Skip to content
Snippets Groups Projects
Commit 4b1379a8 authored by Pavel Antonov's avatar Pavel Antonov :asterisk:
Browse files

Merge branch 'feature/3195-golangci-lint-2.0' into 'master'

[refactoring] Сделана миграция конфигурации линтера до второй версии, обновлен .gitlab-ci.yml

See merge request perxis/perxis-go!452
parents 74dc9a7f 22f02a91
No related branches found
No related tags found
No related merge requests found
...@@ -18,12 +18,12 @@ run_tests: ...@@ -18,12 +18,12 @@ run_tests:
junit: report.xml junit: report.xml
lint: lint:
image: golangci/golangci-lint:v1.62.2-alpine image: golangci/golangci-lint:v2.0.2-alpine
rules: rules:
- if: '$CI_PIPELINE_SOURCE == "merge_request_event" && ($CI_MERGE_REQUEST_TARGET_BRANCH_NAME == $CI_DEFAULT_BRANCH)' - if: '$CI_PIPELINE_SOURCE == "merge_request_event" && ($CI_MERGE_REQUEST_TARGET_BRANCH_NAME == $CI_DEFAULT_BRANCH)'
stage: test stage: test
script: script:
- golangci-lint run --config .golangci.yml --issues-exit-code 1 --print-issued-lines=false --new-from-rev $CI_MERGE_REQUEST_DIFF_BASE_SHA --out-format code-climate:gl-code-quality-report.json,line-number - golangci-lint run --timeout 15m --config .golangci.yml --issues-exit-code 1 --new-from-rev $CI_MERGE_REQUEST_DIFF_BASE_SHA --output.code-climate.path gl-code-quality-report.json --output.text.path stdout
artifacts: artifacts:
reports: reports:
codequality: gl-code-quality-report.json codequality: gl-code-quality-report.json
......
run: # Based on https://gist.github.com/maratori/47a4d00457a92aa426dbd48a18776322
# Timeout for analysis, e.g. 30s, 5m. version: "2"
# Default: 1m
timeout: 15m
issues:
# Maximum count of issues with the same text.
# Set to 0 to disable.
# Default: 3
max-same-issues: 50
# This file contains only configs which differ from defaults. formatters:
# All possible options can be found here https://github.com/golangci/golangci-lint/blob/master/.golangci.reference.yml enable:
linters-settings: - goimports # checks if the code and import statements are formatted according to the 'goimports' command
cyclop: - golines # checks if code is formatted, and fixes long lines
# The maximal code complexity to report.
# Default: 10
max-complexity: 30
# The maximal average package complexity.
# If it's higher than 0.0 (float) the check is enabled
# Default: 0.0
package-average: 10.0
errcheck:
# Report about not checking of errors in type assertions: `a := b.(MyStruct)`.
# Such cases aren't reported by default.
# Default: false
check-type-assertions: true
exhaustive:
# Program elements to check for exhaustiveness.
# Default: [ switch ]
check:
- switch
- map
exhaustruct:
# List of regular expressions to exclude struct packages and their names from checks.
# Regular expressions must match complete canonical struct package/name/structname.
# Default: []
exclude:
# std libs
- "^net/http.Client$"
- "^net/http.Cookie$"
- "^net/http.Request$"
- "^net/http.Response$"
- "^net/http.Server$"
- "^net/http.Transport$"
- "^net/url.URL$"
- "^os/exec.Cmd$"
- "^reflect.StructField$"
# public libs
- "^github.com/Shopify/sarama.Config$"
- "^github.com/Shopify/sarama.ProducerMessage$"
- "^github.com/mitchellh/mapstructure.DecoderConfig$"
- "^github.com/prometheus/client_golang/.+Opts$"
- "^github.com/spf13/cobra.Command$"
- "^github.com/spf13/cobra.CompletionOptions$"
- "^github.com/stretchr/testify/mock.Mock$"
- "^github.com/testcontainers/testcontainers-go.+Request$"
- "^github.com/testcontainers/testcontainers-go.FromDockerfile$"
- "^golang.org/x/tools/go/analysis.Analyzer$"
- "^google.golang.org/protobuf/.+Options$"
- "^gopkg.in/yaml.v3.Node$"
funlen:
# Checks the number of lines in a function.
# If lower than 0, disable the check.
# Default: 60
lines: 100
# Checks the number of statements in a function.
# If lower than 0, disable the check.
# Default: 40
statements: 50
# Ignore comments when counting lines.
# Default false
ignore-comments: true
gochecksumtype:
# Presence of `default` case in switch statements satisfies exhaustiveness, if all members are not listed.
# Default: true
default-signifies-exhaustive: false
gocognit:
# Minimal code complexity to report.
# Default: 30 (but we recommend 10-20)
min-complexity: 20
gocritic:
# Settings passed to gocritic.
# The settings key is the name of a supported gocritic checker.
# The list of supported checkers can be find in https://go-critic.github.io/overview.
settings:
captLocal:
# Whether to restrict checker to params only.
# Default: true
paramsOnly: false
underef:
# Whether to skip (*x).method() calls where x is a pointer receiver.
# Default: true
skipRecvDeref: false
gomodguard:
blocked:
# List of blocked modules.
# Default: []
modules:
- github.com/golang/protobuf:
recommendations:
- google.golang.org/protobuf
reason: "see https://developers.google.com/protocol-buffers/docs/reference/go/faq#modules"
- github.com/satori/go.uuid:
recommendations:
- github.com/google/uuid
reason: "satori's package is not maintained"
- github.com/gofrs/uuid:
recommendations:
- github.com/gofrs/uuid/v5
reason: "gofrs' package was not go module before v5"
govet:
# Enable all analyzers.
# Default: false
enable-all: true
# Disable analyzers by name.
# Run `go tool vet help` to see all analyzers.
# Default: []
disable:
- fieldalignment # too strict
# Settings per analyzer.
settings:
shadow:
# Whether to be strict about shadowing; can be noisy.
# Default: false
strict: true
inamedparam:
# Skips check for interface methods with only a single parameter.
# Default: false
skip-single-param: true
mnd:
# List of function patterns to exclude from analysis.
# Values always ignored: `time.Date`,
# `strconv.FormatInt`, `strconv.FormatUint`, `strconv.FormatFloat`,
# `strconv.ParseInt`, `strconv.ParseUint`, `strconv.ParseFloat`.
# Default: []
ignored-functions:
- args.Error
- flag.Arg
- flag.Duration.*
- flag.Float.*
- flag.Int.*
- flag.Uint.*
- os.Chmod
- os.Mkdir.*
- os.OpenFile
- os.WriteFile
- prometheus.ExponentialBuckets.*
- prometheus.LinearBuckets
nakedret:
# Make an issue if func has more lines of code than this setting, and it has naked returns.
# Default: 30
max-func-lines: 0
nolintlint:
# Exclude following linters from requiring an explanation.
# Default: []
allow-no-explanation: [ funlen, gocognit, lll ]
# Enable to require an explanation of nonzero length after each nolint directive.
# Default: false
require-explanation: true
# Enable to require nolint directives to mention the specific linter being suppressed.
# Default: false
require-specific: true
perfsprint:
# Optimizes into strings concatenation.
# Default: true
strconcat: false
reassign:
# Patterns for global variable names that are checked for reassignment.
# See https://github.com/curioswitch/go-reassign#usage
# Default: ["EOF", "Err.*"]
patterns:
- ".*"
rowserrcheck:
# database/sql is always checked
# Default: []
packages:
- github.com/jmoiron/sqlx
sloglint: ## you may want to enable
# Enforce not using global loggers. #- gci # checks if code and import statements are formatted, with additional rules
# Values: #- gofmt # checks if the code is formatted according to 'gofmt' command
# - "": disabled
# - "all": report all global loggers
# - "default": report only the default slog logger
# https://github.com/go-simpler/sloglint?tab=readme-ov-file#no-global
# Default: ""
no-global: "all"
