forked from fmitra/authenticator
-
Notifications
You must be signed in to change notification settings - Fork 1
/
.golangci.yml
78 lines (66 loc) · 2 KB
/
.golangci.yml
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
service:
golang-ci-lint-version: 1.15.x
linters:
enable-all: true
disable:
- interfacer
- testpackage
- dupl
- wsl
- gocognit
- goerr113
- godot
- gomnd
- funlen
- godox
linters-settings:
errcheck:
ignore: 'github.com/go-kit/kit/log:.*,github.com/fmitra/authenticator/internal/pg:^DropTestDB'
govet:
check-shadowing: false
golint:
min-confidence: 0
gocyclo:
min-complexity: 20
maligned:
suggest-new: true
goconst:
min-len: 2
min-occurrences: 3
lll:
line-length: 150
issues:
exclude-rules:
- path: internal/test/
linters:
- golint
- lll
- errcheck
- path: errors.go
linters:
- golint
- path: _test\.go
linters:
- scopelint
- errcheck
- goconst
exclude-use-default: false
exclude:
# golint: Package comment check for every file
- should have a package comment, unless
# errcheck: Almost all programs ignore errors on these functions and in most cases it's ok
- Error return value of .((os\.)?std(out|err)\..*|.*Close|.*Flush|os\.Remove(All)?|.*printf?|os\.(Un)?Setenv). is not checked
# govet: Common false positives
- (possible misuse of unsafe.Pointer|should have signature)
# staticcheck: Developers tend to write in C-style with an explicit 'break' in a 'switch', so it's ok to ignore
- ineffective break statement. Did you mean to break out of the outer loop
# gosec: Too many false-positives on 'unsafe' usage
- Use of unsafe calls should be audited
# gosec: Too many false-positives for parametrized shell calls
- Subprocess launch(ed with variable|ing should be audited)
# gosec: Duplicated errcheck checks
- G104
# gosec: Too many issues in popular repos
- (Expect directory permissions to be 0750 or less|Expect file permissions to be 0600 or less)
# gosec: False positive is triggered by 'src, err := ioutil.ReadFile(filename)'
- Potential file inclusion via variable