From ca0b09e5e3891abef239b7c14459c6fba90e796e Mon Sep 17 00:00:00 2001 From: Ludovic Fernandez Date: Wed, 14 Aug 2024 23:54:30 +0200 Subject: [PATCH] gosec: add G602 analyzer (#4906) --- .golangci.next.reference.yml | 2 -- .golangci.reference.yml | 2 -- jsonschema/golangci.jsonschema.json | 3 +-- jsonschema/golangci.next.jsonschema.json | 3 +-- pkg/golinters/gosec/gosec.go | 1 + 5 files changed, 3 insertions(+), 8 deletions(-) diff --git a/.golangci.next.reference.yml b/.golangci.next.reference.yml index c15f96d8..2d4c9e10 100644 --- a/.golangci.next.reference.yml +++ b/.golangci.next.reference.yml @@ -874,7 +874,6 @@ linters-settings: - G504 # Import blocklist: net/http/cgi - G505 # Import blocklist: crypto/sha1 - G601 # Implicit memory aliasing of items from a range statement - - G602 # Slice access out of bounds # To specify a set of rules to explicitly exclude. # Available rules: https://github.com/securego/gosec#available-rules @@ -914,7 +913,6 @@ linters-settings: - G504 # Import blocklist: net/http/cgi - G505 # Import blocklist: crypto/sha1 - G601 # Implicit memory aliasing of items from a range statement - - G602 # Slice access out of bounds # Exclude generated files # Default: false diff --git a/.golangci.reference.yml b/.golangci.reference.yml index c15f96d8..2d4c9e10 100644 --- a/.golangci.reference.yml +++ b/.golangci.reference.yml @@ -874,7 +874,6 @@ linters-settings: - G504 # Import blocklist: net/http/cgi - G505 # Import blocklist: crypto/sha1 - G601 # Implicit memory aliasing of items from a range statement - - G602 # Slice access out of bounds # To specify a set of rules to explicitly exclude. # Available rules: https://github.com/securego/gosec#available-rules @@ -914,7 +913,6 @@ linters-settings: - G504 # Import blocklist: net/http/cgi - G505 # Import blocklist: crypto/sha1 - G601 # Implicit memory aliasing of items from a range statement - - G602 # Slice access out of bounds # Exclude generated files # Default: false diff --git a/jsonschema/golangci.jsonschema.json b/jsonschema/golangci.jsonschema.json index 16c7f557..510740d6 100644 --- a/jsonschema/golangci.jsonschema.json +++ b/jsonschema/golangci.jsonschema.json @@ -157,8 +157,7 @@ "G503", "G504", "G505", - "G601", - "G602" + "G601" ] }, "govet-analyzers": { diff --git a/jsonschema/golangci.next.jsonschema.json b/jsonschema/golangci.next.jsonschema.json index 16c7f557..510740d6 100644 --- a/jsonschema/golangci.next.jsonschema.json +++ b/jsonschema/golangci.next.jsonschema.json @@ -157,8 +157,7 @@ "G503", "G504", "G505", - "G601", - "G602" + "G601" ] }, "govet-analyzers": { diff --git a/pkg/golinters/gosec/gosec.go b/pkg/golinters/gosec/gosec.go index c333152e..0a484a94 100644 --- a/pkg/golinters/gosec/gosec.go +++ b/pkg/golinters/gosec/gosec.go @@ -77,6 +77,7 @@ func runGoSec(lintCtx *linter.Context, pass *analysis.Pass, settings *config.GoS } analyzer.CheckRules(pkg) + analyzer.CheckAnalyzers(pkg) secIssues, _, _ := analyzer.Report() if len(secIssues) == 0 {