Skip to content

Commit

Permalink
Merge pull request #10978 from CrystalMethod/feat/blst-security/cherr…
Browse files Browse the repository at this point in the history
…ybomb

feat: add blst-security/cherrybomb
  • Loading branch information
suzuki-shunsuke committed Mar 21, 2023
2 parents 44d2f61 + b3c2be1 commit 97c9614
Show file tree
Hide file tree
Showing 3 changed files with 79 additions and 0 deletions.
10 changes: 10 additions & 0 deletions pkgs/blst-security/cherrybomb/pkg.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,10 @@
packages:
- name: blst-security/cherrybomb@v1.0.0
- name: blst-security/cherrybomb
version: v0.6.0
- name: blst-security/cherrybomb
version: v0.5.1
- name: blst-security/cherrybomb
version: v0.4.3
- name: blst-security/cherrybomb
version: v0.4.1
35 changes: 35 additions & 0 deletions pkgs/blst-security/cherrybomb/registry.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,35 @@
packages:
- type: github_release
repo_owner: blst-security
repo_name: cherrybomb
description: Stop half-done APIs! Cherrybomb is a CLI tool that helps you avoid undefined user behaviour by auditing your API specifications, validating them and running API security tests
asset: cherrybomb_{{.OS}}_gnu
format: raw
overrides:
- goos: darwin
asset: cherrybomb_{{.OS}}_{{.Arch}}
replacements:
amd64: x86_64
darwin: mac
supported_envs:
- linux/amd64
- darwin
rosetta2: true
version_constraint: semver(">= 0.6.0")
version_overrides:
- version_constraint: semver(">= 0.5.1")
asset: cherrybomb_{{.OS}}_{{.Arch}}
overrides:
- goos: linux
asset: cherrybomb_{{.OS}}_gnu
- goos: darwin
replacements:
amd64: x86_64
replacements:
darwin: mac
- version_constraint: semver(">= 0.4.3")
- version_constraint: semver("< 0.4.3")
asset: cherrybomb_{{.OS}}
overrides: []
replacements:
darwin: mac
34 changes: 34 additions & 0 deletions registry.yaml

Some generated files are not rendered by default. Learn more about how customized files appear on GitHub.

0 comments on commit 97c9614

Please sign in to comment.