Skip to content

[pull] master from accurics:master #136

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Open
wants to merge 128 commits into
base: master
Choose a base branch
from
Open
Show file tree
Hide file tree
Changes from all commits
Commits
Show all changes
128 commits
Select commit Hold shift + click to select a range
50ad728
Bump go 1.17 (#1026)
Rchanger Mar 10, 2022
2225cff
run go mod tidy (#1184)
Rchanger Mar 11, 2022
c005c1f
Feature/best effort cft file load (#1168)
gaurav-gogia Mar 11, 2022
b34f65a
Add security policy (#1189)
bkizer-tenable Mar 21, 2022
7164868
adds: git in container which is required for go build (#1193)
Rchanger Mar 22, 2022
6a6510a
skip vuln test for dependabot (#1185)
Rchanger Mar 22, 2022
5e50a2e
typo: Change "desitnation" to "destination". (#1192)
adyavanapalli Mar 22, 2022
664798d
add CODEOWNERS (#1194)
patilpankaj212 Mar 22, 2022
173ec8f
fix: reworded error to explain tests performed (#1164)
beararmy Mar 22, 2022
13d2e45
Update mkdocs-material from 8.2.1 to 8.2.6 (#1195)
pyup-bot Mar 24, 2022
cc59c89
remove source_code_hash mapping (#1197)
patilpankaj212 Mar 24, 2022
f8c0343
update lambda function mapper (#1199)
gaurav-gogia Mar 30, 2022
830e079
Update mkdocs from 1.2.3 to 1.3.0 (#1203)
pyup-bot Mar 30, 2022
d818b60
Feature/endpoint policy download (#1200)
gaurav-gogia Mar 31, 2022
655761a
proceed to terraform static analysis when root is not nil (#1211)
patilpankaj212 Mar 31, 2022
a6a6a37
skip policy download if used -p flag and skip docker login on non mas…
Rchanger Mar 31, 2022
d2cf489
Update README.md (#1206)
sangam14 Apr 1, 2022
a59fc2b
Adds: dir scan errors in human readable output format (#1196)
Rchanger Apr 1, 2022
2345a4a
changes to honour custom temp dir path for downloading (#1214)
Rchanger Apr 1, 2022
3dbcc4f
release/v1.14.0 (#1215)
Rchanger Apr 1, 2022
119958e
skip building windows arm64 binary (#1216)
Rchanger Apr 1, 2022
471df8b
support for new flag to define custom temp directory (#1217)
Rchanger Apr 1, 2022
e3153a1
Use Docker buildx for multi-platform support (#1062)
rnsc Apr 7, 2022
fc49288
Update alpine version (#1222)
bkizer-tenable Apr 19, 2022
93a7c87
marks ecr e2e test pending till we find alternative (#1224)
Rchanger Apr 20, 2022
2bf371d
Add dep scan (#1223)
bkizer-tenable Apr 20, 2022
53457cd
file out writer implementation (#1229)
nasir-rabbani May 4, 2022
5be816d
Bump github.com/hashicorp/go-getter from 1.5.7 to 1.5.11 (#1233)
dependabot[bot] May 5, 2022
9baa8ef
fix panic while scanning https://github.com/bridgecrewio/cfngoat (#1238)
patilpankaj212 May 5, 2022
67f3c9d
Removing workflow file (#1236)
bkizer-tenable May 5, 2022
990dd2f
Bump alpine from 3.14.6 to 3.15.4 in /build (#1237)
dependabot[bot] May 5, 2022
beca33c
Update Docker (#1242)
May 10, 2022
eb1df81
Update mkdocs-material from 8.2.6 to 8.2.14 (#1240)
pyup-bot May 10, 2022
dea27da
release/v1.15.0 (#1243)
Rchanger May 10, 2022
fb1bbcc
fix: remove master ref check from release docker push step (#1244)
Rchanger May 10, 2022
5d968e3
Update README.md (#1245)
sangam14 May 12, 2022
9ae26fc
Rebranding to Tenable (#1246)
May 12, 2022
01b7dff
Fix descriptions to install terrascan (#1254)
yu-iskw May 13, 2022
ec6cae9
Rebranding repository to Tenable brand (#1253)
May 13, 2022
feb646a
nil pointer check to avoid panic (#1260)
Rchanger May 19, 2022
48b6393
support reading terraformrc file from env var (#1264)
