nixpkgs-suyu/pkgs/tools/security/chain-bench/default.nix

57 lines
1.8 KiB
Nix

{ lib
, buildGoModule
, fetchFromGitHub
, installShellFiles
}:
buildGoModule rec {
pname = "chain-bench";
version = "0.1.7";
src = fetchFromGitHub {
owner = "aquasecurity";
repo = pname;
rev = "v${version}";
sha256 = "sha256-UWP/S15s9k92RhH6xr0V544BHF4n9g+inN6Sdpja6uM=";
};
vendorSha256 = "sha256-R6V4dE2cNKcsBweSaUWjZHKnUQP/kADAbW2aTQc7TAg=";
nativeBuildInputs = [ installShellFiles ];
ldflags = [
"-s"
"-w"
"-X main.version=v${version}"
];
postInstall = ''
installShellCompletion --cmd chain-bench \
--bash <($out/bin/chain-bench completion bash) \
--fish <($out/bin/chain-bench completion fish) \
--zsh <($out/bin/chain-bench completion zsh)
'';
doInstallCheck = true;
installCheckPhase = ''
runHook preInstallCheck
$out/bin/chain-bench --help
$out/bin/chain-bench --version | grep "v${version}"
runHook postInstallCheck
'';
meta = with lib; {
homepage = "https://github.com/aquasecurity/chain-bench";
changelog = "https://github.com/aquasecurity/chain-bench/releases/tag/v${version}";
description = "An open-source tool for auditing your software supply chain stack for security compliance based on a new CIS Software Supply Chain benchmark";
longDescription = ''
Chain-bench is an open-source tool for auditing your software supply chain
stack for security compliance based on a new CIS Software Supply Chain
benchmark. The auditing focuses on the entire SDLC process, where it can
reveal risks from code time into deploy time. To win the race against
hackers and protect your sensitive data and customer trust, you need to
ensure your code is compliant with your organization's policies.
'';
license = licenses.asl20;
maintainers = with maintainers; [ jk ];
};
}