
* add ability to set issue severity for out formats that support it based on severity rules * fix lint issues * change log child name * code climate omit severity if empty * add tests for severity rules, add support for case sensitive rules, fix lint issues, better doc comments, share processor test * deduplicated rule logic into a base rule that can be used by multiple rule types, moved severity config to it's own parent key named severity, reduced size of NewRunner function to make it easier to read * put validate function under base rule struct * better validation error wording * add Fingerprint and Description methods to Issue struct, made codeclimate reporter easier to read, checkstyle output is now pretty printed
91 lines
2.0 KiB
Go
91 lines
2.0 KiB
Go
package processors
|
|
|
|
import (
|
|
"regexp"
|
|
|
|
"github.com/golangci/golangci-lint/pkg/fsutils"
|
|
"github.com/golangci/golangci-lint/pkg/logutils"
|
|
"github.com/golangci/golangci-lint/pkg/result"
|
|
)
|
|
|
|
type excludeRule struct {
|
|
baseRule
|
|
}
|
|
|
|
type ExcludeRule struct {
|
|
BaseRule
|
|
}
|
|
|
|
type ExcludeRules struct {
|
|
rules []excludeRule
|
|
lineCache *fsutils.LineCache
|
|
log logutils.Log
|
|
}
|
|
|
|
func NewExcludeRules(rules []ExcludeRule, lineCache *fsutils.LineCache, log logutils.Log) *ExcludeRules {
|
|
r := &ExcludeRules{
|
|
lineCache: lineCache,
|
|
log: log,
|
|
}
|
|
r.rules = createRules(rules, "(?i)")
|
|
|
|
return r
|
|
}
|
|
|
|
func createRules(rules []ExcludeRule, prefix string) []excludeRule {
|
|
parsedRules := make([]excludeRule, 0, len(rules))
|
|
for _, rule := range rules {
|
|
parsedRule := excludeRule{}
|
|
parsedRule.linters = rule.Linters
|
|
if rule.Text != "" {
|
|
parsedRule.text = regexp.MustCompile(prefix + rule.Text)
|
|
}
|
|
if rule.Source != "" {
|
|
parsedRule.source = regexp.MustCompile(prefix + rule.Source)
|
|
}
|
|
if rule.Path != "" {
|
|
parsedRule.path = regexp.MustCompile(rule.Path)
|
|
}
|
|
parsedRules = append(parsedRules, parsedRule)
|
|
}
|
|
return parsedRules
|
|
}
|
|
|
|
func (p ExcludeRules) Process(issues []result.Issue) ([]result.Issue, error) {
|
|
if len(p.rules) == 0 {
|
|
return issues, nil
|
|
}
|
|
return filterIssues(issues, func(i *result.Issue) bool {
|
|
for _, rule := range p.rules {
|
|
rule := rule
|
|
if rule.match(i, p.lineCache, p.log) {
|
|
return false
|
|
}
|
|
}
|
|
return true
|
|
}), nil
|
|
}
|
|
|
|
func (ExcludeRules) Name() string { return "exclude-rules" }
|
|
func (ExcludeRules) Finish() {}
|
|
|
|
var _ Processor = ExcludeRules{}
|
|
|
|
type ExcludeRulesCaseSensitive struct {
|
|
*ExcludeRules
|
|
}
|
|
|
|
func NewExcludeRulesCaseSensitive(rules []ExcludeRule, lineCache *fsutils.LineCache, log logutils.Log) *ExcludeRulesCaseSensitive {
|
|
r := &ExcludeRules{
|
|
lineCache: lineCache,
|
|
log: log,
|
|
}
|
|
r.rules = createRules(rules, "")
|
|
|
|
return &ExcludeRulesCaseSensitive{r}
|
|
}
|
|
|
|
func (ExcludeRulesCaseSensitive) Name() string { return "exclude-rules-case-sensitive" }
|
|
|
|
var _ Processor = ExcludeCaseSensitive{}
|