Rchanger May 19, 2022
7126c48
release/v1.15.1 (#1267)
Rchanger May 20, 2022
c729550
fixes: panic in case of zap logger init on windows os (#1283)
Rchanger Jun 6, 2022
00664bc
Adding CFT support for new resources (#1293)
shreyas-phansalkar-189 Jun 13, 2022
3ee999a
release/v1.15.2 (#1292)
Rchanger Jun 13, 2022
313ccf3
fix: build/Dockerfile to reduce vulnerabilities (#1315)
bkizer-tenable Jul 7, 2022
a9f115a
container funcs to return dev friendly warnings (#1319)
gaurav-gogia Jul 26, 2022
8ae1345
adding PITR attribute mapping config for dyanmodb (#1340)
harkirat22 Jul 27, 2022
6da2dca
Mention pre-requirements in the README (#1375)
VeraBE Sep 1, 2022
84f0888
Add github-actions to dependabot (#1365)
gliptak Sep 1, 2022
da754a7
Update README.md (#1265)
sangam14 Sep 1, 2022
752d2a0
Add iac providers endpoint (#1307)
khasty720 Sep 5, 2022
af10a24
update libraries (#1385)
gaurav-gogia Sep 14, 2022
064c993
updated policy (#1288)
harkirat22 Sep 15, 2022
08934f4
Policy IDs update (#1396)
gaurav-gogia Sep 15, 2022
db3b7ae
vuln tests (#1394)
gaurav-gogia Sep 19, 2022
849eef7
allow host policy update (#1400)
Devanshu1Sharma Sep 22, 2022
3b428a5
Update README.md (#1409)
khasty720 Oct 12, 2022
baf1dfd
fixed typo of the function name (#1373)
Antsaniaina Oct 12, 2022
730c83f
update rds instance cft map (#1422)
gaurav-gogia Oct 19, 2022
e289cc6
Update RDS Policies (#1424)
gaurav-gogia Oct 19, 2022
944087f
release/v1.16.0 (#1427)
gaurav-gogia Oct 19, 2022
87cddb0
Update/release command (#1430)
gaurav-gogia Oct 20, 2022
b7719ed
Update object.get first parameter (#1433)
Matt2212 Oct 26, 2022
d2f8770
fix remote source url (#1437)
Rchanger Nov 1, 2022
5a49729
update cft map for elb/s3 bucket (#1434)
gaurav-gogia Nov 1, 2022
5c9eaab
updated deployment scripts (#1429)
nasir-rabbani Nov 1, 2022
7cf9d3c
Include DirScanErrors info in SARIF file (#1398)
shaopeng-gh Nov 3, 2022
7365ecf
bump goformation from v6 to v7 (#1440)
gaurav-gogia Nov 3, 2022
0f53f05
refs resolution (#1445)
gaurav-gogia Nov 4, 2022
fa11e0e
minor release 1.17.0 (#1459)
gaurav-gogia Nov 18, 2022
e4a4aec
added terraform and provider version in resource config (#1469)
nasir-rabbani Nov 29, 2022
94989ea
ignored matching provider verson in tests (#1470)
nasir-rabbani Dec 1, 2022
d9a7bf8
Bump github.com/hashicorp/go-getter from 1.5.11 to 1.6.2 (#1298)
dependabot[bot] Dec 1, 2022
d031a56
Update opa and cobra version (#1472)
nasir-rabbani Dec 2, 2022
1a46070
added tar.gz archive for windows (#1474)
nasir-rabbani Dec 2, 2022
48f78e3
fix vulns (#1486)
rahulchheda Dec 16, 2022
cf34880
release/v1.17.1 (#1492)
Rchanger Dec 16, 2022
29f0514
Support one or more values.yaml file as an input to helm scan (#1501)
nitumore Jan 19, 2023
69f403d
error due to new attribute in terraform cause all other working modul…
nitumore Jan 19, 2023
2e8c825
Bump google.golang.org/api from 0.103.0 to 0.109.0 (#1530)
dependabot[bot] Feb 3, 2023
bf56754
Bump github.com/aws/aws-sdk-go from 1.43.16 to 1.44.193 (#1534)
dependabot[bot] Feb 3, 2023
9d58834
Fix description and version rule (#1523)
kylewintaur Feb 6, 2023
b463df5
Remove wrongly placed github_repository policy from gcp folder (#1515)
hoexter Feb 6, 2023
0e10c3c
Consolidate spelling of severity levels to all uppercase LOW/MEDIUM/H…
hoexter Feb 6, 2023
32cbc36
release/v1.8.0 (#1536)
nasir-rabbani Feb 6, 2023
ef2c91d
added sonar-properties file to skip tests from sonar analysis (#1544)