# Enforce using methods that accept a context.
# Values:
# - "": disabled
# - "all": report all contextless calls
# - "scope": report only if a context exists in the scope of the outermost function
# https://github.com/go-simpler/sloglint?tab=readme-ov-file#context-only
# Default: ""
context: "scope"
tenv: ## disabled
# The option `all` will run against whole test files (`_test.go`) regardless of method/function signatures. #- gofumpt # [replaced by goimports, gofumports is not available yet] checks if code and import statements are formatted, with additional rules
# Otherwise, only methods that take `*testing.T`, `*testing.B`, and `testing.TB` as arguments are checked.
# Default: false
all: true
# All settings can be found here https://github.com/golangci/golangci-lint/blob/HEAD/.golangci.reference.yml
settings:
golines:
# Target maximum line length.
# Default: 100
max-len: 120
linters: linters:
disable-all: true
enable: enable:
## enabled by default
- errcheck # checking for unchecked errors, these unchecked errors can be critical bugs in some cases
- gosimple # specializes in simplifying a code
- govet # reports suspicious constructs, such as Printf calls whose arguments do not align with the format string
- ineffassign # detects when assignments to existing variables are not used
- staticcheck # is a go vet on steroids, applying a ton of static analysis checks
- typecheck # like the front-end of a Go compiler, parses and type-checks Go code
- unused # checks for unused constants, variables, functions and types
## disabled by default
- asasalint # checks for pass []any as any in variadic func(...any) - asasalint # checks for pass []any as any in variadic func(...any)
- asciicheck # checks that your code does not contain non-ASCII identifiers - asciicheck # checks that your code does not contain non-ASCII identifiers
- bidichk # checks for dangerous unicode character sequences - bidichk # checks for dangerous unicode character sequences
...@@ -232,11 +35,14 @@ linters: ...@@ -232,11 +35,14 @@ linters:
- canonicalheader # checks whether net/http.Header uses canonical header - canonicalheader # checks whether net/http.Header uses canonical header
- copyloopvar # detects places where loop variables are copied (Go 1.22+) - copyloopvar # detects places where loop variables are copied (Go 1.22+)
- cyclop # checks function and package cyclomatic complexity - cyclop # checks function and package cyclomatic complexity
- depguard # checks if package imports are in a list of acceptable packages
- dupl # tool for code clone detection - dupl # tool for code clone detection
- durationcheck # checks for two durations multiplied together - durationcheck # checks for two durations multiplied together
- errcheck # checking for unchecked errors, these unchecked errors can be critical bugs in some cases
- errname # checks that sentinel errors are prefixed with the Err and error types are suffixed with the Error - errname # checks that sentinel errors are prefixed with the Err and error types are suffixed with the Error
- errorlint # finds code that will cause problems with the error wrapping scheme introduced in Go 1.13 - errorlint # finds code that will cause problems with the error wrapping scheme introduced in Go 1.13
- exhaustive # checks exhaustiveness of enum switch statements - exhaustive # checks exhaustiveness of enum switch statements
- exptostd # detects functions from golang.org/x/exp/ that can be replaced by std functions
- fatcontext # detects nested contexts in loops - fatcontext # detects nested contexts in loops
- forbidigo # forbids identifiers - forbidigo # forbids identifiers
- funlen # tool for detection of long functions - funlen # tool for detection of long functions
...@@ -249,14 +55,13 @@ linters: ...@@ -249,14 +55,13 @@ linters:
- gocritic # provides diagnostics that check for bugs, performance and style issues - gocritic # provides diagnostics that check for bugs, performance and style issues
- gocyclo # computes and checks the cyclomatic complexity of functions - gocyclo # computes and checks the cyclomatic complexity of functions
- godot # checks if comments end in a period - godot # checks if comments end in a period
- goimports # in addition to fixing imports, goimports also formats your code in the same style as gofmt
- gomoddirectives # manages the use of 'replace', 'retract', and 'excludes' directives in go.mod - gomoddirectives # manages the use of 'replace', 'retract', and 'excludes' directives in go.mod
- gomodguard # allow and block lists linter for direct Go module dependencies. This is different from depguard where there are different block types for example version constraints and module recommendations
- goprintffuncname # checks that printf-like functions are named with f at the end - goprintffuncname # checks that printf-like functions are named with f at the end
