depot/third_party/nixpkgs/pkgs/tools/security/snowcat/default.nix
Default email bcb2f287e1 Project import generated by Copybara.
GitOrigin-RevId: d603719ec6e294f034936c0d0dc06f689d91b6c3
2024-06-20 20:27:18 +05:30

34 lines
1.2 KiB
Nix

{ lib, buildGoModule, fetchFromGitHub }:
buildGoModule rec {
pname = "snowcat";
version = "0.1.3";
src = fetchFromGitHub {
owner = "praetorian-inc";
repo = pname;
rev = "v${version}";
sha256 = "sha256-EulQYGOMIh952e4Xp13hT/HMW3qP1QXYtt5PEej1VTY=";
};
vendorHash = "sha256-D6ipwGMxT0B3uYUzg6Oo2TYnsOVBY0mYO5lC7vtVPc0=";
ldflags = [ "-s" "-w" ];
meta = with lib; {
homepage = "https://github.com/praetorian-inc/snowcat";
changelog = "https://github.com/praetorian-inc/snowcat/releases/tag/v${version}";
description = "Tool to audit the istio service mesh";
mainProgram = "snowcat";
longDescription = ''
Snowcat gathers and analyzes the configuration of an Istio cluster and
audits it for potential violations of security best practices.
There are two main modes of operation for Snowcat. With no positional
argument, Snowcat will assume it is running inside of a cluster enabled
with Istio, and begin to enumerate the required data. Optionally, you can
point snowcat at a directory containing Kubernets YAML files.
'';
license = licenses.asl20;
maintainers = with maintainers; [ jk ];
};
}