nasir-rabbani Mar 17, 2023
77ba67b
Snyk test (#1550)
mandibles232 Apr 4, 2023
4f1e403
Bump github.com/docker/docker (#1552)
dependabot[bot] Apr 11, 2023
205e2b5
bugfix: provider version coming as 0.0.0 or empty (#1553)
nasir-rabbani Apr 12, 2023
0432a13
release 1.18.1 (#1554)
nasir-rabbani Apr 14, 2023
cae77e2
Spelling (#1496)
jsoref Apr 26, 2023
ce41093
remove k8s admission log UI (#1556)
nasir-rabbani Apr 27, 2023
e76ef83
only high vulns detected by docker scan fixed (#1588)
nitumore Jul 24, 2023
13c4c8c
Increased timeout for webhook test (#1591)
nitumore Jul 24, 2023
79055c1
fix openssl-libcrypto1.1@1.1.1u-r1 library vulnerability (#1592)
nitumore Jul 25, 2023
94dfb5d
release/v1.18.2 (#1594)
Rchanger Jul 27, 2023
f7acf0c
Releaser fixes for archives. (#1595)
Rchanger Jul 27, 2023
597d9f7
update net deps to fix vuln (#1597)
Rchanger Aug 2, 2023
659310c
release/v1.18.3 (#1598)
Rchanger Aug 3, 2023
9e99f08
1061: generate multi-architecture (amd64, arm64) docker image (#1568)
denisa Aug 22, 2023
1461ae0
Bump golang.org/x/net from 0.7.0 to 0.17.0 (#1625)
dependabot[bot] Oct 26, 2023
2efa8e5
Bump google.golang.org/grpc from 1.51.0 to 1.56.3 (#1631)
dependabot[bot] Oct 26, 2023
8bec600
cicd deployment update (#1630)
mandibles232 Oct 27, 2023
7efbb9d
changes to make docker push internal (#1636)
Rchanger Nov 1, 2023
2029321
CICD patch for appid (#1637)
mandibles232 Nov 1, 2023
7a3779a
fix for crash in lambda function cft yaml if code key is not present …
nmoretenable Nov 27, 2023
5a4c44a
removed image tag to remove error of docker push (#1646)
nmoretenable Nov 29, 2023
791983c
Bump up the binary version from the code (#1648)
nmoretenable Nov 30, 2023
575d95b
Added feature to implement SSM parameters (#1653)
nmoretenable Dec 13, 2023
5bc725a
Bump up the version to 1.18.6 (#1654)
nmoretenable Dec 14, 2023
a4faf59
bump up version to v1.18.8 (#1655)
nmoretenable Dec 14, 2023
3aa1c57
Sanitize the cft template file for aws:: words as it causes parser to…
nmoretenable Dec 18, 2023
9ce8b18
Fix type mismatch error in json unmarshal for float to struct (#1659)
nmoretenable Dec 21, 2023
3bf466d
Fix type mismatch error in json unmarshal for float to struct (#1660)
nmoretenable Dec 21, 2023
2e75f8f
Display line numbers for cft violations (#1671)
nbajaj-tenable Feb 27, 2024
4422eb5
Resource type attribute changes and stability fixes for yaml parsing …
nmoretenable Mar 7, 2024
f55bbd3
fix: integrations/argocd/Dockerfile to reduce vulnerabilities (#1690)
bkizer-tenable Aug 19, 2024
7061bb2
Fix go releaser rm-dir option with clean option as per new release. (…
nmoretenable Aug 26, 2024
079d652
Fix unit tests after the vulnerability fixes (#1695)
nmoretenable Sep 9, 2024
dedd034
Fix probuf errors, helm and crypto vulnerability (#1701)
nmoretenable Sep 10, 2024
822beb3
Fix warnings in terrascan for protobuf by adding compile time flag in…
nmoretenable Sep 10, 2024
cfea5fd
Bump up the terrascan binary version (#1704)
nmoretenable Sep 10, 2024
bd6d393
[Fix/1702]Fix protobuf errors in binary built in docker build (#1706)
nmoretenable Sep 18, 2024
34b3041
Update README.md (#1730)
Adesoji1 Apr 22, 2025
03b2115
Fix the rules for cd and apt (#1725)
gukoff Apr 22, 2025
8d1b53b
Fix for linter errors and Snyk vulnerabilities (#1732)
nmoretenable May 5, 2025
d0405c2
Fix vulnerability issues in musl, golang-jwt and oauth as reported by…
nmoretenable May 6, 2025
File filter