- gosec # inspects source code for security problems - gosec # inspects source code for security problems
- govet # reports suspicious constructs, such as Printf calls whose arguments do not align with the format string
- iface # checks the incorrect use of interfaces, helping developers avoid interface pollution - iface # checks the incorrect use of interfaces, helping developers avoid interface pollution
- ineffassign # detects when assignments to existing variables are not used
- intrange # finds places where for loops could make use of an integer range - intrange # finds places where for loops could make use of an integer range
- lll # reports long lines
- loggercheck # checks key value pairs for common logger libraries (kitlog,klog,logr,zap) - loggercheck # checks key value pairs for common logger libraries (kitlog,klog,logr,zap)
- makezero # finds slice declarations with non-zero initial length - makezero # finds slice declarations with non-zero initial length
- mirror # reports wrong mirror patterns of bytes/strings usage - mirror # reports wrong mirror patterns of bytes/strings usage
...@@ -265,6 +70,7 @@ linters: ...@@ -265,6 +70,7 @@ linters:
- nakedret # finds naked returns in functions greater than a specified function length - nakedret # finds naked returns in functions greater than a specified function length
- nestif # reports deeply nested if statements - nestif # reports deeply nested if statements
- nilerr # finds the code that returns nil even if it checks that the error is not nil - nilerr # finds the code that returns nil even if it checks that the error is not nil
- nilnesserr # reports that it checks for err != nil, but it returns a different nil value error (powered by nilness and nilerr)
- nilnil # checks that there is no simultaneous return of nil error and an invalid value - nilnil # checks that there is no simultaneous return of nil error and an invalid value
- noctx # finds sending http request without context.Context - noctx # finds sending http request without context.Context
- nolintlint # reports ill-formed or insufficient nolint directives - nolintlint # reports ill-formed or insufficient nolint directives
...@@ -276,91 +82,303 @@ linters: ...@@ -276,91 +82,303 @@ linters:
- reassign # checks that package variables are not reassigned - reassign # checks that package variables are not reassigned
- recvcheck # checks for receiver type consistency - recvcheck # checks for receiver type consistency
- revive # fast, configurable, extensible, flexible, and beautiful linter for Go, drop-in replacement of golint - revive # fast, configurable, extensible, flexible, and beautiful linter for Go, drop-in replacement of golint
- rowserrcheck # checks whether Err of rows is checked successfully
- sloglint # ensure consistent code style when using log/slog - sloglint # ensure consistent code style when using log/slog
- spancheck # checks for mistakes with OpenTelemetry/Census spans - spancheck # checks for mistakes with OpenTelemetry/Census spans
- sqlclosecheck # checks that sql.Rows and sql.Stmt are closed - sqlclosecheck # checks that sql.Rows and sql.Stmt are closed
- stylecheck # is a replacement for golint - staticcheck # is a go vet on steroids, applying a ton of static analysis checks
- tenv # detects using os.Setenv instead of t.Setenv since Go1.17
- testableexamples # checks if examples are testable (have an expected output) - testableexamples # checks if examples are testable (have an expected output)
- testifylint # checks usage of github.com/stretchr/testify - testifylint # checks usage of github.com/stretchr/testify
#- testpackage # makes you use a separate _test package
- unconvert # removes unnecessary type conversions - unconvert # removes unnecessary type conversions
- unparam # reports unused function parameters - unparam # reports unused function parameters
- unused # checks for unused constants, variables, functions and types
- usestdlibvars # detects the possibility to use variables/constants from the Go standard library - usestdlibvars # detects the possibility to use variables/constants from the Go standard library
- wastedassign # finds wasted assignment statements - wastedassign # finds wasted assignment statements
- whitespace # detects leading and trailing whitespace - whitespace # detects leading and trailing whitespace
## you may want to enable # All settings can be found here https://github.com/golangci/golangci-lint/blob/HEAD/.golangci.reference.yml
#- decorder # checks declaration order and count of types, constants, variables and functions settings:
#- exhaustruct # [highly recommend to enable] checks if all structure fields are initialized cyclop:
#- gci # controls golang package import order and makes it always deterministic # The maximal code complexity to report.
