-
-
Notifications
You must be signed in to change notification settings - Fork 50
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
chore: add missing pre commits (#1289)
- Loading branch information
Showing
52 changed files
with
292 additions
and
45 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,43 @@ | ||
allow-parallel-runners: true | ||
run: | ||
timeout: 5m | ||
linters: | ||
disable-all: true | ||
enable: | ||
- gofmt | ||
- goimports | ||
- unused | ||
- gosec | ||
linters-settings: | ||
gosec: | ||
# To select a subset of rules to run. | ||
# Available rules: https://github.com/securego/gosec#available-rules | ||
includes: | ||
- G103 # Audit the use of unsafe block | ||
- G104 # Audit errors not checked | ||
- G106 # Audit the use of ssh.InsecureIgnoreHostKey | ||
- G108 # Profiling endpoint automatically exposed on /debug/pprof | ||
- G109 # Potential Integer overflow made by strconv.Atoi result conversion to int16/32 | ||
- G110 # Potential DoS vulnerability via decompression bomb | ||
- G111 # Potential directory traversal | ||
- G112 # Potential slowloris attack | ||
# - G113 # Usage of Rat.SetString in math/big with an overflow (CVE-2022-23772) | ||
- G201 # SQL query construction using format string | ||
- G202 # SQL query construction using string concatenation | ||
- G203 # Use of unescaped data in HTML templates | ||
- G204 # Audit use of command execution | ||
- G301 # Poor file permissions used when creating a directory | ||
- G302 # Poor file permissions used with chmod | ||
- G303 # Creating tempfile using a predictable path | ||
- G304 # File path provided as taint input | ||
- G305 # File traversal when extracting zip/tar archive | ||
- G306 # Poor file permissions used when writing to a new file | ||
- G307 # Poor file permissions used when creating a file with os.Create | ||
- G401 # Detect the usage of DES, RC4, MD5 or SHA1 | ||
- G403 # Ensure minimum RSA key length of 2048 bits | ||
- G501 # Import blocklist: crypto/md5 | ||
- G502 # Import blocklist: crypto/des | ||
- G503 # Import blocklist: crypto/rc4 | ||
- G504 # Import blocklist: net/http/cgi | ||
- G505 # Import blocklist: crypto/sha1 | ||
- G602 # Slice access out of bounds |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,43 @@ | ||
allow-parallel-runners: true | ||
run: | ||
timeout: 5m | ||
linters: | ||
disable-all: true | ||
enable: | ||
- gofmt | ||
- goimports | ||
- unused | ||
- gosec | ||
linters-settings: | ||
gosec: | ||
# To select a subset of rules to run. | ||
# Available rules: https://github.com/securego/gosec#available-rules | ||
includes: | ||
- G103 # Audit the use of unsafe block | ||
- G104 # Audit errors not checked | ||
- G106 # Audit the use of ssh.InsecureIgnoreHostKey | ||
- G108 # Profiling endpoint automatically exposed on /debug/pprof | ||
- G109 # Potential Integer overflow made by strconv.Atoi result conversion to int16/32 | ||
- G110 # Potential DoS vulnerability via decompression bomb | ||
- G111 # Potential directory traversal | ||
- G112 # Potential slowloris attack | ||
# - G113 # Usage of Rat.SetString in math/big with an overflow (CVE-2022-23772) | ||
- G201 # SQL query construction using format string | ||
- G202 # SQL query construction using string concatenation | ||
- G203 # Use of unescaped data in HTML templates | ||
- G204 # Audit use of command execution | ||
- G301 # Poor file permissions used when creating a directory | ||
- G302 # Poor file permissions used with chmod | ||
- G303 # Creating tempfile using a predictable path | ||
- G304 # File path provided as taint input | ||
- G305 # File traversal when extracting zip/tar archive | ||
- G306 # Poor file permissions used when writing to a new file | ||
- G307 # Poor file permissions used when creating a file with os.Create | ||
- G401 # Detect the usage of DES, RC4, MD5 or SHA1 | ||
- G403 # Ensure minimum RSA key length of 2048 bits | ||
- G501 # Import blocklist: crypto/md5 | ||
- G502 # Import blocklist: crypto/des | ||
- G503 # Import blocklist: crypto/rc4 | ||
- G504 # Import blocklist: net/http/cgi | ||
- G505 # Import blocklist: crypto/sha1 | ||
- G602 # Slice access out of bounds |
Oops, something went wrong.