mirror of
https://github.com/securego/gosec.git
synced 2024-12-24 11:35:52 +00:00
Fix no-sec alternative tag (#962)
The no-sec alternative tag prepends now automatically the # symbol Signed-off-by: Cosmin Cojocar <gcojocar@adobe.com>
This commit is contained in:
parent
87cc45e1cd
commit
9120883a15
3 changed files with 10 additions and 3 deletions
|
@ -449,10 +449,12 @@ func (gosec *Analyzer) ignore(n ast.Node) map[string]issue.SuppressionInfo {
|
||||||
if groups, ok := gosec.context.Comments[n]; ok && !gosec.ignoreNosec {
|
if groups, ok := gosec.context.Comments[n]; ok && !gosec.ignoreNosec {
|
||||||
|
|
||||||
// Checks if an alternative for #nosec is set and, if not, uses the default.
|
// Checks if an alternative for #nosec is set and, if not, uses the default.
|
||||||
noSecDefaultTag := "#nosec"
|
noSecDefaultTag := NoSecTag(string(Nosec))
|
||||||
noSecAlternativeTag, err := gosec.config.GetGlobal(NoSecAlternative)
|
noSecAlternativeTag, err := gosec.config.GetGlobal(NoSecAlternative)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
noSecAlternativeTag = noSecDefaultTag
|
noSecAlternativeTag = noSecDefaultTag
|
||||||
|
} else {
|
||||||
|
noSecAlternativeTag = NoSecTag(noSecAlternativeTag)
|
||||||
}
|
}
|
||||||
|
|
||||||
for _, group := range groups {
|
for _, group := range groups {
|
||||||
|
|
|
@ -407,7 +407,7 @@ var _ = Describe("Analyzer", func() {
|
||||||
|
|
||||||
// overwrite nosec option
|
// overwrite nosec option
|
||||||
nosecIgnoreConfig := gosec.NewConfig()
|
nosecIgnoreConfig := gosec.NewConfig()
|
||||||
nosecIgnoreConfig.SetGlobal(gosec.NoSecAlternative, "#falsePositive")
|
nosecIgnoreConfig.SetGlobal(gosec.NoSecAlternative, "falsePositive")
|
||||||
customAnalyzer := gosec.NewAnalyzer(nosecIgnoreConfig, tests, false, false, 1, logger)
|
customAnalyzer := gosec.NewAnalyzer(nosecIgnoreConfig, tests, false, false, 1, logger)
|
||||||
customAnalyzer.LoadRules(rules.Generate(false, rules.NewRuleFilter(false, "G401")).RulesInfo())
|
customAnalyzer.LoadRules(rules.Generate(false, rules.NewRuleFilter(false, "G401")).RulesInfo())
|
||||||
|
|
||||||
|
@ -430,7 +430,7 @@ var _ = Describe("Analyzer", func() {
|
||||||
|
|
||||||
// overwrite nosec option
|
// overwrite nosec option
|
||||||
nosecIgnoreConfig := gosec.NewConfig()
|
nosecIgnoreConfig := gosec.NewConfig()
|
||||||
nosecIgnoreConfig.SetGlobal(gosec.NoSecAlternative, "#falsePositive")
|
nosecIgnoreConfig.SetGlobal(gosec.NoSecAlternative, "falsePositive")
|
||||||
customAnalyzer := gosec.NewAnalyzer(nosecIgnoreConfig, tests, false, false, 1, logger)
|
customAnalyzer := gosec.NewAnalyzer(nosecIgnoreConfig, tests, false, false, 1, logger)
|
||||||
customAnalyzer.LoadRules(rules.Generate(false, rules.NewRuleFilter(false, "G401")).RulesInfo())
|
customAnalyzer.LoadRules(rules.Generate(false, rules.NewRuleFilter(false, "G401")).RulesInfo())
|
||||||
|
|
||||||
|
|
|
@ -33,6 +33,11 @@ const (
|
||||||
SSA GlobalOption = "ssa"
|
SSA GlobalOption = "ssa"
|
||||||
)
|
)
|
||||||
|
|
||||||
|
// NoSecTag returns the tag used to disable gosec for a line of code.
|
||||||
|
func NoSecTag(tag string) string {
|
||||||
|
return fmt.Sprintf("%s%s", "#", tag)
|
||||||
|
}
|
||||||
|
|
||||||
// Config is used to provide configuration and customization to each of the rules.
|
// Config is used to provide configuration and customization to each of the rules.
|
||||||
type Config map[string]interface{}
|
type Config map[string]interface{}
|
||||||
|
|
||||||
|
|
Loading…
Reference in a new issue