-
Notifications
You must be signed in to change notification settings - Fork 6
Expand file tree
/
Copy path.golangci.yml
More file actions
96 lines (96 loc) · 2.58 KB
/
.golangci.yml
File metadata and controls
96 lines (96 loc) · 2.58 KB
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
version: "2"
linters:
default: all
disable:
- cyclop
- depguard
- dupl
- dupword
- err113
- exhaustruct
- funlen
- gochecknoglobals
- gochecknoinits
- gocognit
- gocritic
- gocyclo
- gosmopolitan
- ireturn
- lll
- maintidx
- mnd
- nestif
- paralleltest
- prealloc
- tagliatelle
- testpackage
- varnamelen
- wrapcheck
- wsl
settings:
wsl_v5:
allow-first-in-block: true
allow-whole-block: false
branch-max-lines: 2
errcheck:
exclude-functions:
# Used in HTTP handlers, any error is handled by the server itself.
- (net/http.ResponseWriter).Write
lll:
line-length: 160
recvcheck:
disable-builtin: true
exclusions:
- '*.String'
- '*.Value'
- '*.MarshalJSON'
- '*.ID'
revive:
rules:
- name: unused-parameter
severity: warning
disabled: true
goconst:
ignore-string-values:
- cpu
- info
gomoddirectives:
replace-allow-list:
- github.com/grafana/pyroscope/ebpf
exclusions:
generated: lax
presets:
- comments
- common-false-positives
- legacy
- std-error-handling
rules:
# Those reports are not relevant in tests.
- linters:
- gosec
- unqueryvet
- errcheck
# text: "(G705: XSS via taint analysis|G704: SSRF via taint analysis|G703: Path traversal via taint analysis|G702: Command injection via taint analysis|G306: Expect WriteFile permissions to be 0600 or less|G120: Parsing form data without limiting request body size can allow memory exhaustion (use http.MaxBytesReader)|net/http/httptest.NewRequest must not be called. use net/http/httptest.NewRequestWithContext)"
path: _test.go
- linters:
- gosec
- noctx
- unqueryvet
# text: "(G705: XSS via taint analysis|G704: SSRF via taint analysis|G703: Path traversal via taint analysis|G702: Command injection via taint analysis|G306: Expect WriteFile permissions to be 0600 or less|G120: Parsing form data without limiting request body size can allow memory exhaustion (use http.MaxBytesReader)|net/http/httptest.NewRequest must not be called. use net/http/httptest.NewRequestWithContext)"
path: scripts/mock_servers
paths:
- third_party$
- builtin$
- examples$
formatters:
enable:
- gci
- gofmt
- gofumpt
- goimports
exclusions:
generated: lax
paths:
- third_party$
- builtin$
- examples$