forked from mirrors/nixpkgs
34 lines
1.1 KiB
Nix
34 lines
1.1 KiB
Nix
{ lib, buildGoModule, fetchFromGitHub }:
|
|
|
|
buildGoModule rec {
|
|
pname = "snowcat";
|
|
version = "0.1.3";
|
|
|
|
src = fetchFromGitHub {
|
|
owner = "praetorian-inc";
|
|
repo = pname;
|
|
rev = "v${version}";
|
|
sha256 = "sha256-EulQYGOMIh952e4Xp13hT/HMW3qP1QXYtt5PEej1VTY=";
|
|
};
|
|
vendorSha256 = "sha256-D6ipwGMxT0B3uYUzg6Oo2TYnsOVBY0mYO5lC7vtVPc0=";
|
|
|
|
ldflags = [ "-s" "-w" ];
|
|
|
|
meta = with lib; {
|
|
homepage = "https://github.com/praetorian-inc/snowcat";
|
|
changelog = "https://github.com/praetorian-inc/snowcat/releases/tag/v${version}";
|
|
description = "A tool to audit the istio service mesh";
|
|
longDescription = ''
|
|
Snowcat gathers and analyzes the configuration of an Istio cluster and
|
|
audits it for potential violations of security best practices.
|
|
|
|
There are two main modes of operation for Snowcat. With no positional
|
|
argument, Snowcat will assume it is running inside of a cluster enabled
|
|
with Istio, and begin to enumerate the required data. Optionally, you can
|
|
point snowcat at a directory containing Kubernets YAML files.
|
|
'';
|
|
license = licenses.asl20;
|
|
maintainers = with maintainers; [ jk ];
|
|
};
|
|
}
|