Source files of the container image volkerraschek/gosec
Go to file
Markus Pesch 940e7c7918
All checks were successful
continuous-integration/drone/push Build is passing
fix(Makefile): rename default registry host and username
2023-10-18 14:01:40 +02:00
.dockerignore Initial Commit 2022-01-30 22:49:28 +01:00
.drone.yml fix: forward leading version char correctly 2023-10-15 14:38:46 +02:00
.editorconfig Initial Commit 2022-01-30 22:49:28 +01:00
.gitattributes Initial Commit 2022-01-30 22:49:28 +01:00
.gitignore Initial Commit 2022-01-30 22:49:28 +01:00
.markdownlint.yaml Initial Commit 2022-01-30 22:49:28 +01:00
Dockerfile fix: forward leading version char correctly 2023-10-15 14:38:46 +02:00
LICENSE Initial Commit 2022-01-30 22:49:28 +01:00
Makefile fix(Makefile): rename default registry host and username 2023-10-18 14:01:40 +02:00
manifest.tmpl fix(ci): migrate to git.cryptic.systems 2023-07-08 18:52:06 +02:00
README.md Initial Commit 2022-01-30 22:49:28 +01:00
renovate.json fix(renovate): exclude updating docker.io/plugins/docker 2023-09-03 16:14:45 +02:00

gosec-docker

Build Status Docker Pulls

This project contains all sources to build the container image docker.io/volkerraschek/gosec. The primary goal of this project is to package the binary gosec as container image to provide the functionally for CI/CD workflows. The source code of the binary can be found in the upstream project of gosec.

drone

Here is an example how to use docker.io/volkerraschek/gosec to scan for vulerabilities.

kind: pipeline
type: kubernetes
name: vulnerability-scan

platform:
  os: linux
  arch: amd64

steps:
- name: gosec
  commands:
  - gosec -v ./...
  image: docker.io/volkerraschek/gosec:latest
  resources:
    limits:
      cpu: 250
      memory: 500M