#- ginkgolinter # [if you use ginkgo/gomega] enforces standards of using ginkgo and gomega # Default: 10
#- godox # detects FIXME, TODO and other comment keywords max-complexity: 30
#- goheader # checks is file header matches to pattern # The maximal average package complexity.
#- inamedparam # [great idea, but too strict, need to ignore a lot of cases by default] reports interfaces with unnamed method parameters # If it's higher than 0.0 (float) the check is enabled
#- interfacebloat # checks the number of methods inside an interface # Default: 0.0
#- ireturn # accept interfaces, return concrete types package-average: 10.0
#- prealloc # [premature optimization, but can be used in some cases] finds slice declarations that could potentially be preallocated
#- tagalign # checks that struct tags are well aligned
#- varnamelen # [great idea, but too many false positives] checks that the length of a variable's name matches its scope
#- wrapcheck # checks that errors returned from external packages are wrapped
#- zerologlint # detects the wrong usage of zerolog that a user forgets to dispatch zerolog.Event
## disabled depguard:
#- containedctx # detects struct contained context.Context field # Rules to apply.
#- contextcheck # [too many false positives] checks the function whether use a non-inherited context #
#- depguard # [replaced by gomodguard] checks if package imports are in a list of acceptable packages # Variables:
#- dogsled # checks assignments with too many blank identifiers (e.g. x, _, _, _, := f()) # - File Variables
#- dupword # [useless without config] checks for duplicate words in the source code # Use an exclamation mark `!` to negate a variable.
#- err113 # [too strict] checks the errors handling expressions # Example: `!$test` matches any file that is not a go test file.
#- errchkjson # [don't see profit + I'm against of omitting errors like in the first example https://github.com/breml/errchkjson] checks types passed to the json encoding functions. Reports unsupported types and optionally reports occasions, where the check for the returned error can be omitted #
#- exportloopref # [not necessary from Go 1.22] checks for pointers to enclosing loop variables # `$all` - matches all go files
#- forcetypeassert # [replaced by errcheck] finds forced type assertions # `$test` - matches all go test files
#- gofmt # [replaced by goimports] checks whether code was gofmt-ed #
#- gofumpt # [replaced by goimports, gofumports is not available yet] checks whether code was gofumpt-ed # - Package Variables
#- gosmopolitan # reports certain i18n/l10n anti-patterns in your Go codebase #
#- grouper # analyzes expression groups # `$gostd` - matches all of go's standard library (Pulled from `GOROOT`)
#- importas # enforces consistent import aliases #
#- maintidx # measures the maintainability index of each function # Default (applies if no custom rules are defined): Only allow $gostd in all files.
#- misspell # [useless] finds commonly misspelled English words in comments rules:
#- nlreturn # [too strict and mostly code is not more readable] checks for a new line before return and branch statements to increase code clarity "deprecated":
#- paralleltest # [too many false positives] detects missing usage of t.Parallel() method in your Go test # List of file globs that will match this list of settings to compare against.
#- tagliatelle # checks the struct tags # By default, if a path is relative, it is relative to the directory where the golangci-lint command is executed.
#- thelper # detects golang test helpers without t.Helper() call and checks the consistency of test helpers # The placeholder '${base-path}' is substituted with a path relative to the mode defined with `run.relative-path-mode`.
