uboot: (firmwareOdroidC2/C4) don't invoke patch tool, use patches = [] instead
https://github.com/NixOS/nixpkgs/blob/master/pkgs/stdenv/generic/setup.sh#L948 this can do it nicely. Signed-off-by: Anton Arapov <anton@deadbeef.mx>
This commit is contained in:
commit
56de2bcd43
30691 changed files with 3076956 additions and 0 deletions
88
pkgs/tools/security/kubescape/default.nix
Normal file
88
pkgs/tools/security/kubescape/default.nix
Normal file
|
|
@ -0,0 +1,88 @@
|
|||
{ lib
|
||||
, buildGoModule
|
||||
, fetchFromGitHub
|
||||
, installShellFiles
|
||||
}:
|
||||
|
||||
buildGoModule rec {
|
||||
pname = "kubescape";
|
||||
version = "2.0.156";
|
||||
|
||||
src = fetchFromGitHub {
|
||||
owner = "armosec";
|
||||
repo = pname;
|
||||
rev = "v${version}";
|
||||
hash = "sha256-bbTafsHllJQZ9Qn+qFnlr/AdU7NgB/vAvQGIgt/XDNQ=";
|
||||
};
|
||||
vendorSha256 = "sha256-zj2gDx5333AguLs1Gzu3bYXslDwvPFSbMmOTOFxmq6A=";
|
||||
|
||||
nativeBuildInputs = [
|
||||
installShellFiles
|
||||
];
|
||||
|
||||
ldflags = [
|
||||
"-s"
|
||||
"-w"
|
||||
"-X github.com/armosec/kubescape/v2/core/cautils.BuildNumber=v${version}"
|
||||
];
|
||||
|
||||
subPackages = [ "." ];
|
||||
|
||||
preCheck = ''
|
||||
# Feed in all but the integration tests for testing
|
||||
# This is because subPackages above limits what is built to just what we
|
||||
# want but also limits the tests
|
||||
# Skip httphandler tests - the checkPhase doesn't care about excludedPackages
|
||||
getGoDirs() {
|
||||
go list ./... | grep -v httphandler
|
||||
}
|
||||
|
||||
# remove tests that use networking
|
||||
rm core/pkg/resourcehandler/urlloader_test.go
|
||||
|
||||
# remove tests that use networking
|
||||
substituteInPlace core/pkg/resourcehandler/repositoryscanner_test.go \
|
||||
--replace "TestScanRepository" "SkipScanRepository" \
|
||||
--replace "TestGit" "SkipGit"
|
||||
|
||||
# remove test that requires networking
|
||||
substituteInPlace core/cautils/scaninfo_test.go \
|
||||
--replace "TestSetContextMetadata" "SkipSetContextMetadata"
|
||||
'';
|
||||
|
||||
postInstall = ''
|
||||
installShellCompletion --cmd kubescape \
|
||||
--bash <($out/bin/kubescape completion bash) \
|
||||
--fish <($out/bin/kubescape completion fish) \
|
||||
--zsh <($out/bin/kubescape completion zsh)
|
||||
'';
|
||||
|
||||
doInstallCheck = true;
|
||||
installCheckPhase = ''
|
||||
runHook preInstallCheck
|
||||
$out/bin/kubescape --help
|
||||
# `--version` vs `version` shows the version without checking for latest
|
||||
# if the flag is missing the BuildNumber may have moved
|
||||
$out/bin/kubescape --version | grep "v${version}"
|
||||
runHook postInstallCheck
|
||||
'';
|
||||
|
||||
meta = with lib; {
|
||||
description = "Tool for testing if Kubernetes is deployed securely";
|
||||
homepage = "https://github.com/armosec/kubescape";
|
||||
changelog = "https://github.com/armosec/kubescape/releases/tag/v${version}";
|
||||
longDescription = ''
|
||||
Kubescape is the first open-source tool for testing if Kubernetes is
|
||||
deployed securely according to multiple frameworks: regulatory, customized
|
||||
company policies and DevSecOps best practices, such as the NSA-CISA and
|
||||
the MITRE ATT&CK®.
|
||||
Kubescape scans K8s clusters, YAML files, and HELM charts, and detect
|
||||
misconfigurations and software vulnerabilities at early stages of the
|
||||
CI/CD pipeline and provides a risk score instantly and risk trends over
|
||||
time. Kubescape integrates natively with other DevOps tools, including
|
||||
Jenkins, CircleCI and Github workflows.
|
||||
'';
|
||||
license = licenses.asl20;
|
||||
maintainers = with maintainers; [ fab jk ];
|
||||
};
|
||||
}
|
||||
Loading…
Add table
Add a link
Reference in a new issue