-
Notifications
You must be signed in to change notification settings - Fork 66
/
.golangci.toml
647 lines (527 loc) · 19.6 KB
/
.golangci.toml
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520
521
522
523
524
525
526
527
528
529
530
531
532
533
534
535
536
537
538
539
540
541
542
543
544
545
546
547
548
549
550
551
552
553
554
555
556
557
558
559
560
561
562
563
564
565
566
567
568
569
570
571
572
573
574
575
576
577
578
579
580
581
582
583
584
585
586
587
588
589
590
591
592
593
594
595
596
597
598
599
600
601
602
603
604
605
606
607
608
609
610
611
612
613
614
615
616
617
618
619
620
621
622
623
624
625
626
627
628
629
630
631
632
633
634
635
636
637
638
639
640
641
642
643
644
645
646
647
[run]
# This is needed for precious, which may run multiple instances
# in parallel
allow-parallel-runners = true
go = "1.21"
tests = true
timeout = "10m"
[linters]
enable-all = true
disable = [
# The canonical form is not always the most common form for some headers
# and there is a small chance that switching existing strings could
# break something.
"canonicalheader",
"cyclop",
"dogsled",
"dupl",
# This is probably worthwhile, but there are a number of false positives
# that would need to be addressed.
"dupword",
# We don't follow its policy about not defining dynamic errors.
"err113",
# This doesn't seem to know about CTEs or DELETEs with RETURNING
"execinquery",
# We often don't initialize all of the struct fields. This is fine
# generally
"exhaustruct",
# Not relevant after 1.22
"exportloopref",
# We tried this linter but most places we do forced type asserts are
# pretty safe, e.g., an atomic.Value when everything is encapsulated
# in a small package.
"forcetypeassert",
"funlen",
"gochecknoglobals",
"gochecknoinits",
# Similar to the exhaustive linter and I don't know that we use these
# sorts of sum types
"gochecksumtype",
"gocognit",
"godox",
# We have to disable both "gomnd" and "mnd" temporarily, apparently.
"gomnd",
# This only "caught" one thing, and it seemed like a reasonable use
# of Han script. Generally, I don't think we want to prevent the use
# of particular scripts. The time.Local checks might be useful, but
# this didn't actually catch anything of note there.
"gosmopolitan",
# Seems too opinionated or at least would require going through all the
# interfaces we have.
"inamedparam",
"ireturn",
# We don't use these loggers
"loggercheck",
# Maintainability Index. Seems like it could be a good idea, but a
# lot of things fail and we would need to make some decisions about
# what to allow.
"maintidx",
# Using a const for every number doesn't necessarily increase code clarity,
# and it would be a ton of work to move everything to that.
"mnd",
# Causes panics, e.g., when processing mmerrors
"musttag",
"nestif",
# Perhaps too opinionated. We do have some legitimate uses of "return nil, nil"
"nilnil",
"nlreturn",
# We occasionally use named returns for documentation, which is helpful.
# Named returns are only really a problem when used in conjunction with
# a bare return statement. I _think_ Revive's bare-return covers that
# case.
"nonamedreturns",
"paralleltest",
"prealloc",
# We have very few structs with multiple tags and for the couple we had, this
# actually made it harder to read.
"tagalign",
# We probably _should_ be doing this!
"thelper",
# We don't follow this. Sometimes we test internal code.
"testpackage",
"varnamelen",
# This would probably be good, but we would need to configure it.
"wsl",
# Require Go 1.22
"copyloopvar",
"intrange",
]
# Please note that we only use depguard for blocking packages and
# gomodguard for blocking modules.
# supports modules currently. See https://github.com/ryancurrah/gomodguard/issues/12
[[linters-settings.depguard.rules.main.deny]]
pkg = "golang.org/x/exp/slog"
desc = "Use log/slog instead."
[[linters-settings.depguard.rules.main.deny]]
pkg = "io/ioutil"
desc = "Deprecated. Functions have been moved elsewhere."
