woodpecker/vendor/github.com/golangci/golangci-lint/pkg/golinters/nolintlint
6543 56a854fe14
Update deps (#789)
* update github.com/docker/cli

* update github.com/docker/distribution

* update github.com/docker/docker

* update github.com/gin-gonic/gin

* update github.com/golang-jwt/jwt/v4

* update github.com/golangci/golangci-lint

* update github.com/gorilla/securecookie

* update github.com/mattn/go-sqlite3

* update github.com/moby/moby

* update github.com/prometheus/client_golang

* update github.com/xanzy/go-gitlab
2022-02-24 17:33:24 +01:00
..
nolintlint.go Update deps (#789) 2022-02-24 17:33:24 +01:00
README.md Add golangci-lint (#502) 2021-11-14 21:01:54 +01:00

nolintlint

nolintlint is a Go static analysis tool to find ill-formed or insufficiently explained // nolint directives for golangci (or any other linter, using th )

Purpose

To ensure that lint exceptions have explanations. Consider the case below:

import "crypto/md5" //nolint

func hash(data []byte) []byte {
	return md5.New().Sum(data) //nolint
}

In the above case, nolint directives are present but the user has no idea why this is being done or which linter is being suppressed (in this case, gosec recommends against use of md5). nolintlint can require that the code provide an explanation, which might look as follows:

import "crypto/md5" //nolint:gosec // this is not used in a secure application

func hash(data []byte) []byte {
	return md5.New().Sum(data) //nolint:gosec // this result is not used in a secure application
}

nolintlint can also identify cases where you may have written // nolint. Finally nolintlint, can also enforce that you use the machine-readable nolint directive format //nolint and that you mention what linter is being suppressed, as shown above when we write //nolint:gosec.