{ lib , buildGoModule , fetchFromGitHub }: buildGoModule rec { pname = "trivy"; version = "0.44.0"; src = fetchFromGitHub { owner = "aquasecurity"; repo = pname; rev = "v${version}"; sha256 = "sha256-qxtYYFhABrkJlwWBx4ak7xnaqg7x+D1fUF1gcJFK0e4="; }; # hash missmatch on across linux and darwin proxyVendor = true; vendorHash = "sha256-mE+GpD9vMhjVQsH+mckU6GhNiLMDV5H31Jj1/HLBSEs="; subPackages = [ "cmd/trivy" ]; ldflags = [ "-s" "-w" "-X main.version=v${version}" ]; # Tests require network access doCheck = false; doInstallCheck = true; installCheckPhase = '' runHook preInstallCheck $out/bin/trivy --help $out/bin/trivy --version | grep "v${version}" runHook postInstallCheck ''; meta = with lib; { homepage = "https://github.com/aquasecurity/trivy"; changelog = "https://github.com/aquasecurity/trivy/releases/tag/v${version}"; description = "A simple and comprehensive vulnerability scanner for containers, suitable for CI"; longDescription = '' Trivy is a simple and comprehensive vulnerability scanner for containers and other artifacts. A software vulnerability is a glitch, flaw, or weakness present in the software or in an Operating System. Trivy detects vulnerabilities of OS packages (Alpine, RHEL, CentOS, etc.) and application dependencies (Bundler, Composer, npm, yarn, etc.). ''; license = licenses.asl20; maintainers = with maintainers; [ jk ]; }; }