[[linters-settings.depguard.rules.main.deny]]
pkg = "k8s.io/utils/strings/slices"
desc = "Use slices"
[[linters-settings.depguard.rules.main.deny]]
# slices has better alternatives.
pkg = "sort"
desc = "Use slices instead"
[linters-settings.errcheck]
# Don't allow setting of error to the blank identifier. If there is a legitimate
# reason, there should be a nolint with an explanation.
check-blank = true
exclude-functions = [
# If we are rolling back a transaction, we are often already in an error
# state.
'(*database/sql.Tx).Rollback',
# It is reasonable to ignore errors if Cleanup fails in most cases.
'(*github.com/google/renameio/v2.PendingFile).Cleanup',
# We often don't care if removing a file failed (e.g., it doesn't exist)
'os.Remove',
'os.RemoveAll',
]
[linters-settings.errorlint]
errorf = true
asserts = true
comparison = true
[linters-settings.exhaustive]
default-signifies-exhaustive = true
[linters-settings.forbidigo]
# Forbid the following identifiers
forbid = [
{ p = "Geoip", msg = "you should use `GeoIP`" },
{ p = "geoIP", msg = "you should use `geoip`" },
{ p = "^hubSpot", msg = "you should use `hubspot`" },
{ p = "Maxmind", msg = "you should use `MaxMind`" },
{ p = "^maxMind", msg = "you should use `maxmind`" },
{ p = "Minfraud", msg = "you should use `MinFraud`" },
{ p = "^minFraud", msg = "you should use `minfraud`" },
{ p = "[Uu]ser[iI][dD]", msg = "you should use `accountID` or `AccountID`" },
{ p = "WithEnterpriseURLs", msg = "Use ghe.NewClient instead." },
{ p = "^bigquery.NewClient", msg = "you should use mmgcloud.NewBigQueryClient instead." },
{ p = "^cloudresourcemanager.NewService", msg = "you should use mmgcloud.NewCloudResourceManagerService instead." },
{ p = "^compute.NewService", msg = "you should use mmgcloud.NewComputeService instead." },
{ p = "^drive.NewService", msg = "you should use mmgdrive.NewGDrive instead." },
{ p = "^math.Max$", msg = "you should use the max built-in instead." },
{ p = "^math.Min$", msg = "you should use the min built-in instead." },
{ p = "^net.ParseCIDR", msg = "you should use netip.ParsePrefix unless you really need a *net.IPNet" },
{ p = "^net.ParseIP", msg = "you should use netip.ParseAddr unless you really need a net.IP" },
{ p = "^pgtype.NewMap", msg = "you should use mmdatabase.NewTypeMap instead" },
{ p = "^serviceusage.NewService", msg = "you should use mmgcloud.NewServiceUsageService instead." },
{ p = "^sheets.NewService", msg = "you should use mmgcloud.NewSheetsService instead." },
{ p = "^storage.NewClient", msg = "you should use gstorage.NewClient instead. This sets the HTTP client settings that we need for internal use." },
{ p = "^os.IsNotExist", msg = "As per their docs, new code should use errors.Is(err, fs.ErrNotExist)." },
{ p = "^os.IsExist", msg = "As per their docs, new code should use errors.Is(err, fs.ErrExist)" },
{ p = "^net.LookupIP", msg = "You should use net.Resolver functions instead." },
{ p = "^net.LookupCNAME", msg = "You should use net.Resolver functions instead." },
{ p = "^net.LookupHost", msg = "You should use net.Resolver functions instead." },
{ p = "^net.LookupPort", msg = "You should use net.Resolver functions instead." },
{ p = "^net.LookupTXT", msg = "You should use net.Resolver functions instead." },
{ p = "^net.LookupAddr", msg = "You should use net.Resolver functions instead." },
{ p = "^net.LookupMX", msg = "You should use net.Resolver functions instead." },
{ p = "^net.LookupNS", msg = "You should use net.Resolver functions instead." },
{ p = "^net.LookupSRV", msg = "You should use net.Resolver functions instead." },
]
[linters-settings.gci]
sections = ["standard", "default", "prefix(github.com/maxmind/MaxMind-DB)"]
[linters-settings.gocritic]
