2022-06-16 17:23:12 +00:00
|
|
|
{ lib
|
|
|
|
, buildGoModule
|
|
|
|
, fetchFromGitHub
|
|
|
|
, installShellFiles
|
|
|
|
}:
|
|
|
|
|
|
|
|
buildGoModule rec {
|
|
|
|
pname = "chain-bench";
|
2024-01-13 08:15:51 +00:00
|
|
|
version = "0.1.10";
|
2022-06-16 17:23:12 +00:00
|
|
|
|
|
|
|
src = fetchFromGitHub {
|
|
|
|
owner = "aquasecurity";
|
|
|
|
repo = pname;
|
|
|
|
rev = "v${version}";
|
2024-01-13 08:15:51 +00:00
|
|
|
sha256 = "sha256-5+jSbXbT1UwHMVeZ07qcY8Is88ddHdr7QlgcbQK+8FA=";
|
2022-06-16 17:23:12 +00:00
|
|
|
};
|
2024-01-13 08:15:51 +00:00
|
|
|
vendorHash = "sha256-uN4TSAxb229NhcWmiQmWBajla9XKnpiZrXOWJxt/mic=";
|
2022-06-16 17:23:12 +00:00
|
|
|
|
|
|
|
nativeBuildInputs = [ installShellFiles ];
|
|
|
|
|
|
|
|
ldflags = [
|
|
|
|
"-s"
|
|
|
|
"-w"
|
|
|
|
"-X main.version=v${version}"
|
|
|
|
];
|
|
|
|
|
|
|
|
postInstall = ''
|
|
|
|
installShellCompletion --cmd chain-bench \
|
|
|
|
--bash <($out/bin/chain-bench completion bash) \
|
|
|
|
--fish <($out/bin/chain-bench completion fish) \
|
|
|
|
--zsh <($out/bin/chain-bench completion zsh)
|
|
|
|
'';
|
|
|
|
|
|
|
|
doInstallCheck = true;
|
|
|
|
installCheckPhase = ''
|
|
|
|
runHook preInstallCheck
|
|
|
|
$out/bin/chain-bench --help
|
|
|
|
$out/bin/chain-bench --version | grep "v${version}"
|
|
|
|
runHook postInstallCheck
|
|
|
|
'';
|
|
|
|
|
|
|
|
meta = with lib; {
|
|
|
|
homepage = "https://github.com/aquasecurity/chain-bench";
|
|
|
|
changelog = "https://github.com/aquasecurity/chain-bench/releases/tag/v${version}";
|
|
|
|
description = "An open-source tool for auditing your software supply chain stack for security compliance based on a new CIS Software Supply Chain benchmark";
|
2024-04-21 15:54:59 +00:00
|
|
|
mainProgram = "chain-bench";
|
2022-06-16 17:23:12 +00:00
|
|
|
longDescription = ''
|
|
|
|
Chain-bench is an open-source tool for auditing your software supply chain
|
|
|
|
stack for security compliance based on a new CIS Software Supply Chain
|
|
|
|
benchmark. The auditing focuses on the entire SDLC process, where it can
|
|
|
|
reveal risks from code time into deploy time. To win the race against
|
|
|
|
hackers and protect your sensitive data and customer trust, you need to
|
|
|
|
ensure your code is compliant with your organization's policies.
|
|
|
|
'';
|
|
|
|
license = licenses.asl20;
|
|
|
|
maintainers = with maintainers; [ jk ];
|
|
|
|
};
|
|
|
|
}
|