Filter by extension

Filter by extension


Conversations
Failed to load comments.
Loading
Jump to
The table of contents is too big for display.
Diff view
Diff view
  •  
  •  
  •  
14 changes: 14 additions & 0 deletions .github/CODEOWNERS
Original file line number Diff line number Diff line change
@@ -0,0 +1,14 @@
# .github/CODEOWNERS
# This file designates required PR reviewers for this repository
# https://help.github.com/articles/about-codeowners/

* @tenable/terrascan-maintainers @bkizer-tenable

*.rego @tenable/terrascan-policy-maintainers

*.go @tenable/terrascan-maintainers

/pkg/ @tenable/terrascan-maintainers

/pkg/policies/opa/rego/ @tenable/terrascan-policy-maintainers
/sonar-project.properties @tenable/infosec
39 changes: 39 additions & 0 deletions .github/SECURITY.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,39 @@
# Security Policies and Procedures

This document outlines security procedures and general policies for the `Terrascan`
project.

* [Contributing](../CONTRIBUTING.md)

## Reporting an Issue

The `Terrascan` team and community take all security issues in `Terrascan` seriously.
Thank you for improving the security of `Terrascan`. We appreciate your efforts and
responsible disclosure and will make every effort to acknowledge your
contributions.

Report security bugs by emailing the team at vulnreport@tenable.com.

The team will acknowledge your email within 48 hours, and will send a
more detailed response within 48 hours after acknowledgement indicating the next steps in handling your report. After the initial reply to your report, the security team will
keep you informed of the progress towards a fix and full
announcement, and may ask for additional information or guidance.

Report security bugs in third-party modules to the person or team maintaining
the module.

## Disclosure Policy

When the security team receives a security bug report, they will assign it to a
primary handler. This person will coordinate the fix and release process,
involving the following steps:

* Confirm the problem and determine the affected versions.
* Audit code to find any potential similar problems.
* Prepare fixes for all releases still under maintenance. These fixes will be
released as fast as possible to npm.

## Comments on this Policy

If you have suggestions on how this process could be improved please submit a
pull request.
5 changes: 5 additions & 0 deletions .github/dependabot.yml
Original file line number Diff line number Diff line change
Expand Up @@ -15,3 +15,8 @@ updates:
directory: "/build"
schedule:
interval: "daily"

- package-ecosystem: "github-actions"
directory: "/"
schedule:
interval: daily
87 changes: 49 additions & 38 deletions .github/workflows/gobuild.yml
Original file line number Diff line number Diff line change
Expand Up @@ -11,64 +11,75 @@ jobs:
GO111MODULE: on
GOPATH: /home/runner/work/terrascan
GOBIN: /home/runner/work/terrascan/bin
GO_VERSION: 1.16
GO_VERSION: 1.21
AWS_ACCESS_KEY_ID: ${{ secrets.AWS_ACCESS_KEY_ID_TEST }}
AWS_SECRET_ACCESS_KEY: ${{ secrets.AWS_SECRET_ACCESS_KEY_TEST }}
AWS_REGION: ${{ secrets.AWS_REGION_TEST }}
AZURE_AUTH_TEST_SECRET: ${{ secrets.AZURE_AUTH_TEST_KEY }}
GOOGLE_APPLICATION_CREDENTIALS_TEST_SECRET: ${{ secrets.GOOGLE_APPLICATION_CREDENTIALS_TEST_KEY }}
AZURE_AUTH_TEST_SECRET: ${{ secrets.AZURE_AUTH_TEST_KEY }}
GOOGLE_APPLICATION_CREDENTIALS_TEST_SECRET: ${{ secrets.GOOGLE_APPLICATION_CREDENTIALS_TEST_KEY }}
steps:
- name: Checkout Terrascan
uses: actions/checkout@v2

- name: Setup Go
uses: actions/setup-go@v1
with:
go-version: ${{ env.GO_VERSION }}
- name: Checkout Terrascan
uses: actions/checkout@v3

