From 1bdd38bd47b2336e477efa5bd002920477f07a2b Mon Sep 17 00:00:00 2001 From: golangci-releaser <65486276+golangci-releaser@users.noreply.github.com> Date: Tue, 20 Aug 2024 23:39:54 +0300 Subject: [PATCH] docs: update documentation assets (#4930) Co-authored-by: Fernandez Ludovic --- .golangci.reference.yml | 16 ++++++++++++++-- CHANGELOG.md | 12 ++++++++++++ assets/linters-info.json | 7 ++++++- jsonschema/golangci.jsonschema.json | 8 +++++++- 4 files changed, 39 insertions(+), 4 deletions(-) diff --git a/.golangci.reference.yml b/.golangci.reference.yml index 2d4c9e10e009..e08464bdd6b8 100644 --- a/.golangci.reference.yml +++ b/.golangci.reference.yml @@ -853,6 +853,7 @@ linters-settings: - G112 # Potential slowloris attack - G113 # Usage of Rat.SetString in math/big with an overflow (CVE-2022-23772) - G114 # Use of net/http serve function that has no support for setting timeouts + - G115 # Potential integer overflow when converting between integer types - G201 # SQL query construction using format string - G202 # SQL query construction using string concatenation - G203 # Use of unescaped data in HTML templates @@ -864,16 +865,21 @@ linters-settings: - G305 # File traversal when extracting zip/tar archive - G306 # Poor file permissions used when writing to a new file - G307 # Poor file permissions used when creating a file with os.Create - - G401 # Detect the usage of DES, RC4, MD5 or SHA1 + - G401 # Detect the usage of MD5 or SHA1 - G402 # Look for bad TLS connection settings - G403 # Ensure minimum RSA key length of 2048 bits - G404 # Insecure random number source (rand) + - G405 # Detect the usage of DES or RC4 + - G406 # Detect the usage of MD4 or RIPEMD160 - G501 # Import blocklist: crypto/md5 - G502 # Import blocklist: crypto/des - G503 # Import blocklist: crypto/rc4 - G504 # Import blocklist: net/http/cgi - G505 # Import blocklist: crypto/sha1 + - G506 # Import blocklist: golang.org/x/crypto/md4 + - G507 #Import blocklist: golang.org/x/crypto/ripemd160 - G601 # Implicit memory aliasing of items from a range statement + - G602 # Slice access out of bounds # To specify a set of rules to explicitly exclude. # Available rules: https://github.com/securego/gosec#available-rules @@ -892,6 +898,7 @@ linters-settings: - G112 # Potential slowloris attack - G113 # Usage of Rat.SetString in math/big with an overflow (CVE-2022-23772) - G114 # Use of net/http serve function that has no support for setting timeouts + - G115 # Potential integer overflow when converting between integer types - G201 # SQL query construction using format string - G202 # SQL query construction using string concatenation - G203 # Use of unescaped data in HTML templates @@ -903,16 +910,21 @@ linters-settings: - G305 # File traversal when extracting zip/tar archive - G306 # Poor file permissions used when writing to a new file - G307 # Poor file permissions used when creating a file with os.Create - - G401 # Detect the usage of DES, RC4, MD5 or SHA1 + - G401 # Detect the usage of MD5 or SHA1 - G402 # Look for bad TLS connection settings - G403 # Ensure minimum RSA key length of 2048 bits - G404 # Insecure random number source (rand) + - G405 # Detect the usage of DES or RC4 + - G406 # Detect the usage of MD4 or RIPEMD160 - G501 # Import blocklist: crypto/md5 - G502 # Import blocklist: crypto/des - G503 # Import blocklist: crypto/rc4 - G504 # Import blocklist: net/http/cgi - G505 # Import blocklist: crypto/sha1 + - G506 # Import blocklist: golang.org/x/crypto/md4 + - G507 #Import blocklist: golang.org/x/crypto/ripemd160 - G601 # Implicit memory aliasing of items from a range statement + - G602 # Slice access out of bounds # Exclude generated files # Default: false diff --git a/CHANGELOG.md b/CHANGELOG.md index a606f7395679..f5b1362a5ba0 100644 --- a/CHANGELOG.md +++ b/CHANGELOG.md @@ -1,5 +1,17 @@ Follow the news and releases on [Mastodon](https://fosstodon.org/@golangcilint) and on [Twitter](https://twitter.com/golangci). +### v1.60.2 + +1. Updated linters + * `gofmt`: update to HEAD (go1.22) + * `gofumpt`: from 0.6.0 to 0.7.0 + * `gosec`: fix G602 analyzer + * `gosec`: from 5f0084eb01a9 to 81cda2f91fbe (adds `G115`, `G405`, `G406`, `G506`, `G507`) + * `staticcheck`: from 0.5.0 to 0.5.1 + * `staticcheck`: propagate Go version + * `wrapcheck`: from 2.8.3 to 2.9.0 + * ⚠️ `exportloopref`: deprecation + ### v1.60.1 1. Updated linters diff --git a/assets/linters-info.json b/assets/linters-info.json index 20bc824e1131..614ee977a5d5 100644 --- a/assets/linters-info.json +++ b/assets/linters-info.json @@ -286,7 +286,12 @@ "originalURL": "https://github.com/kyoh86/exportloopref", "internal": false, "isSlow": true, - "since": "v1.28.0" + "since": "v1.28.0", + "deprecation": { + "since": "v1.60.2", + "message": "Since Go1.22 (loopvar) this linter is no longer relevant.", + "replacement": "copyloopvar" + } }, { "name": "forbidigo", diff --git a/jsonschema/golangci.jsonschema.json b/jsonschema/golangci.jsonschema.json index 510740d61660..f8233a77759d 100644 --- a/jsonschema/golangci.jsonschema.json +++ b/jsonschema/golangci.jsonschema.json @@ -137,6 +137,7 @@ "G112", "G113", "G114", + "G115", "G201", "G202", "G203", @@ -152,12 +153,17 @@ "G402", "G403", "G404", + "G405", + "G406", "G501", "G502", "G503", "G504", "G505", - "G601" + "G506", + "G507", + "G601", + "G602" ] }, "govet-analyzers": {