Skip to content

Commit 1e52b52

Browse files
committed
chore: update doc
1 parent 44f487f commit 1e52b52

File tree

2 files changed

+17
-2
lines changed

2 files changed

+17
-2
lines changed

.golangci.next.reference.yml

Lines changed: 12 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -853,6 +853,7 @@ linters-settings:
853853
- G112 # Potential slowloris attack
854854
- G113 # Usage of Rat.SetString in math/big with an overflow (CVE-2022-23772)
855855
- G114 # Use of net/http serve function that has no support for setting timeouts
856+
- G115 # Potential integer overflow when converting between integer types
856857
- G201 # SQL query construction using format string
857858
- G202 # SQL query construction using string concatenation
858859
- G203 # Use of unescaped data in HTML templates
@@ -864,15 +865,19 @@ linters-settings:
864865
- G305 # File traversal when extracting zip/tar archive
865866
- G306 # Poor file permissions used when writing to a new file
866867
- G307 # Poor file permissions used when creating a file with os.Create
867-
- G401 # Detect the usage of DES, RC4, MD5 or SHA1
868+
- G401 # Detect the usage of MD5 or SHA1
868869
- G402 # Look for bad TLS connection settings
869870
- G403 # Ensure minimum RSA key length of 2048 bits
870871
- G404 # Insecure random number source (rand)
872+
- G405 # Detect the usage of DES or RC4
873+
- G406 # Detect the usage of MD4 or RIPEMD160
871874
- G501 # Import blocklist: crypto/md5
872875
- G502 # Import blocklist: crypto/des
873876
- G503 # Import blocklist: crypto/rc4
874877
- G504 # Import blocklist: net/http/cgi
875878
- G505 # Import blocklist: crypto/sha1
879+
- G506 # Import blocklist: golang.org/x/crypto/md4
880+
- G507 #Import blocklist: golang.org/x/crypto/ripemd160
876881
- G601 # Implicit memory aliasing of items from a range statement
877882
- G602 # Slice access out of bounds
878883

@@ -893,6 +898,7 @@ linters-settings:
893898
- G112 # Potential slowloris attack
894899
- G113 # Usage of Rat.SetString in math/big with an overflow (CVE-2022-23772)
895900
- G114 # Use of net/http serve function that has no support for setting timeouts
901+
- G115 # Potential integer overflow when converting between integer types
896902
- G201 # SQL query construction using format string
897903
- G202 # SQL query construction using string concatenation
898904
- G203 # Use of unescaped data in HTML templates
@@ -904,15 +910,19 @@ linters-settings:
904910
- G305 # File traversal when extracting zip/tar archive
905911
- G306 # Poor file permissions used when writing to a new file
906912
- G307 # Poor file permissions used when creating a file with os.Create
907-
- G401 # Detect the usage of DES, RC4, MD5 or SHA1
913+
- G401 # Detect the usage of MD5 or SHA1
908914
- G402 # Look for bad TLS connection settings
909915
- G403 # Ensure minimum RSA key length of 2048 bits
910916
- G404 # Insecure random number source (rand)
917+
- G405 # Detect the usage of DES or RC4
918+
- G406 # Detect the usage of MD4 or RIPEMD160
911919
- G501 # Import blocklist: crypto/md5
912920
- G502 # Import blocklist: crypto/des
913921
- G503 # Import blocklist: crypto/rc4
914922
- G504 # Import blocklist: net/http/cgi
915923
- G505 # Import blocklist: crypto/sha1
924+
- G506 # Import blocklist: golang.org/x/crypto/md4
925+
- G507 #Import blocklist: golang.org/x/crypto/ripemd160
916926
- G601 # Implicit memory aliasing of items from a range statement
917927
- G602 # Slice access out of bounds
918928

jsonschema/golangci.next.jsonschema.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -137,6 +137,7 @@
137137
"G112",
138138
"G113",
139139
"G114",
140+
"G115",
140141
"G201",
141142
"G202",
142143
"G203",
@@ -152,11 +153,15 @@
152153
"G402",
153154
"G403",
154155
"G404",
156+
"G405",
157+
"G406",
155158
"G501",
156159
"G502",
157160
"G503",
158161
"G504",
159162
"G505",
163+
"G506",
164+
"G507",
160165
"G601",
161166
"G602"
162167
]

0 commit comments

Comments
 (0)