nixpkgs/pkgs/development/tools/conftest/default.nix
2021-11-02 18:22:31 -07:00

57 lines
1.7 KiB
Nix

{ lib, buildGoModule, fetchFromGitHub, installShellFiles }:
buildGoModule rec {
pname = "conftest";
version = "0.28.2";
src = fetchFromGitHub {
owner = "open-policy-agent";
repo = "conftest";
rev = "v${version}";
sha256 = "sha256-lmmk6veBDI51UA/wnFB7Q3DTxZ9J/1qp0OoNgmBrR1Y=";
};
vendorSha256 = "sha256-NALyUjFL6OqgCke1QiUxbSNLAoaIMB2zeIWWEfcnCjs=";
ldflags = [
"-s"
"-w"
"-X github.com/open-policy-agent/conftest/internal/commands.version=${version}"
];
nativeBuildInputs = [ installShellFiles ];
preCheck = ''
export HOME="$TMPDIR"
'';
postInstall = ''
installShellCompletion --cmd conftest \
--bash <($out/bin/conftest completion bash) \
--fish <($out/bin/conftest completion fish) \
--zsh <($out/bin/conftest completion zsh)
'';
doInstallCheck = true;
installCheckPhase = ''
export HOME="$TMPDIR"
$out/bin/conftest --version | grep ${version} > /dev/null
'';
meta = with lib; {
description = "Write tests against structured configuration data";
downloadPage = "https://github.com/open-policy-agent/conftest";
homepage = "https://www.conftest.dev";
license = licenses.asl20;
longDescription = ''
Conftest helps you write tests against structured configuration data.
Using Conftest you can write tests for your Kubernetes configuration,
Tekton pipeline definitions, Terraform code, Serverless configs or any
other config files.
Conftest uses the Rego language from Open Policy Agent for writing the
assertions. You can read more about Rego in 'How do I write policies' in
the Open Policy Agent documentation.
'';
maintainers = with maintainers; [ jk yurrriq ];
};
}