enable-all = true
disabled-checks = [
# Revive's defer rule already captures this. This caught no extra cases.
"deferInLoop",
# Given that all of our code runs on Linux and the / separate should
# work fine, this seems less important.
"filepathJoin",
# This seems like it could be good, but we would need to update current
# uses. It supports "--fix", but the fixing is a bit broken.
"httpNoBody",
# This might be good, but we would have to revisit a lot of code.
"hugeParam",
# This might be good, but I don't think we want to encourage
# significant changes to regexes as we port stuff from Perl.
"regexpSimplify",
# This seems like it might also be good, but a lot of existing code
# fails.
"sloppyReassign",
# I am not sure we would want this linter and a lot of existing
# code fails.
"unnamedResult",
# Covered by nolintlint
"whyNoLint",
]
[linters-settings.gofumpt]
extra-rules = true
# IMPORTANT: gomodguard blocks _modules_, not arbitrary packages. Be
# sure to use the module path from the go.mod file for these.
[linters-settings.gomodguard]
[[linters-settings.gomodguard.blocked.modules]]
[linters-settings.gomodguard.blocked.modules."github.com/avct/uasurfer"]
recommendations = ["github.com/xavivars/uasurfer"]
reason = "The original avct module appears abandoned."
[[linters-settings.gomodguard.blocked.modules]]
[linters-settings.gomodguard.blocked.modules."github.com/BurntSushi/toml"]
recommendations = ["github.com/pelletier/go-toml/v2"]
reason = "This library panics frequently on invalid input."
[[linters-settings.gomodguard.blocked.modules]]
[linters-settings.gomodguard.blocked.modules."github.com/pelletier/go-toml"]
recommendations = ["github.com/pelletier/go-toml/v2"]
reason = "This is an outdated version."
[[linters-settings.gomodguard.blocked.modules]]
[linters-settings.gomodguard.blocked.modules."github.com/gofrs/uuid"]
recommendations = ["github.com/google/uuid"]
[[linters-settings.gomodguard.blocked.modules]]
[linters-settings.gomodguard.blocked.modules."github.com/gofrs/uuid/v5"]
recommendations = ["github.com/google/uuid"]
[[linters-settings.gomodguard.blocked.modules]]
[linters-settings.gomodguard.blocked.modules."github.com/satori/go.uuid"]
recommendations = ["github.com/google/uuid"]
[[linters-settings.gomodguard.blocked.modules]]
[linters-settings.gomodguard.blocked.modules."github.com/lib/pq"]
recommendations = ["github.com/jackc/pgx"]
reason = "This library is no longer actively maintained."
[[linters-settings.gomodguard.blocked.modules]]
[linters-settings.gomodguard.blocked.modules."github.com/neilotoole/errgroup"]
recommendations = ["golang.org/x/sync/errgroup"]
reason = "This library can lead to subtle deadlocks in certain use cases."
[[linters-settings.gomodguard.blocked.modules]]
[linters-settings.gomodguard.blocked.modules."github.com/pariz/gountries"]
reason = "This library's data is not actively maintained. Use GeoInfo data."
[linters-settings.gomodguard.blocked.modules."github.com/pkg/errors"]
recommendations = ["github.maxmind.com/maxmind/mm_website/go/pkg/mmerrors"]
reason = "pkg/errors is no longer maintained."
[[linters-settings.gomodguard.blocked.modules]]
[linters-settings.gomodguard.blocked.modules."github.com/RackSec/srslog"]
recommendations = ["log/syslog"]
reason = "This library's data is not actively maintained."
[[linters-settings.gomodguard.blocked.modules]]
[linters-settings.gomodguard.blocked.modules."github.com/ua-parser/uap-go"]
recommendations = ["github.com/xavivars/uasurfer"]
reason = "The performance of this library is absolutely abysmal."
[[linters-settings.gomodguard.blocked.modules]]
[linters-settings.gomodguard.blocked.modules."github.com/ugorji/go"]
recommendations = ["encoding/json", "github.com/mailru/easyjson"]
reason = "This library is poorly maintained. We should default to using encoding/json and use easyjson where performance really matters."
[[linters-settings.gomodguard.blocked.modules]]
[linters-settings.gomodguard.blocked.modules."gotest.tools/v3"]
recommendations = ["github.com/stretchr/testify/assert"]
reason = "Use github.com/stretchr/testify/assert"
[[linters-settings.gomodguard.blocked.modules]]
[linters-settings.gomodguard.blocked.modules."inet.af/netaddr"]
recommendations = ["net/netip", "go4.org/netipx"]
reason = "inet.af/netaddr has been deprecated."
