nixpkgs/pkgs/tools/security/kubescape/default.nix

Ignoring revisions in .git-blame-ignore-revs. Click here to bypass and see the normal blame view.

89 lines
2.8 KiB
Nix
Raw Normal View History

2021-11-10 09:04:07 +00:00
{ lib
, buildGoModule
, fetchFromGitHub
, installShellFiles
}:
2021-09-03 17:23:07 +00:00
buildGoModule rec {
pname = "kubescape";
2022-07-08 22:50:04 +00:00
version = "2.0.161";
2021-09-03 17:23:07 +00:00
src = fetchFromGitHub {
owner = "armosec";
repo = pname;
rev = "v${version}";
2022-07-08 22:50:04 +00:00
hash = "sha256-rsO6ZTQg5fmpp+5Zx36tQnDW1vf2k+FCI3cFbGZifVM=";
2021-09-03 17:23:07 +00:00
};
2022-07-08 22:50:04 +00:00
vendorSha256 = "sha256-EinrVdGdYroh0X/ACAVD2gw4k0jrPHQ3Ucb3TUYKd8Q=";
2021-09-03 17:23:07 +00:00
2021-11-10 09:04:07 +00:00
nativeBuildInputs = [
installShellFiles
];
ldflags = [
"-s"
"-w"
2022-04-11 14:58:37 +00:00
"-X github.com/armosec/kubescape/v2/core/cautils.BuildNumber=v${version}"
2021-11-10 09:04:07 +00:00
];
2021-10-26 13:27:47 +00:00
2022-04-11 14:58:37 +00:00
subPackages = [ "." ];
preCheck = ''
# Feed in all but the integration tests for testing
# This is because subPackages above limits what is built to just what we
# want but also limits the tests
# Skip httphandler tests - the checkPhase doesn't care about excludedPackages
getGoDirs() {
go list ./... | grep -v httphandler
}
2022-05-24 08:57:34 +00:00
# remove tests that use networking
rm core/pkg/resourcehandler/urlloader_test.go
# remove tests that use networking
substituteInPlace core/pkg/resourcehandler/repositoryscanner_test.go \
--replace "TestScanRepository" "SkipScanRepository" \
--replace "TestGit" "SkipGit"
2022-05-26 07:53:03 +00:00
# remove test that requires networking
2022-05-24 08:57:34 +00:00
substituteInPlace core/cautils/scaninfo_test.go \
2022-05-26 07:53:03 +00:00
--replace "TestSetContextMetadata" "SkipSetContextMetadata"
2022-03-31 16:53:17 +00:00
'';
2021-10-26 13:27:47 +00:00
postInstall = ''
installShellCompletion --cmd kubescape \
--bash <($out/bin/kubescape completion bash) \
--fish <($out/bin/kubescape completion fish) \
--zsh <($out/bin/kubescape completion zsh)
'';
2021-09-03 17:23:07 +00:00
2022-03-31 16:53:17 +00:00
doInstallCheck = true;
installCheckPhase = ''
runHook preInstallCheck
$out/bin/kubescape --help
2022-04-11 14:58:37 +00:00
# `--version` vs `version` shows the version without checking for latest
# if the flag is missing the BuildNumber may have moved
2022-03-31 16:53:17 +00:00
$out/bin/kubescape --version | grep "v${version}"
runHook postInstallCheck
'';
2021-09-03 17:23:07 +00:00
meta = with lib; {
description = "Tool for testing if Kubernetes is deployed securely";
homepage = "https://github.com/armosec/kubescape";
2021-10-26 13:27:47 +00:00
changelog = "https://github.com/armosec/kubescape/releases/tag/v${version}";
longDescription = ''
Kubescape is the first open-source tool for testing if Kubernetes is
deployed securely according to multiple frameworks: regulatory, customized
company policies and DevSecOps best practices, such as the NSA-CISA and
the MITRE ATT&CK®.
Kubescape scans K8s clusters, YAML files, and HELM charts, and detect
misconfigurations and software vulnerabilities at early stages of the
CI/CD pipeline and provides a risk score instantly and risk trends over
time. Kubescape integrates natively with other DevOps tools, including
Jenkins, CircleCI and Github workflows.
'';
2021-09-03 17:23:07 +00:00
license = licenses.asl20;
2021-10-26 13:27:47 +00:00
maintainers = with maintainers; [ fab jk ];
2021-09-03 17:23:07 +00:00
};
}