+
to be run, scanning all IaC provider types.
6060

6161
___
6262

63-
Once you have everything installed, and add the appropriate config file to your repo,
63+
Once you have everything installed, and add the appropriate config file to your repo,
6464
```bash
65-
'terrascan scan -i <IAC PROVIDER>'
65+
'terrascan scan -i <IAC PROVIDER>'
6666
```
67-
everytime you attempt to commit your staged changes. You can also call the hook directly on all files using pre-commit run --all-files
67+
everytime you attempt to commit your staged changes. You can also call the hook directly on all files using pre-commit run --all-files
6868

6969

7070

0 commit comments

Comments
 (0)