Skip to content

Commit

Permalink
Fix up references after repo move
Browse files Browse the repository at this point in the history
  • Loading branch information
csstaub committed Aug 9, 2020
1 parent 444a661 commit 6ba97af
Show file tree
Hide file tree
Showing 16 changed files with 33 additions and 37 deletions.
2 changes: 1 addition & 1 deletion .travis.yml
Original file line number Diff line number Diff line change
Expand Up @@ -43,7 +43,7 @@ install:
# Build Docker container
- make docker-build
# Make sure Docker image runs
- docker run --rm squareup/ghostunnel --version
- docker run --rm ghostunnel/ghostunnel --version
# Cross-compile dist binaries
- GO_VERSION=${TRAVIS_GO_VERSION} VERSION=${TRAVIS_TAG} make -f Makefile.dist dist

Expand Down
12 changes: 5 additions & 7 deletions Dockerfile
Original file line number Diff line number Diff line change
@@ -1,23 +1,21 @@
# Dockerfile for squareup/ghostunnel, useful as a basis for other images.
# Dockerfile for ghostunnel/ghostunnel, useful as a basis for other images.
#
# To build this image:
# docker build -t squareup/ghostunnel .
# docker build -t ghostunnel/ghostunnel .
#
# To run ghostunnel from the image (for example):
# docker run --rm squareup/ghostunnel --version
# docker run --rm ghostunnel/ghostunnel --version

FROM golang:1.14.7-alpine as build

MAINTAINER Cedric Staub "[email protected]"

# Dependencies
RUN apk add --no-cache --update gcc musl-dev libtool make git

# Copy source
COPY . /go/src/github.com/square/ghostunnel
COPY . /go/src/github.com/ghostunnel/ghostunnel

# Build
RUN cd /go/src/github.com/square/ghostunnel && \
RUN cd /go/src/github.com/ghostunnel/ghostunnel && \
GO111MODULE=on make clean ghostunnel && \
cp ghostunnel /usr/bin/ghostunnel

Expand Down
10 changes: 4 additions & 6 deletions Dockerfile-test
Original file line number Diff line number Diff line change
@@ -1,25 +1,23 @@
# Dockerfile for running integration tests, includes PKCS11/SoftHSM setup.
#
# Build image:
# docker build --build-arg GO_VERSION=[VERSION] -t squareup/ghostunnel-test -f Dockerfile-test .
# docker build --build-arg GO_VERSION=[VERSION] -t ghostunnel/ghostunnel-test -f Dockerfile-test .
#
# Run integration tests:
# docker run -v /dev/log:/dev/log -v $PWD:/go/src/github.com/square/ghostunnel squareup/ghostunnel-test
# docker run -v /dev/log:/dev/log -v $PWD:/go/src/github.com/ghostunnel/ghostunnel ghostunnel/ghostunnel-test

ARG GO_VERSION

FROM golang:${GO_VERSION}

MAINTAINER Cedric Staub "[email protected]"

# Install build dependencies
RUN apt-get update && \
apt-get install -y build-essential python3-minimal netcat softhsm2 rsyslog git python3-distutils </dev/null && \
mkdir -p /etc/softhsm /var/lib/softhsm/tokens /go/src/github.com/square/ghostunnel && \
mkdir -p /etc/softhsm /var/lib/softhsm/tokens /go/src/github.com/ghostunnel/ghostunnel && \
go get github.com/wadey/gocovmerge && \
go get golang.org/x/tools/cmd/cover

WORKDIR /go/src/github.com/square/ghostunnel
WORKDIR /go/src/github.com/ghostunnel/ghostunnel

ENV GO111MODULE=on

Expand Down
6 changes: 3 additions & 3 deletions Makefile
Original file line number Diff line number Diff line change
Expand Up @@ -55,11 +55,11 @@ softhsm-import:

# Build Docker image
docker-build:
docker build -t squareup/ghostunnel .
docker build -t ghostunnel/ghostunnel .
.PHONY: docker-build

# Run unit and integration tests in Docker container
docker-test:
docker build --build-arg GO_VERSION=${GO_VERSION} -t squareup/ghostunnel-test -f Dockerfile-test .
docker run -v ${PWD}:/go/src/github.com/square/ghostunnel squareup/ghostunnel-test
docker build --build-arg GO_VERSION=${GO_VERSION} -t ghostunnel/ghostunnel-test -f Dockerfile-test .
docker run -v ${PWD}:/go/src/github.com/ghostunnel/ghostunnel ghostunnel/ghostunnel-test
.PHONY: docker-test
8 changes: 4 additions & 4 deletions README.md
Original file line number Diff line number Diff line change
@@ -1,7 +1,7 @@
Ghostunnel
==========