- name: Install golint
run: go get -u golang.org/x/lint/golint
- name: Setup Go
uses: actions/setup-go@v4
with:
go-version: ${{ env.GO_VERSION }}

- name: Go validations
run: make validate
- name: Install golint
run: go install golang.org/x/lint/golint@latest

- name: Build Terrascan
run: make build
- name: Build Terrascan docker image
run: make docker-build

- name: Run unit tests
run: make unit-tests

- name: install kind
run: make install-kind
- name: Go validations
run: make validate

- name: Run e2e tests
run: make e2e-tests
- name: Build Terrascan
run: make build

- name: Run e2e vulnerability tests
if: ${{ github.event_name == 'push'|| github.event_name == 'schedule' }}
run: make e2e-vulnerability-tests
- name: Run unit tests
run: make unit-tests

- name: Upload coverage to Codecov
uses: codecov/codecov-action@v1
- name: install kind
run: make install-kind

- name: Run e2e tests
run: make e2e-tests

- name: Run e2e vulnerability tests
if: ${{ (github.event_name == 'push'|| github.event_name == 'schedule') && github.actor != 'dependabot[bot]' }}
run: make e2e-vulnerability-tests

- name: Upload coverage to Codecov
uses: codecov/codecov-action@v1

# push image to Docker Hub
push:
# Ensure "validate" job passes before pushing image.
needs: validate

runs-on: ubuntu-latest
if: github.event_name == 'push'
if: github.event_name == 'push' && github.ref == 'refs/heads/master'

steps:
- name: Checkout Terrascan
uses: actions/checkout@v2
- name: Checkout Terrascan
uses: actions/checkout@v3

- uses: docker/setup-qemu-action@v2

- name: Login to Artifactory
run: docker login --username svc_terrascan --password ${{ secrets.ARTIFACTORY_API_TOKEN }} https://docker-terrascan-local.artifactory.eng.tenable.com

- name: Build Terrascan docker image
run: make docker-build
- name: Build latest docker image
run: make docker-build-push-latest
env:
MULTIPLATFORM: true

- name: Login to docker hub
run: echo "${{ secrets.DOCKER_HUB_TOKEN }}" | docker login -u accurics --password-stdin
- name: Pull Image
run: docker pull docker-terrascan-local.artifactory.eng.tenable.com/tenb-cb:latest

- name: Push Terrascan latest docker image
if: ${{ github.ref == 'refs/heads/master' }}
run: make docker-push-latest
- name: Run scan
run: |
image_tag=$(<dockerhub-image-label.txt)
docker run -e JKN_USERNAME=${{ secrets.JKN_USERNAME }} -e JKN_PASSWORD=${{ secrets.JKN_PASSWORD }} -t docker-terrascan-local.artifactory.eng.tenable.com/tenb-cb:latest jobs execute-job --credential-mode env -n teams-deleng-terraform -p deleng-terraform/dockerhub-publish -d "{\"APPID\":\"2054\", \"IMAGE\":\"docker-terrascan-local.artifactory.eng.tenable.com/terrascan:${image_tag}\", \"TARGETS\": \"tenable/terrascan:latest\", \"MULTIARCH\":\"true\"}" --cloudflare-access-secret ${{ secrets.CF_ACCESS_TOKEN }}:${{ secrets.CF_SECRET }}
56 changes: 32 additions & 24 deletions .github/workflows/release.yml
Original file line number Diff line number Diff line change
Expand Up @@ -3,31 +3,28 @@ name: release
on:
push:
tags:
- '*'
- "*"

jobs:
release:
runs-on: ubuntu-latest
env:
GO111MODULE: on
GO_VERSION: 1.16
GO_VERSION: 1.21
steps:
-
name: Checkout
uses: actions/checkout@v2
- name: Checkout
uses: actions/checkout@v3
with:
fetch-depth: 0
-
name: Set up Go
uses: actions/setup-go@v2
- name: Set up Go
uses: actions/setup-go@v4
with:
go-version: ${{ env.GO_VERSION }}
-
name: Run GoReleaser
uses: goreleaser/goreleaser-action@v2
- name: Run GoReleaser
uses: goreleaser/goreleaser-action@v3
with:
version: latest
args: release --rm-dist
args: release --clean
env:
GITHUB_TOKEN: ${{ secrets.GITHUB_TOKEN }}

