nixpkgs/pkgs/tools/security/kdigger/default.nix
Fabián Heredia Montiel ff323ed355 treewide: vendorSha256 → vendorHash
via: `find pkgs/ -type f -exec sed -i 's/vendorSha256 = "sha256/vendorHash = "sha256/' {};`
2023-09-13 01:03:44 -06:00

75 lines
2.1 KiB
Nix

{ lib
, stdenv
, buildGoModule
, fetchFromGitHub
, installShellFiles
}:
buildGoModule rec {
pname = "kdigger";
version = "1.5.0";
src = fetchFromGitHub {
owner = "quarkslab";
repo = pname;
rev = "v${version}";
sha256 = "sha256-/F1wmP1hfhrAmx2jJtAn02LkTabi0RJu36T/oW3tyZw=";
# populate values that require us to use git. By doing this in postFetch we
# can delete .git afterwards and maintain better reproducibility of the src.
leaveDotGit = true;
postFetch = ''
cd "$out"
git rev-parse HEAD > $out/COMMIT
find "$out" -name .git -print0 | xargs -0 rm -rf
'';
};
vendorHash = "sha256-rDJFowbOj77n/sBoDgFEF+2PgghxufvIgzbMqrHehws=";
nativeBuildInputs = [ installShellFiles ];
# static to be easily copied into containers since it's an in-pod pen-testing tool
CGO_ENABLED = 0;
ldflags = [
"-s"
"-w"
"-X github.com/quarkslab/kdigger/commands.VERSION=v${version}"
"-X github.com/quarkslab/kdigger/commands.BUILDERARCH=${stdenv.hostPlatform.linuxArch}"
];
preBuild = ''
ldflags+=" -X github.com/quarkslab/kdigger/commands.GITCOMMIT=$(cat COMMIT)"
'';
postInstall = ''
installShellCompletion --cmd kdigger \
--bash <($out/bin/kdigger completion bash) \
--fish <($out/bin/kdigger completion fish) \
--zsh <($out/bin/kdigger completion zsh)
'';
doInstallCheck = true;
installCheckPhase = ''
runHook preInstallCheck
$out/bin/kdigger --help
runHook postInstallCheck
'';
meta = with lib; {
homepage = "https://github.com/quarkslab/kdigger";
changelog = "https://github.com/quarkslab/kdigger/releases/tag/v${version}";
description = "An in-pod context discovery tool for Kubernetes penetration testing";
longDescription = ''
kdigger, short for "Kubernetes digger", is a context discovery tool for
Kubernetes penetration testing. This tool is a compilation of various
plugins called buckets to facilitate pentesting Kubernetes from inside a
pod.
'';
license = licenses.asl20;
maintainers = with maintainers; [ jk ];
platforms = [ "x86_64-linux" "aarch64-linux" "x86_64-darwin" ];
};
}