#- wsl # [too strict and mostly code is not more readable] whitespace linter forces you to use empty lines # Default: $all
files:
- "$all"
# List of packages that are not allowed.
# Entries can be a variable (starting with $), a string prefix, or an exact match (if ending with $).
# Default: []
deny:
- pkg: github.com/golang/protobuf
desc: Use google.golang.org/protobuf instead, see https://developers.google.com/protocol-buffers/docs/reference/go/faq#modules
- pkg: github.com/satori/go.uuid
desc: Use github.com/google/uuid instead, satori's package is not maintained
- pkg: github.com/gofrs/uuid$
desc: Use github.com/gofrs/uuid/v5 or later, it was not a go module before v5
"non-test files":
files:
- "!$test"
deny:
- pkg: math/rand$
desc: Use math/rand/v2 instead, see https://go.dev/blog/randv2
"non-main files":
files:
- "!**/main.go"
deny:
- pkg: log$
desc: Use log/slog instead, see https://go.dev/blog/slog
errcheck:
# Report about not checking of errors in type assertions: `a := b.(MyStruct)`.
# Such cases aren't reported by default.
# Default: false
check-type-assertions: true
issues: exhaustive:
# Maximum count of issues with the same text. # Program elements to check for exhaustiveness.
# Set to 0 to disable. # Default: [ switch ]
# Default: 3 check:
max-same-issues: 50 - switch
- map
exhaustruct:
# List of regular expressions to exclude struct packages and their names from checks.
# Regular expressions must match complete canonical struct package/name/structname.
# Default: []
exclude:
# std libs
- ^net/http.Client$
- ^net/http.Cookie$
- ^net/http.Request$
- ^net/http.Response$
- ^net/http.Server$
- ^net/http.Transport$
- ^net/url.URL$
- ^os/exec.Cmd$
- ^reflect.StructField$
# public libs
- ^github.com/Shopify/sarama.Config$
- ^github.com/Shopify/sarama.ProducerMessage$
- ^github.com/mitchellh/mapstructure.DecoderConfig$
- ^github.com/prometheus/client_golang/.+Opts$
- ^github.com/spf13/cobra.Command$
- ^github.com/spf13/cobra.CompletionOptions$
- ^github.com/stretchr/testify/mock.Mock$
- ^github.com/testcontainers/testcontainers-go.+Request$
- ^github.com/testcontainers/testcontainers-go.FromDockerfile$
- ^golang.org/x/tools/go/analysis.Analyzer$
- ^google.golang.org/protobuf/.+Options$
- ^gopkg.in/yaml.v3.Node$
funlen:
# Checks the number of lines in a function.
# If lower than 0, disable the check.
# Default: 60
lines: 100
# Checks the number of statements in a function.
# If lower than 0, disable the check.
# Default: 40
statements: 50
gochecksumtype:
# Presence of `default` case in switch statements satisfies exhaustiveness, if all members are not listed.
# Default: true
default-signifies-exhaustive: false
gocognit:
# Minimal code complexity to report.
# Default: 30 (but we recommend 10-20)
min-complexity: 20
gocritic:
# Settings passed to gocritic.
# The settings key is the name of a supported gocritic checker.
# The list of supported checkers can be find in https://go-critic.github.io/overview.
settings:
captLocal:
# Whether to restrict checker to params only.
# Default: true
paramsOnly: false
underef:
# Whether to skip (*x).method() calls where x is a pointer receiver.
# Default: true
skipRecvDeref: false
govet:
# Enable all analyzers.
# Default: false
enable-all: true
# Disable analyzers by name.
# Run `go tool vet help` to see all analyzers.
# Default: []
disable:
- fieldalignment # too strict
# Settings per analyzer.
settings:
shadow:
# Whether to be strict about shadowing; can be noisy.
# Default: false
strict: true
inamedparam:
# Skips check for interface methods with only a single parameter.
# Default: false
skip-single-param: true
mnd:
# List of function patterns to exclude from analysis.
# Values always ignored: `time.Date`,
# `strconv.FormatInt`, `strconv.FormatUint`, `strconv.FormatFloat`,
# `strconv.ParseInt`, `strconv.ParseUint`, `strconv.ParseFloat`.
# Default: []
ignored-functions:
- args.Error
- flag.Arg
- flag.Duration.*
- flag.Float.*
- flag.Int.*
- flag.Uint.*
- os.Chmod
- os.Mkdir.*
- os.OpenFile
- os.WriteFile
- prometheus.ExponentialBuckets.*
- prometheus.LinearBuckets
nakedret:
# Make an issue if func has more lines of code than this setting, and it has naked returns.
# Default: 30
max-func-lines: 0
nolintlint:
# Exclude following linters from requiring an explanation.
# Default: []
allow-no-explanation: [ funlen, gocognit, golines ]
# Enable to require an explanation of nonzero length after each nolint directive.
# Default: false
require-explanation: true
# Enable to require nolint directives to mention the specific linter being suppressed.
# Default: false
require-specific: true
perfsprint:
# Optimizes into strings concatenation.
# Default: true
strconcat: false
reassign:
# Patterns for global variable names that are checked for reassignment.
# See https://github.com/curioswitch/go-reassign#usage
# Default: ["EOF", "Err.*"]
patterns:
- ".*"
sloglint:
# Enforce not using global loggers.
# Values:
# - "": disabled
# - "all": report all global loggers
# - "default": report only the default slog logger
# https://github.com/go-simpler/sloglint?tab=readme-ov-file#no-global
# Default: ""
no-global: all
# Enforce using methods that accept a context.
# Values:
# - "": disabled
# - "all": report all contextless calls
# - "scope": report only if a context exists in the scope of the outermost function
# https://github.com/go-simpler/sloglint?tab=readme-ov-file#context-only
# Default: ""
context: scope
staticcheck:
# SAxxxx checks in https://staticcheck.dev/docs/configuration/options/#checks
# Example (to disable some checks): [ "all", "-SA1000", "-SA1001"]
# Default: ["all", "-ST1000", "-ST1003", "-ST1016", "-ST1020", "-ST1021", "-ST1022"]
checks:
- all
# Incorrect or missing package comment.
# https://staticcheck.dev/docs/checks/#ST1000
- -ST1000
# Use consistent method receiver names.
# https://staticcheck.dev/docs/checks/#ST1016
- -ST1016
# Omit embedded fields from selector expression.
# https://staticcheck.dev/docs/checks/#QF1008
- -QF1008
usetesting:
# Enable/disable `os.TempDir()` detections.
# Default: false
os-temp-dir: true
exclude-rules: exclusions:
- source: "(noinspection|TODO)" rules:
linters: [ godot ] - source: 'TODO'
- source: "//noinspection" linters: [ godot ]
linters: [ gocritic ] - text: 'should have a package comment'
- path: "_test\\.go" linters: [ revive ]
linters: - text: 'exported \S+ \S+ should have comment( \(or a comment on this block\))? or be unexported'
- bodyclose linters: [ revive ]
- dupl - text: 'package comment should be of the form ".+"'
- errcheck source: '// ?(nolint|TODO)'
- funlen linters: [ revive ]
- goconst - text: 'comment on exported \S+ \S+ should be of the form ".+"'
- gosec source: '// ?(nolint|TODO)'
- noctx linters: [ revive, staticcheck ]
- wrapcheck - path: '_test\.go'
- mnd linters:
- path: "_middleware\\.go" - bodyclose
linters: - dupl
- nonamedreturns - errcheck
- revive - funlen
- stylecheck - goconst
- path: "test/.*\\.go" - gosec
linters: - noctx
- mnd - wrapcheck
- text: "shadow: declaration of \"(err|ctx)\" shadows declaration at" - path: '_test\.go'
linters: linters:
- govet - bodyclose
\ No newline at end of file - dupl
- errcheck
- funlen
- goconst
- gosec
- noctx
- wrapcheck
- mnd
- path: '_middleware\.go'
linters:
- nonamedreturns
- revive
- path: 'test/.*\.go'
linters:
- mnd
- text: "shadow: declaration of \"(err|ctx)\" shadows declaration at"
linters:
- govet
\ No newline at end of file
0% Loading or .
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment