2020-10-13 13:18:41 +00:00
|
|
|
{ lib, buildGoModule, fetchFromGitHub }:
|
|
|
|
|
|
|
|
buildGoModule rec {
|
|
|
|
pname = "trivy";
|
2021-05-24 09:21:18 +00:00
|
|
|
version = "0.18.3";
|
2020-10-13 13:18:41 +00:00
|
|
|
|
|
|
|
src = fetchFromGitHub {
|
|
|
|
owner = "aquasecurity";
|
|
|
|
repo = pname;
|
|
|
|
rev = "v${version}";
|
2021-05-24 09:21:18 +00:00
|
|
|
sha256 = "sha256-YQYDDg4rgLygswGl/IYb+USSsuXQ8kXh4NhQYvnaCko=";
|
2020-10-13 13:18:41 +00:00
|
|
|
};
|
|
|
|
|
2021-05-24 09:21:18 +00:00
|
|
|
vendorSha256 = "sha256-f1un8jWhx7VfbbYV0/t3SLFXp496Wt5aEHkcuj/U4KQ=";
|
2020-10-13 13:18:41 +00:00
|
|
|
|
2021-04-30 07:52:32 +00:00
|
|
|
excludedPackages = "misc";
|
2020-10-13 14:24:22 +00:00
|
|
|
|
2021-04-30 07:52:32 +00:00
|
|
|
preBuild = ''
|
|
|
|
buildFlagsArray+=("-ldflags" "-s -w -X main.version=v${version}")
|
|
|
|
'';
|
2020-10-13 13:18:41 +00:00
|
|
|
|
2021-05-02 10:11:01 +00:00
|
|
|
doInstallCheck = true;
|
|
|
|
installCheckPhase = ''
|
|
|
|
runHook preInstallCheck
|
|
|
|
$out/bin/trivy --help
|
|
|
|
$out/bin/trivy --version | grep "v${version}"
|
|
|
|
runHook postInstallCheck
|
|
|
|
'';
|
|
|
|
|
2020-10-13 13:18:41 +00:00
|
|
|
meta = with lib; {
|
2021-04-30 07:52:32 +00:00
|
|
|
homepage = "https://github.com/aquasecurity/trivy";
|
|
|
|
changelog = "https://github.com/aquasecurity/trivy/releases/tag/v${version}";
|
2020-10-13 13:18:41 +00:00
|
|
|
description = "A simple and comprehensive vulnerability scanner for containers, suitable for CI";
|
|
|
|
longDescription = ''
|
|
|
|
Trivy is a simple and comprehensive vulnerability scanner for containers
|
|
|
|
and other artifacts. A software vulnerability is a glitch, flaw, or
|
|
|
|
weakness present in the software or in an Operating System. Trivy detects
|
|
|
|
vulnerabilities of OS packages (Alpine, RHEL, CentOS, etc.) and
|
|
|
|
application dependencies (Bundler, Composer, npm, yarn, etc.).
|
|
|
|
'';
|
|
|
|
license = licenses.asl20;
|
|
|
|
maintainers = with maintainers; [ jk ];
|
|
|
|
};
|
|
|
|
}
|