Skip to content

Commit ba9b643

Browse files
authored
docs: update docs across jobs, executors, and examples (#13)
Fixes typos and rewrites descriptions and comments across the current jobs, executors, examples, and scripts.
1 parent f8e010f commit ba9b643

File tree

11 files changed

+27
-24
lines changed

11 files changed

+27
-24
lines changed

src/examples/git_detect_leaks.yml

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -5,6 +5,7 @@ description: |
55
up to last commit in a build.
66
The base revision should be provided for the most accurate results, while the base branch
77
can be overridden if necessary.
8+
89
usage:
910
version: 2.1
1011
orbs:

src/examples/pnpm_scan.yml

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -2,6 +2,7 @@ description: |
22
By default, the "scan_dependencies" job checks for production dependencies
33
with critical and high severity vulnerabilities.
44
There is an option to override the scan command, package manager, and root directory.
5+
56
usage:
67
version: 2.1
78
orbs:

src/examples/sast.yml

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -4,6 +4,7 @@ description: |
44
are scanned, or files scoped to the pull request if a short-lived branch is in question.
55
There is an option to scan all files inside a repository, change a base branch,
66
and enforce a different set of scan rules.
7+
78
usage:
89
version: 2.1
910
orbs:

src/executors/gitleaks.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
description: >
2-
A Docker executor using default Gitleaks image based on Alpine Linux.
2+
A Docker executor using the official Gitleaks image based on Alpine Linux.
33
44
parameters:
55
tag:

src/executors/semgrep.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
description: >
2-
A Docker executor using official Semgrep image based on Alpine Linux.
2+
A Docker executor using the official Semgrep image based on Alpine Linux.
33
44
parameters:
55
tag:

src/jobs/analyze_code.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
description: >
22
Run static analysis, or SAST, to find vulnerabilities in the codebase. Utilizes the Semgrep "scan"
3-
command to do the analysis, for details hot it works see https://semgrep.dev/docs/cli-reference.
3+
command to do the analysis. For details on usage see https://semgrep.dev/docs/cli-reference.
44
55
executor: semgrep
66

@@ -29,7 +29,7 @@ parameters:
2929
type: string
3030
default: ''
3131
description: >
32-
The name of the base branch for this scan. Usually some long-lived branch, e.g. default branch.
32+
The name of the base branch for this scan. Commonly a long-lived branch, e.g. "main" or "master".
3333
3434
steps:
3535
- checkout

src/jobs/detect_secrets_dir.yml

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -1,23 +1,23 @@
11
description: >
2-
Detect secrets leak inside a project at the directory level. Uses "gitleaks detect" command
3-
to do the scan, for details how it works see https://github.com/gitleaks/gitleaks#usage.
2+
Detect secrets leak inside a project at the directory level. Under the hood, the "gitleaks detect"
3+
command is utilized. For details on usage see https://github.com/gitleaks/gitleaks#usage.
44
55
executor: gitleaks
66

77
parameters:
88
path:
99
type: string
1010
default: '.'
11-
description: Path to the directory to scan.
11+
description: The path to the directory to scan.
1212
config:
1313
type: string
1414
default: ''
1515
description: >
16-
Path to the Gitleaks config file. By default tries to load <<paramets.path>>/.gitleaks.toml.
16+
The path to the Gitleaks config file. By default, it tries to load "<<parameters.path>>/.gitleaks.toml".
1717
baseline:
1818
type: string
1919
default: ''
20-
description: Path to the baseline report, i.e. issues that can be ignorred.
20+
description: The path to the baseline report, i.e. issues that can be ignored.
2121

2222
steps:
2323
- checkout
@@ -28,7 +28,7 @@ steps:
2828
BASELINE_REPORT: <<parameters.baseline>>
2929
command: <<include(scripts/export-gitleaks-args.sh)>>
3030
- run:
31-
name: Detect secrets inside directory
31+
name: Detect secrets inside the directory
3232
working_directory: <<parameters.path>>
3333
environment:
3434
DIR_PATH: <<parameters.path>>

src/jobs/detect_secrets_git.yml

Lines changed: 9 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -1,34 +1,34 @@
11
description: >
2-
Detect secrets leak inside a project at the repository level. Uses "gitleaks detect" command
3-
to do the scan, for details how it works see https://github.com/gitleaks/gitleaks#usage.
2+
Detect secrets leak inside a project at the repository level. Under the hood, the "gitleaks detect"
3+
command is utilized. For details on usage see https://github.com/gitleaks/gitleaks#usage.
44
55
executor: gitleaks
66

77
parameters:
88
path:
99
type: string
1010
default: '.'
11-
description: Path to the root of the Git repository to scan.
11+
description: The path to the root of the Git repository to scan.
1212
config:
1313
type: string
1414
default: ''
1515
description: >
16-
Path to the Gitleaks config file. By default tries to load <<paramets.path>>/.gitleaks.toml.
16+
The path to the Gitleaks config file. By default, it tries to load "<<parameters.path>>/.gitleaks.toml".
1717
baseline:
1818
type: string
1919
default: ''
20-
description: Path to the baseline report, i.e. issues that can be ignorred.
20+
description: The path to the baseline report, i.e. issues that can be ignored.
2121
base_branch:
2222
type: string
2323
default: ''
2424
description: >
25-
The name of the base branch for for this scan. Usually some long-lived branch, e.g. default branch.
25+
The name of the base branch for this scan. Commonly a long-lived branch, e.g. "main" or "master".
2626
base_revision:
2727
type: string
2828
default: ''
2929
description: >
30-
The hash of the last scanned commit from the prior build. Usually just pass CircleCI's
31-
<<pipeline.git.base_revision>> pipeline parameter.
30+
The hash of the last scanned commit from the prior build. Usually, pass CircleCI
31+
"<<pipeline.git.base revision>>" pipeline parameter.
3232
3333
steps:
3434
- checkout
@@ -39,7 +39,7 @@ steps:
3939
BASELINE_REPORT: <<parameters.baseline>>
4040
command: <<include(scripts/export-gitleaks-args.sh)>>
4141
- run:
42-
name: Detect secrets inside Git repository
42+
name: Detect secrets inside the Git repository
4343
working_directory: <<parameters.path>>
4444
environment:
4545
REPO_PATH: <<parameters.path>>

src/jobs/scan_dependencies.yml

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -17,8 +17,8 @@ parameters:
1717
type: string
1818
default: '.'
1919
description: >
20-
Path to the directory containing package.json file.
21-
Not needed when package.json is in the root.
20+
Path to the directory containing "package.json" file.
21+
Not needed when "package.json" is in the root.
2222
scan_command:
2323
type: string
2424
default: ''
@@ -29,7 +29,7 @@ parameters:
2929
steps:
3030
- checkout
3131
- run:
32-
name: Check lockfile
32+
name: Check the lockfile
3333
working_directory: <<parameters.pkg_json_dir>>
3434
command: <<include(scripts/check-lockfile.sh)>>
3535
- core/ensure_pkg_manager:

src/scripts/detect-secrets-dir.sh

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
#!/bin/bash
22

33
echo "Starting the directory scan at path '$DIR_PATH'"
4-
echo "Using exported gitleaks args '$GITLEAKS_ARGS'"
4+
echo "Using exported Gitleaks args '$GITLEAKS_ARGS'"
55
eval gitleaks "$GITLEAKS_ARGS" --no-git

0 commit comments

Comments
 (0)