36 lines
998 B
Markdown
36 lines
998 B
Markdown
|
# gosec-docker
|
||
|
|
||
|
[](https://drone.cryptic.systems/volker.raschek/gosec-docker)
|
||
|
[](https://hub.docker.com/r/volkerraschek/gosec)
|
||
|
|
||
|
This project contains all sources to build the container image
|
||
|
`docker.io/volkerraschek/gosec`. The primary goal of this project is to package
|
||
|
the binary `gosec` as container image to provide the functionally for CI/CD
|
||
|
workflows. The source code of the binary can be found in the upstream project of
|
||
|
[gosec](github.com/securego/gosec).
|
||
|
|
||
|
## drone
|
||
|
|
||
|
Here is an example how to use `docker.io/volkerraschek/gosec` to scan for
|
||
|
vulerabilities.
|
||
|
|
||
|
```yaml
|
||
|
kind: pipeline
|
||
|
type: kubernetes
|
||
|
name: vulnerability-scan
|
||
|
|
||
|
platform:
|
||
|
os: linux
|
||
|
arch: amd64
|
||
|
|
||
|
steps:
|
||
|
- name: gosec
|
||
|
commands:
|
||
|
- gosec -v ./...
|
||
|
image: docker.io/volkerraschek/gosec:latest
|
||
|
resources:
|
||
|
limits:
|
||
|
cpu: 250
|
||
|
memory: 500M
|
||
|
```
|