36 lines
998 B
Markdown
36 lines
998 B
Markdown
# gosec-docker
|
|
|
|
[![Build Status](https://drone.cryptic.systems/api/badges/volker.raschek/gosec-docker/status.svg)](https://drone.cryptic.systems/volker.raschek/gosec-docker)
|
|
[![Docker Pulls](https://img.shields.io/docker/pulls/volkerraschek/gosec)](https://hub.docker.com/r/volkerraschek/gosec)
|
|
|
|
This project contains all sources to build the container image
|
|
`docker.io/volkerraschek/gosec`. The primary goal of this project is to package
|
|
the binary `gosec` as container image to provide the functionally for CI/CD
|
|
workflows. The source code of the binary can be found in the upstream project of
|
|
[gosec](github.com/securego/gosec).
|
|
|
|
## drone
|
|
|
|
Here is an example how to use `docker.io/volkerraschek/gosec` to scan for
|
|
vulerabilities.
|
|
|
|
```yaml
|
|
kind: pipeline
|
|
type: kubernetes
|
|
name: vulnerability-scan
|
|
|
|
platform:
|
|
os: linux
|
|
arch: amd64
|
|
|
|
steps:
|
|
- name: gosec
|
|
commands:
|
|
- gosec -v ./...
|
|
image: docker.io/volkerraschek/gosec:latest
|
|
resources:
|
|
limits:
|
|
cpu: 250
|
|
memory: 500M
|
|
```
|