[![license](http://img.shields.io/badge/license-apache_2.0-blue.svg?style=flat)](https://raw.githubusercontent.com/square/ghostunnel/master/LICENSE) [![release](https://img.shields.io/github/release/square/ghostunnel.svg?style=flat)](https://github.com/square/ghostunnel/releases) [![docker](https://img.shields.io/badge/docker-hub-blue.svg?style=flat)](https://hub.docker.com/r/squareup/ghostunnel) [![travis](https://img.shields.io/travis/square/ghostunnel/master.svg?maxAge=3600&logo=travis&label=travis)](https://travis-ci.org/square/ghostunnel) [![appveyor](https://img.shields.io/appveyor/ci/csstaub/ghostunnel-58e7k.svg?maxAge=3600&logo=appveyor&label=appveyor)](https://ci.appveyor.com/project/csstaub/ghostunnel-58e7k) [![coverage](https://coveralls.io/repos/github/square/ghostunnel/badge.svg?branch=master)](https://coveralls.io/r/square/ghostunnel) [![report](https://goreportcard.com/badge/github.com/square/ghostunnel)](https://goreportcard.com/report/github.com/square/ghostunnel)
[![license](http://img.shields.io/badge/license-apache_2.0-blue.svg?style=flat)](https://raw.githubusercontent.com/square/ghostunnel/master/LICENSE) [![release](https://img.shields.io/github/release/square/ghostunnel.svg?style=flat)](https://github.com/ghostunnel/ghostunnel/releases) [![docker](https://img.shields.io/badge/docker-hub-blue.svg?style=flat)](https://hub.docker.com/r/ghostunnel/ghostunnel) [![travis](https://img.shields.io/travis/square/ghostunnel/master.svg?maxAge=3600&logo=travis&label=travis)](https://travis-ci.org/square/ghostunnel) [![appveyor](https://img.shields.io/appveyor/ci/csstaub/ghostunnel-58e7k.svg?maxAge=3600&logo=appveyor&label=appveyor)](https://ci.appveyor.com/project/csstaub/ghostunnel-58e7k) [![coverage](https://coveralls.io/repos/github/square/ghostunnel/badge.svg?branch=master)](https://coveralls.io/r/square/ghostunnel) [![report](https://goreportcard.com/badge/github.com/ghostunnel/ghostunnel)](https://goreportcard.com/report/github.com/ghostunnel/ghostunnel)

👻

Expand Down Expand Up @@ -59,7 +59,7 @@ Getting Started
To get started and play around with the implementation, you will need to
generate some test certificates. If you want to bootstrap a full PKI, one
good way to get started is to use a package like
[square/certstrap](https://github.com/square/certstrap). If you only need
[square/certstrap](https://github.com/ghostunnel/certstrap). If you only need
some test certificates for playing around with the tunnel, you can find
some pre-generated ones in the `test-keys` directory (alongside instructions
on how to generate new ones with OpenSSL).
Expand All @@ -80,8 +80,8 @@ Note that ghostunnel requires Go 1.12 or later to build, and CGO is required for
PKCS#11 support. See also [CROSS-COMPILE](docs/CROSS-COMPILE.md) for
instructions on how to cross-compile a custom build with CGO enabled.

[rel]: https://github.com/square/ghostunnel/releases
[hub]: https://hub.docker.com/r/squareup/ghostunnel
[rel]: https://github.com/ghostunnel/ghostunnel/releases
[hub]: https://hub.docker.com/r/ghostunnel/ghostunnel
[xgo]: https://github.com/karalabe/xgo

### Develop
Expand Down
2 changes: 1 addition & 1 deletion auth/auth.go
Original file line number Diff line number Diff line change
Expand Up @@ -22,7 +22,7 @@ import (
"net"
"net/url"

"github.com/square/ghostunnel/wildcard"
"github.com/ghostunnel/ghostunnel/wildcard"
)

// Logger is used by this package to log messages
Expand Down
2 changes: 1 addition & 1 deletion auth/auth_test.go
Original file line number Diff line number Diff line change
Expand Up @@ -23,7 +23,7 @@ import (
"net/url"
"testing"

"github.com/square/ghostunnel/wildcard"
"github.com/ghostunnel/ghostunnel/wildcard"
"github.com/stretchr/testify/assert"
)

Expand Down
2 changes: 1 addition & 1 deletion doc.go
Original file line number Diff line number Diff line change
Expand Up @@ -58,7 +58,7 @@ a TLS-secured service.
For a more in-depth explanation, please see the README.md file (and docs
folder) that shipped with ghostunnel or view the latest docs on
github.com/square/ghostunnel.
github.com/ghostunnel/ghostunnel.
.SH "CERTIFICATES & PRIVATE KEYS"
Ghostunnel accepts certificates in multiple different file formats.
Expand Down
4 changes: 2 additions & 2 deletions docs/ACCESS-FLAGS.md
Original file line number Diff line number Diff line change
Expand Up @@ -110,7 +110,7 @@ with `spiffe://ghostunnel/server1` or `spiffe://ghostunnel/server2` URI SANs (as
well as other values). See documentation for the [wildcard][wildcard] package
for more information.