[[linters-settings.gomodguard.blocked.versions]]
[linters-settings.gomodguard.blocked.versions."github.com/jackc/pgconn"]
reason = "Use github.com/jackc/pgx/v5"
[[linters-settings.gomodguard.blocked.versions]]
[linters-settings.gomodguard.blocked.versions."github.com/jackc/pgtype"]
reason = "Use github.com/jackc/pgx/v5"
[[linters-settings.gomodguard.blocked.versions]]
[linters-settings.gomodguard.blocked.versions."github.com/jackc/pgx"]
version = "< 5.0.0"
reason = "Use github.com/jackc/pgx/v5"
[linters-settings.gosec]
excludes = [
# G104 - "Audit errors not checked." We use errcheck for this.
"G104",
# G306 - "Expect WriteFile permissions to be 0600 or less".
"G306",
# Prohibits defer (*os.File).Close, which we allow when reading from file.
"G307",
# no longer relevant with 1.22
"G601",
# MaxMind-DB uses md5
"G401",
"G501",
]
[linters-settings.govet]
"enable-all" = true
# Although it is very useful in particular cases where we are trying to
# use as little memory as possible, there are even more cases where
# other organizations may make more sense.
disable = ["fieldalignment"]
[linters-settings.govet.settings.shadow]
strict = true
[linters-settings.lll]
line-length = 120
tab-width = 4
[linters-settings.misspell]
locale = "US"
[[linters-settings.misspell.extra-words]]
typo = "marshall"
correction = "marshal"
[[linters-settings.misspell.extra-words]]
typo = "marshalling"
correction = "marshaling"
[[linters-settings.misspell.extra-words]]
typo = "marshalls"
correction = "marshals"
[[linters-settings.misspell.extra-words]]
typo = "unmarshall"
correction = "unmarshal"
[[linters-settings.misspell.extra-words]]
typo = "unmarshalling"
correction = "unmarshaling"
[[linters-settings.misspell.extra-words]]
typo = "unmarshalls"
correction = "unmarshals"
[linters-settings.nolintlint]
allow-unused = false
allow-no-explanation = ["lll", "misspell"]
require-explanation = true
require-specific = true
[linters-settings.revive]
enable-all-rules = true
ignore-generated-header = true
severity = "warning"
# This might be nice but it is so common that it is hard
# to enable.
[[linters-settings.revive.rules]]
name = "add-constant"
disabled = true
[[linters-settings.revive.rules]]
name = "argument-limit"
disabled = true
[[linters-settings.revive.rules]]
name = "cognitive-complexity"
disabled = true
[[linters-settings.revive.rules]]
name = "comment-spacings"
arguments = ["easyjson", "nolint"]
disabled = false
# Probably a good rule, but we have a lot of names that
# only have case differences.
[[linters-settings.revive.rules]]
name = "confusing-naming"
disabled = true
[[linters-settings.revive.rules]]
name = "cyclomatic"
disabled = true
# Although being consistent might be nice, I don't know that it
# is worth the effort enabling this rule. It doesn't have an
# autofix option.
[[linters-settings.revive.rules]]
name = "enforce-repeated-arg-type-style"
arguments = ["short"]
disabled = true
[[linters-settings.revive.rules]]
name = "enforce-map-style"
arguments = ["literal"]
disabled = false
# We have very few of these as we force nil slices in most places,
# but there are a couple of cases.
[[linters-settings.revive.rules]]
name = "enforce-slice-style"
arguments = ["literal"]
disabled = false
[[linters-settings.revive.rules]]
name = "file-header"
disabled = true
# We have a lot of flag parameters. This linter probably makes
# a good point, but we would need some cleanup or a lot of nolints.
[[linters-settings.revive.rules]]
name = "flag-parameter"
disabled = true
[[linters-settings.revive.rules]]
name = "function-length"
disabled = true
[[linters-settings.revive.rules]]
name = "function-result-limit"
disabled = true
[[linters-settings.revive.rules]]
name = "line-length-limit"
disabled = true
[[linters-settings.revive.rules]]
name = "max-public-structs"
disabled = true
# We frequently use nested structs, particularly in tests.
[[linters-settings.revive.rules]]
name = "nested-structs"
disabled = true
# This doesn't make sense with 1.22 loop var changes.
[[linters-settings.revive.rules]]
name = "range-val-address"
