|
| 1 | +package main |
| 2 | + |
| 3 | +import ( |
| 4 | + "golang.org/x/tools/go/analysis" |
| 5 | + "golang.org/x/tools/go/analysis/passes/asmdecl" |
| 6 | + "golang.org/x/tools/go/analysis/passes/assign" |
| 7 | + "golang.org/x/tools/go/analysis/passes/atomic" |
| 8 | + "golang.org/x/tools/go/analysis/passes/atomicalign" |
| 9 | + "golang.org/x/tools/go/analysis/passes/bools" |
| 10 | + "golang.org/x/tools/go/analysis/passes/buildtag" |
| 11 | + "golang.org/x/tools/go/analysis/passes/cgocall" |
| 12 | + "golang.org/x/tools/go/analysis/passes/composite" |
| 13 | + "golang.org/x/tools/go/analysis/passes/copylock" |
| 14 | + "golang.org/x/tools/go/analysis/passes/ctrlflow" |
| 15 | + "golang.org/x/tools/go/analysis/passes/deepequalerrors" |
| 16 | + "golang.org/x/tools/go/analysis/passes/defers" |
| 17 | + "golang.org/x/tools/go/analysis/passes/directive" |
| 18 | + "golang.org/x/tools/go/analysis/passes/errorsas" |
| 19 | + "golang.org/x/tools/go/analysis/passes/fieldalignment" |
| 20 | + "golang.org/x/tools/go/analysis/passes/findcall" |
| 21 | + "golang.org/x/tools/go/analysis/passes/httpresponse" |
| 22 | + "golang.org/x/tools/go/analysis/passes/ifaceassert" |
| 23 | + "golang.org/x/tools/go/analysis/passes/loopclosure" |
| 24 | + "golang.org/x/tools/go/analysis/passes/lostcancel" |
| 25 | + "golang.org/x/tools/go/analysis/passes/nilfunc" |
| 26 | + "golang.org/x/tools/go/analysis/passes/nilness" |
| 27 | + "golang.org/x/tools/go/analysis/passes/pkgfact" |
| 28 | + "golang.org/x/tools/go/analysis/passes/printf" |
| 29 | + "golang.org/x/tools/go/analysis/passes/reflectvaluecompare" |
| 30 | + "golang.org/x/tools/go/analysis/passes/shadow" |
| 31 | + "golang.org/x/tools/go/analysis/passes/shift" |
| 32 | + "golang.org/x/tools/go/analysis/passes/sortslice" |
| 33 | + "golang.org/x/tools/go/analysis/passes/stdmethods" |
| 34 | + "golang.org/x/tools/go/analysis/passes/stringintconv" |
| 35 | + "golang.org/x/tools/go/analysis/passes/structtag" |
| 36 | + "golang.org/x/tools/go/analysis/passes/testinggoroutine" |
| 37 | + "golang.org/x/tools/go/analysis/passes/tests" |
| 38 | + "golang.org/x/tools/go/analysis/passes/unmarshal" |
| 39 | + "golang.org/x/tools/go/analysis/passes/unreachable" |
| 40 | + "golang.org/x/tools/go/analysis/passes/unsafeptr" |
| 41 | + "golang.org/x/tools/go/analysis/passes/unusedresult" |
| 42 | + "golang.org/x/tools/go/analysis/passes/unusedwrite" |
| 43 | + "golang.org/x/tools/go/analysis/passes/usesgenerics" |
| 44 | + "honnef.co/go/tools/staticcheck" |
| 45 | + |
| 46 | + "github.com/kisielk/errcheck/errcheck" |
| 47 | + custom "github.com/srg-bnd/observator/cmd/staticlint/multichecker/custom/exitcheckanalyser" |
| 48 | + // TODO: Update Go version |
| 49 | + // "github.com/securego/gosec/v2/loader" |
| 50 | +) |
| 51 | + |
| 52 | +func standardAnalyzers() []*analysis.Analyzer { |