[wildcard]: https://godoc.org/github.com/square/ghostunnel/wildcard
[wildcard]: https://godoc.org/github.com/ghostunnel/ghostunnel/wildcard

* `--disable-authentication`

Expand All @@ -119,4 +119,4 @@ This is useful if you just want to use Ghostunnel to wrap a connection in TLS
but the backend doesn't require mutual authentication.

[tls]: https://golang.org/pkg/crypto/tls
[wildcard]: https://godoc.org/github.com/square/ghostunnel/wildcard
[wildcard]: https://godoc.org/github.com/ghostunnel/ghostunnel/wildcard
2 changes: 1 addition & 1 deletion docs/CROSS-COMPILE.md
Original file line number Diff line number Diff line change
Expand Up @@ -17,7 +17,7 @@ For example, to build a static 64-bit Windows binary:
-branch master \
-targets 'windows/amd64' \
-ldflags '-w -extldflags "-static" -extld x86_64-w64-mingw32-gcc' \
github.com/square/ghostunnel
github.com/ghostunnel/ghostunnel

Ghostunnel ships with a `Makefile.dist` that will cross-compile for
darwin/amd64, linux/amd64, windows/386 and windows/amd64 when asked to build
Expand Down
2 changes: 1 addition & 1 deletion docs/spiffe-workload-api-demo/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -6,7 +6,7 @@ communication between a frontend and backend service.

## Prerequisites

* `ghostunnel` binary from [Ghostunnel](https://github.com/square/ghostunnel/releases/latest)
* `ghostunnel` binary from [Ghostunnel](https://github.com/ghostunnel/ghostunnel/releases/latest)
* `spire-server` and `spire-agent` binaries from [SPIRE](https://github.com/spiffe/spire/releases/latest)
* `socat`

Expand Down
2 changes: 1 addition & 1 deletion go.mod
Original file line number Diff line number Diff line change
@@ -1,4 +1,4 @@
module github.com/square/ghostunnel
module github.com/ghostunnel/ghostunnel

require (
github.com/Masterminds/goutils v1.1.0 // indirect
Expand Down
10 changes: 5 additions & 5 deletions main.go
Original file line number Diff line number Diff line change
Expand Up @@ -31,15 +31,15 @@ import (
"time"

graphite "github.com/cyberdelia/go-metrics-graphite"
"github.com/ghostunnel/ghostunnel/auth"
"github.com/ghostunnel/ghostunnel/certloader"
"github.com/ghostunnel/ghostunnel/proxy"
"github.com/ghostunnel/ghostunnel/socket"
"github.com/ghostunnel/ghostunnel/wildcard"
gsyslog "github.com/hashicorp/go-syslog"
http_dialer "github.com/mwitkow/go-http-dialer"
"github.com/prometheus/client_golang/prometheus/promhttp"
metrics "github.com/rcrowley/go-metrics"
"github.com/square/ghostunnel/auth"
"github.com/square/ghostunnel/certloader"
"github.com/square/ghostunnel/proxy"
"github.com/square/ghostunnel/socket"
"github.com/square/ghostunnel/wildcard"
sqmetrics "github.com/square/go-sq-metrics"
kingpin "gopkg.in/alecthomas/kingpin.v2"

Expand Down
2 changes: 1 addition & 1 deletion main_test.go
Original file line number Diff line number Diff line change
Expand Up @@ -26,7 +26,7 @@ import (
"testing"
"time"

"github.com/square/ghostunnel/proxy"
"github.com/ghostunnel/ghostunnel/proxy"
"github.com/stretchr/testify/assert"
)

Expand Down
2 changes: 1 addition & 1 deletion signals.go
Original file line number Diff line number Diff line change
Expand Up @@ -22,7 +22,7 @@ import (
"os/signal"
"time"

"github.com/square/ghostunnel/proxy"
"github.com/ghostunnel/ghostunnel/proxy"
)

// isShutdownSignal checks if the received signal is a shutdown signal
Expand Down
2 changes: 1 addition & 1 deletion tls.go
Original file line number Diff line number Diff line change
Expand Up @@ -21,7 +21,7 @@ import (
"fmt"
"strings"

"github.com/square/ghostunnel/certloader"
"github.com/ghostunnel/ghostunnel/certloader"
)

// Unsafe cipher suites available for compatibility reasons. To unlock these
Expand Down

0 comments on commit 6ba97af

Please sign in to comment.