2019-08-05 10:32:43 +00:00
|
|
|
linters:
|
|
|
|
enable:
|
|
|
|
- deadcode
|
2021-12-23 16:57:27 +00:00
|
|
|
- depguard
|
2019-08-05 10:32:43 +00:00
|
|
|
- goimports
|
|
|
|
- golint
|
2019-08-06 17:11:25 +00:00
|
|
|
- gosec
|
2019-08-05 10:32:43 +00:00
|
|
|
- gosimple
|
|
|
|
- govet
|
|
|
|
- ineffassign
|
2019-08-28 16:31:14 +00:00
|
|
|
- misspell
|
2019-10-14 00:15:48 +00:00
|
|
|
- staticcheck
|
|
|
|
- structcheck
|
|
|
|
- typecheck
|
2019-08-05 10:32:43 +00:00
|
|
|
- unconvert
|
2019-10-14 00:15:48 +00:00
|
|
|
- unused
|
|
|
|
- varcheck
|
2019-08-05 10:32:43 +00:00
|
|
|
|
|
|
|
disable:
|
|
|
|
- errcheck
|
|
|
|
|
|
|
|
run:
|
|
|
|
concurrency: 2
|
|
|
|
modules-download-mode: vendor
|
|
|
|
|
|
|
|
skip-dirs:
|
|
|
|
- docs
|
|
|
|
|
|
|
|
linters-settings:
|
|
|
|
govet:
|
|
|
|
check-shadowing: false
|
2021-12-23 16:57:27 +00:00
|
|
|
depguard:
|
|
|
|
list-type: blacklist
|
|
|
|
include-go-root: true
|
|
|
|
packages:
|
|
|
|
# The io/ioutil package has been deprecated.
|
|
|
|
# https://go.dev/doc/go1.16#ioutil
|
|
|
|
- io/ioutil
|
2019-08-06 17:11:25 +00:00
|
|
|
issues:
|
2019-10-14 00:13:32 +00:00
|
|
|
# The default exclusion rules are a bit too permissive, so copying the relevant ones below
|
|
|
|
exclude-use-default: false
|
|
|
|
|
2019-08-06 17:11:25 +00:00
|
|
|
exclude-rules:
|
2022-01-27 23:09:48 +00:00
|
|
|
# We prefer to use an "exclude-list" so that new "default" exclusions are not
|
|
|
|
# automatically inherited. We can decide whether or not to follow upstream
|
|
|
|
# defaults when updating golang-ci-lint versions.
|
|
|
|
# Unfortunately, this means we have to copy the whole exclusion pattern, as
|
|
|
|
# (unlike the "include" option), the "exclude" option does not take exclusion
|
|
|
|
# ID's.
|
|
|
|
#
|
|
|
|
# These exclusion patterns are copied from the default excluses at:
|
|
|
|
# https://github.com/golangci/golangci-lint/blob/v1.44.0/pkg/config/issues.go#L10-L104
|
|
|
|
|
|
|
|
# EXC0001
|
|
|
|
- text: "Error return value of .((os\\.)?std(out|err)\\..*|.*Close|.*Flush|os\\.Remove(All)?|.*print(f|ln)?|os\\.(Un)?Setenv). is not checked"
|
2019-10-14 00:13:32 +00:00
|
|
|
linters:
|
|
|
|
- errcheck
|
2022-01-27 23:09:48 +00:00
|
|
|
# EXC0003
|
2019-10-14 00:13:32 +00:00
|
|
|
- text: "func name will be used as test\\.Test.* by other packages, and that stutters; consider calling this"
|
|
|
|
linters:
|
|
|
|
- golint
|
2022-01-27 23:09:48 +00:00
|
|
|
# EXC0006
|
|
|
|
- text: "Use of unsafe calls should be audited"
|
|
|
|
linters:
|
|
|
|
- gosec
|
|
|
|
# EXC0007
|
|
|
|
- text: "Subprocess launch(ed with variable|ing should be audited)"
|
2019-10-14 00:13:32 +00:00
|
|
|
linters:
|
|
|
|
- gosec
|
2022-01-27 23:09:48 +00:00
|
|
|
# EXC0008
|
|
|
|
# TODO: evaluate these and fix where needed: G307: Deferring unsafe method "*os.File" on type "Close" (gosec)
|
|
|
|
- text: "(G104|G307)"
|
2019-10-14 00:13:32 +00:00
|
|
|
linters:
|
|
|
|
- gosec
|
2022-01-27 23:09:48 +00:00
|
|
|
# EXC0009
|
|
|
|