Expand All @@ -36,20 +33,31 @@ jobs:
runs-on: ubuntu-latest

steps:
- name: Checkout Terrascan
uses: actions/checkout@v2
- name: Checkout Terrascan
uses: actions/checkout@v3

- name: Build Terrascan docker image
run: make docker-build
- uses: docker/setup-qemu-action@v2

- name: Login to docker hub
run: echo "${{ secrets.DOCKER_HUB_TOKEN }}" | docker login -u accurics --password-stdin
- name: Login to Artifactory
run: docker login --username svc_terrascan --password ${{ secrets.ARTIFACTORY_API_TOKEN }} https://docker-terrascan-local.artifactory.eng.tenable.com

- name: Push Terrascan latest tag docker image
run: make docker-push-latest-tag
- name: Build Terrascan latest tag docker image
run: make docker-build-push-latest-tag
env:
MULTIPLATFORM: true

- name: Pull latest Image
run: docker pull docker-terrascan-local.artifactory.eng.tenable.com/tenb-cb:latest

- name: Run scan on terrascan image
run: |
image_tag=$(<dockerhub-image-label.txt)
docker run -e JKN_USERNAME=${{ secrets.JKN_USERNAME }} -e JKN_PASSWORD=${{ secrets.JKN_PASSWORD }} -t docker-terrascan-local.artifactory.eng.tenable.com/tenb-cb:latest jobs execute-job --credential-mode env -n teams-deleng-terraform -p deleng-terraform/dockerhub-publish -d "{\"APPID\":\"2054\", \"IMAGE\":\"docker-terrascan-local.artifactory.eng.tenable.com/terrascan:${image_tag}\", \"TARGETS\": \"tenable/terrascan:${image_tag},tenable/terrascan:latest\", \"MULTIARCH\":\"true\"}" --cloudflare-access-secret ${{ secrets.CF_ACCESS_TOKEN }}:${{ secrets.CF_SECRET }}

- name: Build terrascan_atlantis docker image
run: make atlantis-docker-build
- name: Build terrascan_atlantis docker image
run: make atlantis-docker-build

- name: Push terrascan_atlantis latest tag docker image
run: make atlantis-docker-push-latest-tag
- name: Run scan on terrascan_atlantis image
run: |
image_tag=$(<dockerhub-image-label.txt)
docker run -e JKN_USERNAME=${{ secrets.JKN_USERNAME }} -e JKN_PASSWORD=${{ secrets.JKN_PASSWORD }} -t docker-terrascan-local.artifactory.eng.tenable.com/tenb-cb:latest jobs execute-job --credential-mode env -n teams-deleng-terraform -p deleng-terraform/dockerhub-publish -d "{\"APPID\":\"test\", \"IMAGE\":\"docker-terrascan-local.artifactory.eng.tenable.com/terrascan_atlantis:${image_tag}\", \"TARGETS\": \"tenable/terrascan_atlantis:${image_tag}\", \"MULTIARCH\":\"true\"}" --cloudflare-access-secret ${{ secrets.CF_ACCESS_TOKEN }}:${{ secrets.CF_SECRET }}
31 changes: 25 additions & 6 deletions .goreleaser.yml
Original file line number Diff line number Diff line change
Expand Up @@ -14,13 +14,32 @@ builds:
- windows
- darwin
main: ./cmd/terrascan/main.go
ldflags:
- -s -w -X google.golang.org/protobuf/reflect/protoregistry.conflictPolicy=ignore
ignore:
- goos: windows
goarch: arm64
archives:
- replacements:
darwin: Darwin
linux: Linux
windows: Windows
386: i386
amd64: x86_64
- id: format_all_build_names
name_template: >-
{{ .Binary }}_
{{- trimprefix .Version "." }}_
{{- title .Os }}_
{{- if eq .Arch "amd64" }}x86_64
{{- else if eq .Arch "386" }}i386
{{- else }}{{ .Arch }}{{ end }}
# for windows it is good to have zip along with tar.gz
- id: win_zip
name_template: >-
{{ .Binary }}_
{{- trimprefix .Version "." }}_
{{- title .Os }}_
{{- if eq .Arch "amd64" }}x86_64
{{- else if eq .Arch "386" }}i386
{{- else }}{{ .Arch }}{{ end }}
format_overrides:
- goos: windows
format: zip
checksum:
name_template: 'checksums.txt'
snapshot:
Expand Down
Loading