docs: update documentation assets (#4930)

Co-authored-by: Fernandez Ludovic <ldez@users.noreply.github.com>
This commit is contained in:
golangci-releaser 2024-08-20 23:39:54 +03:00 committed by GitHub
parent 561049d697
commit 1bdd38bd47
No known key found for this signature in database
GPG Key ID: B5690EEEBB952194
4 changed files with 39 additions and 4 deletions

View File

@ -853,6 +853,7 @@ linters-settings:
- G112 # Potential slowloris attack - G112 # Potential slowloris attack
- G113 # Usage of Rat.SetString in math/big with an overflow (CVE-2022-23772) - G113 # Usage of Rat.SetString in math/big with an overflow (CVE-2022-23772)
- G114 # Use of net/http serve function that has no support for setting timeouts - G114 # Use of net/http serve function that has no support for setting timeouts
- G115 # Potential integer overflow when converting between integer types
- G201 # SQL query construction using format string - G201 # SQL query construction using format string
- G202 # SQL query construction using string concatenation - G202 # SQL query construction using string concatenation
- G203 # Use of unescaped data in HTML templates - G203 # Use of unescaped data in HTML templates
@ -864,16 +865,21 @@ linters-settings:
- G305 # File traversal when extracting zip/tar archive - G305 # File traversal when extracting zip/tar archive
- G306 # Poor file permissions used when writing to a new file - G306 # Poor file permissions used when writing to a new file
- G307 # Poor file permissions used when creating a file with os.Create - G307 # Poor file permissions used when creating a file with os.Create
- G401 # Detect the usage of DES, RC4, MD5 or SHA1 - G401 # Detect the usage of MD5 or SHA1
- G402 # Look for bad TLS connection settings - G402 # Look for bad TLS connection settings
- G403 # Ensure minimum RSA key length of 2048 bits - G403 # Ensure minimum RSA key length of 2048 bits
- G404 # Insecure random number source (rand) - G404 # Insecure random number source (rand)
- G405 # Detect the usage of DES or RC4
- G406 # Detect the usage of MD4 or RIPEMD160
- G501 # Import blocklist: crypto/md5 - G501 # Import blocklist: crypto/md5
- G502 # Import blocklist: crypto/des - G502 # Import blocklist: crypto/des
- G503 # Import blocklist: crypto/rc4 - G503 # Import blocklist: crypto/rc4
- G504 # Import blocklist: net/http/cgi - G504 # Import blocklist: net/http/cgi
- G505 # Import blocklist: crypto/sha1 - G505 # Import blocklist: crypto/sha1
- G506 # Import blocklist: golang.org/x/crypto/md4
- G507 #Import blocklist: golang.org/x/crypto/ripemd160
- G601 # Implicit memory aliasing of items from a range statement - G601 # Implicit memory aliasing of items from a range statement
- G602 # Slice access out of bounds
# To specify a set of rules to explicitly exclude. # To specify a set of rules to explicitly exclude.
# Available rules: https://github.com/securego/gosec#available-rules # Available rules: https://github.com/securego/gosec#available-rules
@ -892,6 +898,7 @@ linters-settings:
- G112 # Potential slowloris attack - G112 # Potential slowloris attack
- G113 # Usage of Rat.SetString in math/big with an overflow (CVE-2022-23772) - G113 # Usage of Rat.SetString in math/big with an overflow (CVE-2022-23772)
- G114 # Use of net/http serve function that has no support for setting timeouts - G114 # Use of net/http serve function that has no support for setting timeouts
- G115 # Potential integer overflow when converting between integer types
- G201 # SQL query construction using format string - G201 # SQL query construction using format string
- G202 # SQL query construction using string concatenation - G202 # SQL query construction using string concatenation
- G203 # Use of unescaped data in HTML templates - G203 # Use of unescaped data in HTML templates
@ -903,16 +910,21 @@ linters-settings:
- G305 # File traversal when extracting zip/tar archive - G305 # File traversal when extracting zip/tar archive
- G306 # Poor file permissions used when writing to a new file - G306 # Poor file permissions used when writing to a new file
- G307 # Poor file permissions used when creating a file with os.Create - G307 # Poor file permissions used when creating a file with os.Create
- G401 # Detect the usage of DES, RC4, MD5 or SHA1 - G401 # Detect the usage of MD5 or SHA1
- G402 # Look for bad TLS connection settings - G402 # Look for bad TLS connection settings
- G403 # Ensure minimum RSA key length of 2048 bits - G403 # Ensure minimum RSA key length of 2048 bits
- G404 # Insecure random number source (rand) - G404 # Insecure random number source (rand)
- G405 # Detect the usage of DES or RC4
- G406 # Detect the usage of MD4 or RIPEMD160
- G501 # Import blocklist: crypto/md5 - G501 # Import blocklist: crypto/md5
- G502 # Import blocklist: crypto/des - G502 # Import blocklist: crypto/des
- G503 # Import blocklist: crypto/rc4 - G503 # Import blocklist: crypto/rc4
- G504 # Import blocklist: net/http/cgi - G504 # Import blocklist: net/http/cgi
- G505 # Import blocklist: crypto/sha1 - G505 # Import blocklist: crypto/sha1
- G506 # Import blocklist: golang.org/x/crypto/md4
- G507 #Import blocklist: golang.org/x/crypto/ripemd160
- G601 # Implicit memory aliasing of items from a range statement - G601 # Implicit memory aliasing of items from a range statement
- G602 # Slice access out of bounds
# Exclude generated files # Exclude generated files
# Default: false # Default: false

View File

@ -1,5 +1,17 @@
Follow the news and releases on [Mastodon](https://fosstodon.org/@golangcilint) and on [Twitter](https://twitter.com/golangci). Follow the news and releases on [Mastodon](https://fosstodon.org/@golangcilint) and on [Twitter](https://twitter.com/golangci).
### v1.60.2
1. Updated linters
* `gofmt`: update to HEAD (go1.22)
* `gofumpt`: from 0.6.0 to 0.7.0
* `gosec`: fix G602 analyzer
* `gosec`: from 5f0084eb01a9 to 81cda2f91fbe (adds `G115`, `G405`, `G406`, `G506`, `G507`)
* `staticcheck`: from 0.5.0 to 0.5.1
* `staticcheck`: propagate Go version
* `wrapcheck`: from 2.8.3 to 2.9.0
* ⚠️ `exportloopref`: deprecation
### v1.60.1 ### v1.60.1
1. Updated linters 1. Updated linters

View File

@ -286,7 +286,12 @@
"originalURL": "https://github.com/kyoh86/exportloopref", "originalURL": "https://github.com/kyoh86/exportloopref",
"internal": false, "internal": false,
"isSlow": true, "isSlow": true,
"since": "v1.28.0" "since": "v1.28.0",
"deprecation": {
"since": "v1.60.2",
"message": "Since Go1.22 (loopvar) this linter is no longer relevant.",
"replacement": "copyloopvar"
}
}, },
{ {
"name": "forbidigo", "name": "forbidigo",

View File

@ -137,6 +137,7 @@
"G112", "G112",
"G113", "G113",
"G114", "G114",
"G115",
"G201", "G201",
"G202", "G202",
"G203", "G203",
@ -152,12 +153,17 @@
"G402", "G402",
"G403", "G403",
"G404", "G404",
"G405",
"G406",
"G501", "G501",
"G502", "G502",
"G503", "G503",
"G504", "G504",
"G505", "G505",
"G601" "G506",
"G507",
"G601",
"G602"
] ]
}, },
"govet-analyzers": { "govet-analyzers": {