forked from wneessen/go-mail
-
Notifications
You must be signed in to change notification settings - Fork 0
Expand file tree
/
Copy path.golangci.toml
More file actions
145 lines (128 loc) · 2.57 KB
/
.golangci.toml
File metadata and controls
145 lines (128 loc) · 2.57 KB
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
## SPDX-FileCopyrightText: The go-mail Authors
##
## SPDX-License-Identifier: MIT
version = '2'
[run]
go = '1.24'
tests = true
[linters]
enable = [
'containedctx',
'contextcheck',
'decorder',
'errname',
'errorlint',
'gosec',
'staticcheck',
'whitespace'
]
[linters.exclusions]
generated = 'lax'
presets = [
'comments',
'common-false-positives',
'legacy',
'std-error-handling'
]
paths = [
'examples',
'third_party$',
'builtin$',
'examples$'
]
## An overflow is impossible here
[[linters.exclusions.rules]]
linters = [
'gosec'
]
path = 'random.go'
text = 'G115:'
## These are tests which intentionally do not need any TLS settings
[[linters.exclusions.rules]]
linters = [
'gosec'
]
path = 'client_test.go'
text = 'G402:'
## These are tests which intentionally do not need any TLS settings
[[linters.exclusions.rules]]
linters = [
'gosec'
]
path = 'smtp/smtp_test.go'
text = 'G402:'
## We do not dictate a TLS minimum version in the smtp package. go-mail
## itself does set sane defaults
[[linters.exclusions.rules]]
linters = [
'gosec'
]
path = 'smtp/smtp.go'
text = 'G402:'
## The chance that we write +2 million tests is very low, I think we can
## ignore this for the time being
[[linters.exclusions.rules]]
linters = [
'gosec'
]
path = 'client_test.go'
text = 'G109:'
## The chance that we write +2 million tests is very low, I think we can
## ignore this for the time being
[[linters.exclusions.rules]]
linters = [
'gosec'
]
path = 'smtp/smtp_test.go'
text = 'G109:'
## We inform the user about the deprecated status of CRAM-MD5 and suggest
## to use SCRAM-SHA instead
[[linters.exclusions.rules]]
linters = [
'gosec'
]
path = 'smtp/auth_cram_md5.go'
text = 'G501:'
## Yes, SHA1 is weak, but in the context of SCRAM it is still considered
## secure for specific applications. The user is information about this
## in the documentation
[[linters.exclusions.rules]]
linters = [
'gosec'
]
path = 'smtp/auth_scram.go'
text = 'G505:'
## Test code for SCRAM-SHA1. Can be ignored.
[[linters.exclusions.rules]]
linters = [
'gosec'
]
path = 'smtp/smtp_test.go'
text = 'G505:'
## These are tests which intentionally do not need any TLS settings
[[linters.exclusions.rules]]
linters = [
'gosec'
]
path = 'quicksend_test.go'
text = 'G402:'
## These are tests which intentionally test SHA1 and SHA256
[[linters.exclusions.rules]]
linters = [
'gosec'
]
path = 'internal/pbkdf2/pbkdf2_test.go'
text = 'G505:'
[formatters]
enable = [
'gofmt',
'gofumpt'
]
[formatters.exclusions]
generated = 'lax'
paths = [
'examples',
'third_party$',
'builtin$',
'examples$'
]