| 53 | + return []*analysis.Analyzer{ |
| 54 | + printf.Analyzer, |
| 55 | + shadow.Analyzer, |
| 56 | + shift.Analyzer, |
| 57 | + structtag.Analyzer, |
| 58 | + asmdecl.Analyzer, |
| 59 | + assign.Analyzer, |
| 60 | + atomic.Analyzer, |
| 61 | + atomicalign.Analyzer, |
| 62 | + bools.Analyzer, |
| 63 | + buildtag.Analyzer, |
| 64 | + cgocall.Analyzer, |
| 65 | + composite.Analyzer, |
| 66 | + copylock.Analyzer, |
| 67 | + ctrlflow.Analyzer, |
| 68 | + deepequalerrors.Analyzer, |
| 69 | + defers.Analyzer, |
| 70 | + directive.Analyzer, |
| 71 | + errorsas.Analyzer, |
| 72 | + fieldalignment.Analyzer, |
| 73 | + findcall.Analyzer, |
| 74 | + httpresponse.Analyzer, |
| 75 | + ifaceassert.Analyzer, |
| 76 | + loopclosure.Analyzer, |
| 77 | + lostcancel.Analyzer, |
| 78 | + nilfunc.Analyzer, |
| 79 | + nilness.Analyzer, |
| 80 | + pkgfact.Analyzer, |
| 81 | + reflectvaluecompare.Analyzer, |
| 82 | + sortslice.Analyzer, |
| 83 | + stdmethods.Analyzer, |
| 84 | + stringintconv.Analyzer, |
| 85 | + testinggoroutine.Analyzer, |
| 86 | + tests.Analyzer, |
| 87 | + unmarshal.Analyzer, |
| 88 | + unreachable.Analyzer, |
| 89 | + unsafeptr.Analyzer, |
| 90 | + unusedresult.Analyzer, |
| 91 | + unusedwrite.Analyzer, |
| 92 | + usesgenerics.Analyzer, |
| 93 | + } |
| 94 | +} |
| 95 | + |
| 96 | +func staticcheckAnalyzers(checks []string) []*analysis.Analyzer { |
| 97 | + var analyzers []*analysis.Analyzer |
| 98 | + |
| 99 | + checkMap := make(map[string]bool) |
| 100 | + for _, check := range checks { |
| 101 | + checkMap[check] = true |
| 102 | + } |
| 103 | + |
| 104 | + for _, analyzer := range staticcheck.Analyzers { |
| 105 | + if analyzer.Analyzer.Name[:2] == "SA" { |
| 106 | + analyzers = append(analyzers, analyzer.Analyzer) |
| 107 | + } |
| 108 | + |
| 109 | + if checkMap[analyzer.Analyzer.Name] { |
| 110 | + analyzers = append(analyzers, analyzer.Analyzer) |
| 111 | + } |
| 112 | + } |
| 113 | + |
| 114 | + return analyzers |
| 115 | +} |
| 116 | + |
| 117 | +func vendorAnalyzers() []*analysis.Analyzer { |
| 118 | + var analyzers []*analysis.Analyzer |
| 119 | + |
| 120 | + // TODO: Update Go version |
| 121 | + // linters, err := loader.LoadAnalyzers([]string{"--include=G101,G201,G301"}) |
| 122 | + // if err != nil { |
| 123 | + // panic(err) |
| 124 | + // } |
| 125 | + // Checks the code for vulnerabilities |
| 126 | + // analyzers = append(analyzers, linters...) |
| 127 | + |
| 128 | + // Checks that all returned errors are handled |
| 129 | + analyzers = append(analyzers, errcheck.Analyzer) |
| 130 | + |
| 131 | + return analyzers |
| 132 | +} |
| 133 | + |
| 134 | +func customAnalyzers() []*analysis.Analyzer { |
| 135 | + var analyzers []*analysis.Analyzer |
| 136 | + |
| 137 | + analyzers = append(analyzers, custom.NewNoOsExitInMain()) |
| 138 | + |
| 139 | + return analyzers |
| 140 | +} |
0 commit comments