 fa7adcbda9
			
		
	
	
		fa7adcbda9
		
			
		
	
	
	
	
		
			
			* add ability to set issue severity for out formats that support it based on severity rules * fix lint issues * change log child name * code climate omit severity if empty * add tests for severity rules, add support for case sensitive rules, fix lint issues, better doc comments, share processor test * deduplicated rule logic into a base rule that can be used by multiple rule types, moved severity config to it's own parent key named severity, reduced size of NewRunner function to make it easier to read * put validate function under base rule struct * better validation error wording * add Fingerprint and Description methods to Issue struct, made codeclimate reporter easier to read, checkstyle output is now pretty printed
		
			
				
	
	
		
			91 lines
		
	
	
		
			2.0 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
			
		
		
	
	
			91 lines
		
	
	
		
			2.0 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
| package processors
 | |
| 
 | |
| import (
 | |
| 	"regexp"
 | |
| 
 | |
| 	"github.com/golangci/golangci-lint/pkg/fsutils"
 | |
| 	"github.com/golangci/golangci-lint/pkg/logutils"
 | |
| 	"github.com/golangci/golangci-lint/pkg/result"
 | |
| )
 | |
| 
 | |
| type excludeRule struct {
 | |
| 	baseRule
 | |
| }
 | |
| 
 | |
| type ExcludeRule struct {
 | |
| 	BaseRule
 | |
| }
 | |
| 
 | |
| type ExcludeRules struct {
 | |
| 	rules     []excludeRule
 | |
| 	lineCache *fsutils.LineCache
 | |
| 	log       logutils.Log
 | |
| }
 | |
| 
 | |
| func NewExcludeRules(rules []ExcludeRule, lineCache *fsutils.LineCache, log logutils.Log) *ExcludeRules {
 | |
| 	r := &ExcludeRules{
 | |
| 		lineCache: lineCache,
 | |
| 		log:       log,
 | |
| 	}
 | |
| 	r.rules = createRules(rules, "(?i)")
 | |
| 
 | |
| 	return r
 | |
| }
 | |
| 
 | |
| func createRules(rules []ExcludeRule, prefix string) []excludeRule {
 | |
| 	parsedRules := make([]excludeRule, 0, len(rules))
 | |
| 	for _, rule := range rules {
 | |
| 		parsedRule := excludeRule{}
 | |
| 		parsedRule.linters = rule.Linters
 | |
| 		if rule.Text != "" {
 | |
| 			parsedRule.text = regexp.MustCompile(prefix + rule.Text)
 | |
| 		}
 | |
| 		if rule.Source != "" {
 | |
| 			parsedRule.source = regexp.MustCompile(prefix + rule.Source)
 | |
| 		}
 | |
| 		if rule.Path != "" {
 | |
| 			parsedRule.path = regexp.MustCompile(rule.Path)
 | |
| 		}
 | |
| 		parsedRules = append(parsedRules, parsedRule)
 | |
| 	}
 | |
| 	return parsedRules
 | |
| }
 | |
| 
 | |
| func (p ExcludeRules) Process(issues []result.Issue) ([]result.Issue, error) {
 | |
| 	if len(p.rules) == 0 {
 | |
| 		return issues, nil
 | |
| 	}
 | |
| 	return filterIssues(issues, func(i *result.Issue) bool {
 | |
| 		for _, rule := range p.rules {
 | |
| 			rule := rule
 | |
| 			if rule.match(i, p.lineCache, p.log) {
 | |
| 				return false
 | |
| 			}
 | |
| 		}
 | |
| 		return true
 | |
| 	}), nil
 | |
| }
 | |
| 
 | |
| func (ExcludeRules) Name() string { return "exclude-rules" }
 | |
| func (ExcludeRules) Finish()      {}
 | |
| 
 | |
| var _ Processor = ExcludeRules{}
 | |
| 
 | |
| type ExcludeRulesCaseSensitive struct {
 | |
| 	*ExcludeRules
 | |
| }
 | |
| 
 | |
| func NewExcludeRulesCaseSensitive(rules []ExcludeRule, lineCache *fsutils.LineCache, log logutils.Log) *ExcludeRulesCaseSensitive {
 | |
| 	r := &ExcludeRules{
 | |
| 		lineCache: lineCache,
 | |
| 		log:       log,
 | |
| 	}
 | |
| 	r.rules = createRules(rules, "")
 | |
| 
 | |
| 	return &ExcludeRulesCaseSensitive{r}
 | |
| }
 | |
| 
 | |
| func (ExcludeRulesCaseSensitive) Name() string { return "exclude-rules-case-sensitive" }
 | |
| 
 | |
| var _ Processor = ExcludeCaseSensitive{}
 |