chore: Update golanglint-ci (#13445)

This commit is contained in:
Joshua Powers 2023-06-14 13:38:04 -06:00 committed by GitHub
parent 3840f6ac1b
commit 51d732ea9c
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
5 changed files with 34 additions and 44 deletions

View File

@ -25,5 +25,5 @@ jobs:
- name: golangci-lint - name: golangci-lint
uses: golangci/golangci-lint-action@v3 uses: golangci/golangci-lint-action@v3
with: with:
version: v1.52.2 version: v1.53.2
args: --timeout 15m0s --verbose --out-${NO_FUTURE}format tab args: --timeout 15m0s --verbose --out-${NO_FUTURE}format tab

View File

@ -1,7 +1,6 @@
linters: linters:
disable-all: true disable-all: true
enable: enable:
# - telegraflinter
- asasalint - asasalint
- asciicheck - asciicheck
- bidichk - bidichk
@ -39,44 +38,30 @@ linters:
linters-settings: linters-settings:
depguard: depguard:
# Kind of list is passed in. rules:
# Allowed values: allowlist|denylist # Name of a rule.
# Default: denylist main:
list-type: denylist # Packages that are not allowed where the value is a suggestion.
# Check the list against standard lib. deny:
# Default: false - pkg: log
include-go-root: true desc: 'Use injected telegraf.Logger instead'
# A list of packages for the list type specified. # List of file globs that will match this list of settings to compare against.
# Can accept both string prefixes and string glob patterns. # Default: $all
# Default: [] files:
packages: - "!**/agent/**"
- log - "!**/cmd/**"
# A list of packages for the list type specified. - "!**/config/**"
# Specify an error message to output when a denied package is used. - "!**/filter/**"
# Default: [] - "!**/internal/**"
packages-with-error-message: - "!**/logger/**"
- log: 'Use injected telegraf.Logger instead' - "!**/metric/**"
# Specify rules by which the linter ignores certain files for consideration. - "!**/models/**"
# Can accept both string prefixes and string glob patterns. - "!**/plugins/serializers/**"
# The ! character in front of the rule is a special character - "!**/scripts/**"
# which signals that the linter should negate the rule. - "!**/selfstat/**"
# This allows for more precise control, but it is only available for glob patterns. - "!**/testutil/**"
# Default: [] - "!**/tools/**"
ignore-file-rules: - "!**/*_test.go"
- "**/agent/**"
- "**/cmd/**"
- "**/config/**"
- "**/filter/**"
- "**/internal/**"
- "**/logger/**"
- "**/metric/**"
- "**/models/**"
- "**/plugins/serializers/**"
- "**/scripts/**"
- "**/selfstat/**"
- "**/testutil/**"
- "**/tools/**"
- "**/*_test.go"
errcheck: errcheck:
# List of functions to exclude from checking, where each entry is a single function to exclude. # List of functions to exclude from checking, where each entry is a single function to exclude.
# See https://github.com/kisielk/errcheck#excluding-functions for details. # See https://github.com/kisielk/errcheck#excluding-functions for details.

View File

@ -61,7 +61,7 @@ representative at an online or offline event.
Instances of abusive, harassing, or otherwise unacceptable behavior may be Instances of abusive, harassing, or otherwise unacceptable behavior may be
reported to the community leaders responsible for enforcement at reported to the community leaders responsible for enforcement at
community@influxdata.com. `community@influxdata.com`.
All complaints will be reviewed and investigated promptly and fairly. All complaints will be reviewed and investigated promptly and fairly.

View File

@ -174,7 +174,7 @@ vet:
.PHONY: lint-install .PHONY: lint-install
lint-install: lint-install:
@echo "Installing golangci-lint" @echo "Installing golangci-lint"
go install github.com/golangci/golangci-lint/cmd/golangci-lint@v1.52.2 go install github.com/golangci/golangci-lint/cmd/golangci-lint@v1.53.2
@echo "Installing markdownlint" @echo "Installing markdownlint"
npm install -g markdownlint-cli npm install -g markdownlint-cli

View File

@ -2,5 +2,10 @@
## Reporting a Vulnerability ## Reporting a Vulnerability
InfluxData takes security and our users' trust very seriously. If you believe you have found a security issue in any of our open source projects, InfluxData takes security and our users' trust very seriously. If you believe
please responsibly disclose it by contacting security@influxdata.com. More details about security vulnerability reporting, including our GPG key, can be found [here](https://www.influxdata.com/how-to-report-security-vulnerabilities/). you have found a security issue in any of our open source projects, please
responsibly disclose it by contacting `security@influxdata.com`. More details
about security vulnerability reporting, including our GPG key, can be found
on the [InfluxData How to Report Vulnerabilities page][InfluxData Security].
[InfluxData Security]: https://www.influxdata.com/how-to-report-security-vulnerabilities/