- text: "(Expect directory permissions to be 0750 or less|Expect file permissions to be 0600 or less)"
|
2019-10-14 00:13:32 +00:00
|
|
|
linters:
|
|
|
|
- gosec
|
2022-01-27 23:09:48 +00:00
|
|
|
# EXC0010
|
|
|
|
- text: "Potential file inclusion via variable"
|
2019-10-14 00:13:32 +00:00
|
|
|
linters:
|
|
|
|
- gosec
|
2022-01-27 23:09:48 +00:00
|
|
|
|
|
|
|
# Looks like the match in "EXC0007" above doesn't catch this one
|
|
|
|
# TODO: consider upstreaming this to golangci-lint's default exclusion rules
|
|
|
|
- text: "G204: Subprocess launched with a potential tainted input or cmd arguments"
|
2019-10-14 00:13:32 +00:00
|
|
|
linters:
|
|
|
|
- gosec
|
2022-01-27 23:09:48 +00:00
|
|
|
# Looks like the match in "EXC0009" above doesn't catch this one
|
|
|
|
# TODO: consider upstreaming this to golangci-lint's default exclusion rules
|
2021-05-28 00:15:56 +00:00
|
|
|
- text: "G306: Expect WriteFile permissions to be 0600 or less"
|
|
|
|
linters:
|
|
|
|
- gosec
|
2019-10-14 00:13:32 +00:00
|
|
|
|
2019-08-28 16:31:14 +00:00
|
|
|
# Exclude some linters from running on tests files.
|
|
|
|
- path: _test\.go
|
|
|
|
linters:
|
|
|
|
- errcheck
|
|
|
|
- gosec
|
|
|
|
|
2019-10-14 00:11:40 +00:00
|
|
|
# Suppress golint complaining about generated types in api/types/
|
|
|
|
- text: "type name will be used as (container|volume)\\.(Container|Volume).* by other packages, and that stutters; consider calling this"
|
|
|
|
path: "api/types/(volume|container)/"
|
|
|
|
linters:
|
|
|
|
- golint
|
2019-09-11 17:29:55 +00:00
|
|
|
# FIXME temporarily suppress these. See #39924
|
2019-10-14 00:07:51 +00:00
|
|
|
- text: "SA1019: .*\\.Xattrs is deprecated: Use PAXRecords instead"
|
2019-09-11 17:29:55 +00:00
|
|
|
linters:
|
|
|
|
- staticcheck
|
2019-09-11 17:41:03 +00:00
|
|
|
# FIXME temporarily suppress these. See #39926
|
2021-04-16 14:50:31 +00:00
|
|
|
- text: "SA1019: httputil.NewClientConn"
|
2019-09-11 17:41:03 +00:00
|
|
|
linters:
|
|
|
|
- staticcheck
|
2019-10-14 00:07:51 +00:00
|
|
|
# FIXME temporarily suppress these (related to the ones above)
|
2021-04-16 14:50:31 +00:00
|
|
|
- text: "SA1019: httputil.ErrPersistEOF"
|
2019-10-14 00:07:51 +00:00
|
|
|
linters:
|
|
|
|
- staticcheck
|
2021-05-28 00:15:56 +00:00
|
|
|
# This code is doing some fun stuff with reflect and it trips up the linter.
|
|
|
|
- text: "field `foo` is unused"
|
|
|
|
path: "libnetwork/options/options_test.go"
|
|
|
|
linters:
|
|
|
|
- structcheck
|
|
|
|
- unused
|
|
|
|
# This field is only used on windows but is defined in a platform agnostic file.
|
|
|
|
# The linter doesn't understand that the field is used.
|
|
|
|
- text: "`resolverOnce` is unused"
|
|
|
|
path: libnetwork/network.go
|
|
|
|
linters:
|
|
|
|
- structcheck
|
2021-04-16 22:13:23 +00:00
|
|
|
- unused
|
2021-05-31 11:45:56 +00:00
|
|
|
|
|
|
|
# Maximum issues count per one linter. Set to 0 to disable. Default is 50.
|
|
|
|
max-issues-per-linter: 0
|
|
|
|
|
|
|
|
# Maximum count of issues with the same text. Set to 0 to disable. Default is 3.
|
|
|
|
max-same-issues: 0
|