You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
# If pushing v* tag, or manual run with option "release" but not "snapshot": Build and create release from latest tag.
81
+
# Note: If manual run it must be on the tag (same commit), or else go-releaser will fail with: "git tag <tag_name> was not made against commit <commit_hash>",
82
+
# and one must consider using the snapshot mode instead (see below).
83
+
- id: go-release-tag
84
+
name: Run go release tag (if pushing v-tag or triggered manually)
Copy file name to clipboardExpand all lines: .goreleaser.yml
+5-2Lines changed: 5 additions & 2 deletions
Original file line number
Diff line number
Diff line change
@@ -72,8 +72,10 @@ release:
72
72
<summary>Checksums</summary>
73
73
<p></p>
74
74
75
-
Below are the SHA-256 checksums of release assets, the same that you can find in text file asset `npiperelay_checksums.txt`. Note that the .zip asset for the amd64 (x64, 64-bit) and 386 (x86, 32-bit) architectures both contain a single executable with name `npiperelay.exe`, and it is identical to the .exe asset with same name as the .zip asset, i.e. `npiperelay_windows_386.exe` and `npiperelay_windows_amd64.exe`, and should therefore have same checksums.
75
+
The SHA-256 checksums of the binary release assets are published as text file asset `npiperelay_checksums.txt`. Note that the .zip asset for the amd64 (x64/64-bit) and 386 (x86/32-bit) architectures both contain a single executable with name `npiperelay.exe`, and it is identical to the .exe asset with same name as the .zip asset, i.e. `npiperelay_windows_386.exe` and `npiperelay_windows_amd64.exe`, and should therefore have the same checksum.
76
76
<!--
77
+
78
+
These are the SHA-256 checksums of all binary release assets, as published in `npiperelay_checksums.txt`:
77
79
```
78
80
*** TODO: Copy content of npiperelay_checksums.txt here! ***
79
81
```
@@ -86,7 +88,8 @@ release:
86
88
87
89
If your local antivirus treats the downloaded archive or executable as suspicious or malicious, you should try to report it as a false positive, e.g. to Symantec on [symsubmit.symantec.com](https://symsubmit.symantec.com) (select "Clean software incorrectly detected"). At the time of the release, no security vendors on [VirusTotal](https://www.virustotal.com) flagged the asset download urls as malicious, but some very few (well below 10%) did flag the zip archive and executable files themselves (see report for each of the assets in expandable section below). The implementation is less than 300 lines of go code, plus a single, commonly used, third party dependency. The source code is automatically run through a vulnerability analysis, using [govulncheck](https://pkg.go.dev/golang.org/x/vuln/cmd/govulncheck), and a long list of code quality checks (linters), using [golangci-lint](https://golangci-lint.run/) (see [.golangci.yml](https://github.com/albertony/npiperelay/blob/fork/.golangci.yml) for the complete list). If you do worry, you are free to analyse the code yourself, and you can also [build](https://github.com/albertony/npiperelay#building) the executable locally from source.
88
90
<!--
89
-
*** TODO: Analyse asset urls and files and update report links below! ***
91
+
92
+
*** TODO: Analyze asset urls and files, and update report links below! ***
90
93
[VirusTotal](https://www.virustotal.com/) scan reports for release assets:
0 commit comments