disabled = true
# This causes a ton of failures. Many are fairly safe. It might be nice to
# enable, but probably not worth the effort.
[[linters-settings.revive.rules]]
name = "unchecked-type-assertion"
disabled = true
# This is covered elsewhere and we want to ignore some
# functions such as fmt.Fprintf.
[[linters-settings.revive.rules]]
name = "unhandled-error"
disabled = true
# We generally have unused receivers in tests for meeting the
# requirements of an interface.
[[linters-settings.revive.rules]]
name = "unused-receiver"
disabled = true
[linters-settings.tagliatelle.case.rules]
avro = "snake"
bson = "snake"
env = "upperSnake"
envconfig = "upperSnake"
json = "snake"
mapstructure = "snake"
xml = "snake"
yaml = "snake"
[linters-settings.unparam]
check-exported = true
[linters-settings.wrapcheck]
"ignoreSigs" = [
".Errorf(",
"errgroup.NewMultiError(",
"errors.Join(",
"errors.New(",
".Wait(",
".WithStack(",
".Wrap(",
".Wrapf(",
"v4.Retry(",
"v4.RetryNotify(",
]
[issues]
exclude-use-default = false
exclude-dirs = [
"geoip-build/mmcsv",
]
exclude-files = [
"_easyjson\\.go$",
"_easyjson_test\\.go$",
"_xgb2code\\.go$",
"_json2vector\\.go$",
]
[[issues.exclude-rules]]
linters = [
"bodyclose",
]
# This rule doesn't really make sense for tests where we don't have an open
# connection and we might be passing around the response for other reasons.
path = "_test.go"
[[issues.exclude-rules]]
linters = [
"forbidigo",
]
# This refers to a minFraud field, not the MaxMind Account ID
source = "AccountUserID|Account\\.UserID"
# we include both a source and text exclusion as the source exclusion
# misses matches where forbidigo reports the error on the first line
# of a chunk of a function call even though the use is on a later line.
[[issues.exclude-rules]]
linters = [
"forbidigo",
]
text = "AccountUserID|Account\\.UserID"
[[issues.exclude-rules]]
linters = [
"gocritic",
]
# For some reason the imports stuff in ruleguard doesn't work in golangci-lint.
# Perhaps it has an outdated version or something
path = "_test.go"
text = "ruleguard: Prefer the alternative Context method instead"
[[issues.exclude-rules]]
linters = [
"gocritic",
]
# The nolintlint linter behaves oddly with ruleguard rules
source = "// *no-ruleguard"
[[issues.exclude-rules]]
linters = [
"nolintlint",
]
# The contextcheck linter also uses "nolint" in a slightly different way,
# leading to falso positives from nolintlint.
source = "//nolint:contextcheck //.*"
[[issues.exclude-rules]]
linters = [
"govet",
]
# These are usually fine to shadow and not allowing shadowing for them can
# make the code unnecessarily verbose.
text = 'shadow: declaration of "(ctx|err|ok)" shadows declaration'
[[issues.exclude-rules]]
linters = [
"contextcheck",
# With recent changes to the linter, there were a lot of failures in
# the tests and it wasn't clear to me that fixing them would actually
# improve the readability.
"goconst",
"nilerr",
"wrapcheck",
]
path = "_test.go"
[[issues.exclude-rules]]
linters = [
"errcheck",
]
# There are many cases where we want to just close resources and ignore the
# error (e.g., for defer f.Close on a read). errcheck removed its built-in
# wildcard ignore. I tried listing all of the cases, but it was too many
# and some were very specific.
source = "\\.Close"
[[issues.exclude-rules]]
linters = [
"stylecheck",
]
# ST1016 - methods on the same type should have the same receiver name.
# easyjson doesn't interact well with this.
text = "ST1016"
[[issues.exclude-rules]]
linters = [
"staticcheck",
]
# SA5008: unknown JSON option "intern" - easyjson specific option.
text = 'SA5008: unknown JSON option "intern"'
[[issues.exclude-rules]]
linters = [
"wrapcheck",
]
text = "github.com/maxmind/MaxMind-DB"
[[issues.exclude-rules]]
linters = [
"wrapcheck",
]
path = "_easyjson.go"
[[issues.exclude-rules]]
linters = [
"gocritic",
]
source = "Chmod|WriteFile"
text = "octalLiteral"