Skip to content

Commit 60180aa

Browse files
docs: update documentation assets (#6413)
1 parent 804e5ec commit 60180aa

2 files changed

Lines changed: 33 additions & 8 deletions

File tree

.golangci.reference.yml

Lines changed: 31 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -1511,10 +1511,17 @@ linters:
15111511
- G110 # Detect io.Copy instead of io.CopyN when decompression
15121512
- G111 # Detect http.Dir('/') as a potential risk
15131513
- G112 # Detect ReadHeaderTimeout not configured as a potential risk
1514+
- G113 # HTTP request smuggling via conflicting headers or bare LF in body parsing
15141515
- G114 # Use of net/http serve function that has no support for setting timeouts
15151516
- G115 # Type conversion which leads to integer overflow
15161517
- G116 # Detect Trojan Source attacks using bidirectional Unicode characters
1517-
- G117 # Potential exposure of secrets via JSON marshaling
1518+
- G117 # Potential exposure of secrets via JSON/YAML/XML/TOML marshaling
1519+
- G118 # Context propagation failure leading to goroutine/resource leaks
1520+
- G119 # Unsafe redirect policy may propagate sensitive headers
1521+
- G120 # Unbounded form parsing in HTTP handlers can cause memory exhaustion
1522+
- G121 # Unsafe CrossOriginProtection bypass patterns
1523+
- G122 # Filesystem TOCTOU race risk in filepath.Walk/WalkDir callbacks
1524+
- G123 # TLS resumption may bypass VerifyPeerCertificate when VerifyConnection is unset
15181525
- G201 # SQL query construction using format string
15191526
- G202 # SQL query construction using string concatenation
15201527
- G203 # Use of unescaped data in HTML templates
@@ -1532,6 +1539,7 @@ linters:
15321539
- G404 # Insecure random number source (rand)
15331540
- G405 # Detect the usage of DES or RC4
15341541
- G406 # Detect the usage of deprecated MD4 or RIPEMD160
1542+
- G408 # Stateful misuse of ssh.PublicKeyCallback leading to auth bypass
15351543
- G501 # Import blocklist: crypto/md5
15361544
- G502 # Import blocklist: crypto/des
15371545
- G503 # Import blocklist: crypto/rc4
@@ -1547,6 +1555,7 @@ linters:
15471555
- G704 # SSRF via taint analysis
15481556
- G705 # XSS via taint analysis
15491557
- G706 # Log injection via taint analysis
1558+
- G707 # SMTP command/header injection via taint analysis
15501559

15511560
# To specify a set of rules to explicitly exclude.
15521561
# Available rules: https://github.com/securego/gosec#available-rules
@@ -2813,6 +2822,22 @@ linters:
28132822
exclude: [""]
28142823
arguments:
28152824
- ignore-directories: ["testcases", "testinfo"]
2825+
# https://github.com/mgechev/revive/blob/HEAD/RULES_DESCRIPTIONS.md#package-naming
2826+
- name: package-naming
2827+
severity: warning
2828+
disabled: false
2829+
exclude: [""]
2830+
arguments:
2831+
- skip-convention-name-check: true
2832+
convention-name-check-regex: "^[a-z][a-zA-Z0-9]*$"
2833+
skip-top-level-check: true
2834+
skip-default-bad-name-check: true
2835+
check-extra-bad-name: true
2836+
user-defined-bad-names:
2837+
- foo
2838+
- bar
2839+
skip-collision-with-common-std: true
2840+
check-collision-with-all-std: true
28162841
# https://github.com/mgechev/revive/blob/HEAD/RULES_DESCRIPTIONS.md#range
28172842
- name: range
28182843
severity: warning
@@ -2995,6 +3020,11 @@ linters:
29953020
severity: warning
29963021
disabled: false
29973022
exclude: [""]
3023+
# https://github.com/mgechev/revive/blob/HEAD/RULES_DESCRIPTIONS.md#use-slices-sort
3024+
- name: use-slices-sort
3025+
severity: warning
3026+
disabled: false
3027+
exclude: [""]
29983028
# https://github.com/mgechev/revive/blob/HEAD/RULES_DESCRIPTIONS.md#use-waitgroup-go
29993029
- name: use-waitgroup-go
30003030
severity: warning
@@ -3025,11 +3055,6 @@ linters:
30253055
- [ "VM" ] # DenyList
30263056
- - skip-initialism-name-checks: true
30273057
upper-case-const: true
3028-
skip-package-name-checks: true
3029-
skip-package-name-collision-with-go-std: true
3030-
extra-bad-package-names:
3031-
- helpers
3032-
- models
30333058
# https://github.com/mgechev/revive/blob/HEAD/RULES_DESCRIPTIONS.md#waitgroup-by-value
30343059
- name: waitgroup-by-value
30353060
severity: warning

docs/data/linters_info.json

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -741,10 +741,10 @@
741741
{
742742
"name": "prealloc",
743743
"desc": "Find slice declarations that could potentially be pre-allocated",
744-
"loadMode": 8199,
744+
"loadMode": 8767,
745745
"originalURL": "https://github.com/alexkohler/prealloc",
746746
"internal": false,
747-
"isSlow": false,
747+
"isSlow": true,
748748
"since": "v1.19.0"
749749
},
750750
{

0 commit comments

Comments
 (0)