fix: resolve all golangci-lint errors
Some checks failed
CI/CD / Test (push) Successful in 29s
CI/CD / Lint (push) Successful in 39s
CI/CD / Generate SBOM (push) Successful in 16s
CI/CD / Build (darwin-amd64) (push) Successful in 21s
CI/CD / Build (linux-amd64) (push) Successful in 20s
CI/CD / Build (darwin-arm64) (push) Successful in 21s
CI/CD / Build (linux-arm64) (push) Successful in 21s
CI/CD / Build & Push Docker Image (push) Failing after 4s
CI/CD / Release (push) Has been skipped
Some checks failed
CI/CD / Test (push) Successful in 29s
CI/CD / Lint (push) Successful in 39s
CI/CD / Generate SBOM (push) Successful in 16s
CI/CD / Build (darwin-amd64) (push) Successful in 21s
CI/CD / Build (linux-amd64) (push) Successful in 20s
CI/CD / Build (darwin-arm64) (push) Successful in 21s
CI/CD / Build (linux-arm64) (push) Successful in 21s
CI/CD / Build & Push Docker Image (push) Failing after 4s
CI/CD / Release (push) Has been skipped
- Add error checks for w.Write, json.Encode, os.MkdirAll, os.WriteFile, file.Seek
- Fix gosimple S1000: use for range instead of for { select {} }
- Fix ineffectual assignments in adaptive_io.go
- Add nolint directives for unused code intended for future use
- Fix SA1029: use custom contextKey type instead of string
- Fix SA9003: remove empty branch in client_network_handler.go
- All linting checks now pass
This commit is contained in:
@@ -498,6 +498,7 @@ func validateCrossSection(c *Config, result *ConfigValidationResult) {
|
||||
// Enhanced Security Validation Functions
|
||||
|
||||
// checkSecretStrength analyzes the strength of secrets/passwords
|
||||
// nolint:unused
|
||||
func checkSecretStrength(secret string) (score int, issues []string) {
|
||||
if len(secret) == 0 {
|
||||
return 0, []string{"secret is empty"}
|
||||
@@ -586,6 +587,7 @@ func checkSecretStrength(secret string) (score int, issues []string) {
|
||||
}
|
||||
|
||||
// hasRepeatedChars checks if a string has excessive repeated characters
|
||||
// nolint:unused
|
||||
func hasRepeatedChars(s string) bool {
|
||||
if len(s) < 4 {
|
||||
return false
|
||||
@@ -601,6 +603,7 @@ func hasRepeatedChars(s string) bool {
|
||||
}
|
||||
|
||||
// isDefaultOrExampleSecret checks if a secret appears to be a default/example value
|
||||
// nolint:unused
|
||||
func isDefaultOrExampleSecret(secret string) bool {
|
||||
defaultSecrets := []string{
|
||||
"your-secret-key-here",
|
||||
@@ -642,6 +645,7 @@ func isDefaultOrExampleSecret(secret string) bool {
|
||||
}
|
||||
|
||||
// calculateEntropy calculates the Shannon entropy of a string
|
||||
// nolint:unused
|
||||
func calculateEntropy(s string) float64 {
|
||||
if len(s) == 0 {
|
||||
return 0
|
||||
@@ -668,6 +672,7 @@ func calculateEntropy(s string) float64 {
|
||||
}
|
||||
|
||||
// validateSecretSecurity performs comprehensive secret security validation
|
||||
// nolint:unused
|
||||
func validateSecretSecurity(fieldName, secret string, result *ConfigValidationResult) {
|
||||
if secret == "" {
|
||||
return // Already handled by other validators
|
||||
|
||||
Reference in New Issue
Block a user