Skip to content

Commit

Permalink
docs: update documentation assets (#4930)
Browse files Browse the repository at this point in the history
Co-authored-by: Fernandez Ludovic <ldez@users.noreply.github.com>
  • Loading branch information
golangci-releaser and ldez authored Aug 20, 2024
1 parent 561049d commit 1bdd38b
Show file tree
Hide file tree
Showing 4 changed files with 39 additions and 4 deletions.
16 changes: 14 additions & 2 deletions .golangci.reference.yml
Original file line number Diff line number Diff line change
Expand Up @@ -853,6 +853,7 @@ linters-settings:
- G112 # Potential slowloris attack
- G113 # Usage of Rat.SetString in math/big with an overflow (CVE-2022-23772)
- G114 # Use of net/http serve function that has no support for setting timeouts
- G115 # Potential integer overflow when converting between integer types
- G201 # SQL query construction using format string
- G202 # SQL query construction using string concatenation
- G203 # Use of unescaped data in HTML templates
Expand All @@ -864,16 +865,21 @@ linters-settings:
- G305 # File traversal when extracting zip/tar archive
- G306 # Poor file permissions used when writing to a new file
- G307 # Poor file permissions used when creating a file with os.Create
- G401 # Detect the usage of DES, RC4, MD5 or SHA1
- G401 # Detect the usage of MD5 or SHA1
- G402 # Look for bad TLS connection settings
- G403 # Ensure minimum RSA key length of 2048 bits
- G404 # Insecure random number source (rand)
- G405 # Detect the usage of DES or RC4
- G406 # Detect the usage of MD4 or RIPEMD160
- G501 # Import blocklist: crypto/md5
- G502 # Import blocklist: crypto/des
- G503 # Import blocklist: crypto/rc4
- G504 # Import blocklist: net/http/cgi
- G505 # Import blocklist: crypto/sha1
- G506 # Import blocklist: golang.org/x/crypto/md4
- G507 #Import blocklist: golang.org/x/crypto/ripemd160
- G601 # Implicit memory aliasing of items from a range statement
- G602 # Slice access out of bounds

# To specify a set of rules to explicitly exclude.
# Available rules: https://github.com/securego/gosec#available-rules
Expand All @@ -892,6 +898,7 @@ linters-settings:
- G112 # Potential slowloris attack
- G113 # Usage of Rat.SetString in math/big with an overflow (CVE-2022-23772)
- G114 # Use of net/http serve function that has no support for setting timeouts
- G115 # Potential integer overflow when converting between integer types
- G201 # SQL query construction using format string
- G202 # SQL query construction using string concatenation
- G203 # Use of unescaped data in HTML templates
Expand All @@ -903,16 +910,21 @@ linters-settings:
- G305 # File traversal when extracting zip/tar archive
- G306 # Poor file permissions used when writing to a new file
- G307 # Poor file permissions used when creating a file with os.Create
- G401 # Detect the usage of DES, RC4, MD5 or SHA1
- G401 # Detect the usage of MD5 or SHA1
- G402 # Look for bad TLS connection settings
- G403 # Ensure minimum RSA key length of 2048 bits
- G404 # Insecure random number source (rand)
- G405 # Detect the usage of DES or RC4
- G406 # Detect the usage of MD4 or RIPEMD160
- G501 # Import blocklist: crypto/md5
- G502 # Import blocklist: crypto/des
- G503 # Import blocklist: crypto/rc4
- G504 # Import blocklist: net/http/cgi
- G505 # Import blocklist: crypto/sha1
- G506 # Import blocklist: golang.org/x/crypto/md4
- G507 #Import blocklist: golang.org/x/crypto/ripemd160
- G601 # Implicit memory aliasing of items from a range statement
- G602 # Slice access out of bounds

# Exclude generated files
# Default: false
Expand Down
12 changes: 12 additions & 0 deletions CHANGELOG.md
Original file line number Diff line number Diff line change
@@ -1,5 +1,17 @@
Follow the news and releases on [Mastodon](https://fosstodon.org/@golangcilint) and on [Twitter](https://twitter.com/golangci).

### v1.60.2

1. Updated linters
* `gofmt`: update to HEAD (go1.22)
* `gofumpt`: from 0.6.0 to 0.7.0
* `gosec`: fix G602 analyzer
* `gosec`: from 5f0084eb01a9 to 81cda2f91fbe (adds `G115`, `G405`, `G406`, `G506`, `G507`)
* `staticcheck`: from 0.5.0 to 0.5.1
* `staticcheck`: propagate Go version
* `wrapcheck`: from 2.8.3 to 2.9.0
* ⚠️ `exportloopref`: deprecation

### v1.60.1

1. Updated linters
Expand Down
7 changes: 6 additions & 1 deletion assets/linters-info.json
Original file line number Diff line number Diff line change
Expand Up @@ -286,7 +286,12 @@
"originalURL": "https://github.com/kyoh86/exportloopref",
"internal": false,
"isSlow": true,
"since": "v1.28.0"
"since": "v1.28.0",
"deprecation": {
"since": "v1.60.2",
"message": "Since Go1.22 (loopvar) this linter is no longer relevant.",
"replacement": "copyloopvar"
}
},
{
"name": "forbidigo",
Expand Down
8 changes: 7 additions & 1 deletion jsonschema/golangci.jsonschema.json
Original file line number Diff line number Diff line change
Expand Up @@ -137,6 +137,7 @@
"G112",
"G113",
"G114",
"G115",
"G201",
"G202",
"G203",
Expand All @@ -152,12 +153,17 @@
"G402",
"G403",
"G404",
"G405",
"G406",
"G501",
"G502",
"G503",
"G504",
"G505",
"G601"
"G506",
"G507",
"G601",
"G602"
]
},
"govet-analyzers": {
Expand Down

0 comments on commit 1bdd38b

Please # to comment.