diff --git a/README.md b/README.md index 7298ee2..0107d29 100644 --- a/README.md +++ b/README.md @@ -2,10 +2,14 @@ [![Maven Central](https://maven-badges.herokuapp.com/maven-central/se.bjurr.violations/violations-command-line/badge.svg)](https://maven-badges.herokuapp.com/maven-central/se.bjurr.violations/violations-command-line) [![NPM](https://img.shields.io/npm/v/violations-command-line.svg?style=flat-square) ](https://www.npmjs.com/package/violations-command-line) +[![NPM Downloads](https://img.shields.io/npm/dm/violations-command-line.svg?style=flat)](https://www.npmjs.com/package/violations-command-line) +[![Docker Pulls](https://badgen.net/docker/pulls/tomasbjerre/violations-command-line?icon=docker&label=pulls)](https://hub.docker.com/r/tomasbjerre/violations-command-line/) This is a command line tool that will find report files from static code analysis, present and optionally fail the command. It uses the [Violations Lib](https://github.com/tomasbjerre/violations-lib). -The runnable can be found in [Maven Central](http://search.maven.org/#search%7Cga%7C1%7Ca%3A%22violations-command-line%22) or [NPM](https://www.npmjs.com/package/violations-command-line). +- The runnable can be found in [Maven Central](http://search.maven.org/#search%7Cga%7C1%7Ca%3A%22violations-command-line%22) +- or [NPM](https://www.npmjs.com/package/violations-command-line). +- The `Docker` image can be found in [Dockerhub](https://hub.docker.com/r/tomasbjerre/violations-command-line) and used like `docker run --mount src="$(pwd)",target=/home/violations-command-line,type=bind tomasbjerre/violations-command-line:X`. Run it with: diff --git a/gradle.properties b/gradle.properties index ddcfb81..463da44 100644 --- a/gradle.properties +++ b/gradle.properties @@ -1,4 +1,4 @@ #Thu Jun 01 18:57:54 CEST 2023 version=1.24.3 -description=A collection of scripts +description=Command line tool that will find report files from static code analysis, present and optionally fail the command. group=se.bjurr.violations