Table of Contents
False positives are inevitable, but we did our best to reduce their count.
If a false positive occurred, you have the several choices.
Specific Linter Excludes
Most of the linters has a configuration, sometimes false-positives can be related to a bad configuration of a linter. So it's recommended to check the linters configuration.
Otherwise, some linters have dedicated configuration to exclude or disable rules.
An example with staticcheck
:
linters:settings:staticcheck:checks:- all- '-SA1000' # disable the rule SA1000- '-SA1004' # disable the rule SA1004
Exclude
Exclude Issue by Text
You can use linters.exclusions.rules
config option for per-path or per-linter configuration.
In the following example, all the reports from the linters (linters
) that contains the text (text
) are excluded:
linters:exclusions:rules:- linters:- mndtext: "Magic number: 9"
In the following example, all the reports from the linters (linters
) that originated from the source (source
) are excluded:
linters:exclusions:rules:- linters:- lllsource: "^//go:generate "
In the following example, all the reports that contains the text (text
) in the path (path
) are excluded:
linters:exclusions:rules:- path: path/to/a/file.gotext: "string `example` has (\\d+) occurrences, make it a constant"
Exclude Issues by Path
Exclude issues in path by linters.exclusions.paths
or linters.exclusions.rules
config options.
In the following example, all the reports from the linters (linters
) that concerns the path (path
) are excluded:
linters:exclusions:rules:- path: '(.+)_test\.go'linters:- funlen- goconst
The opposite, excluding reports except for specific paths, is also possible. In the following example, only test files get checked:
linters:exclusions:rules:- path-except: '(.+)_test\.go'linters:- funlen- goconst
In the following example, all the reports related to the files (paths
) are excluded:
linters:exclusions:paths:- path/to/a/file.go
In the following example, all the reports related to the directories (paths
) are excluded:
linters:exclusions:paths:- path/to/a/dir/
Nolint Directive
To exclude issues from all linters use //nolint:all
.
For example, if it's used inline (not from the beginning of the line) it excludes issues only for this line.
var bad_name int //nolint:all
To exclude issues from specific linters only:
var bad_name int //nolint:wsl,unused
To exclude issues for the block of code use this directive on the beginning of a line:
//nolint:allfunc allIssuesInThisFunctionAreExcluded() *string {// ...}//nolint:govetvar (a intb int)
Also, you can exclude all issues in a file by:
//nolint:unparampackage pkg
You may add a comment explaining or justifying why //nolint
is being used on the same line as the flag itself:
//nolint:gocyclo // This legacy function is complex but the team too busy to simplify itfunc someLegacyFunction() *string {// ...}
You can see more examples of using //nolint
in our tests for it.
Use //nolint
instead of // nolint
because machine-readable comments should have no space by Go convention.
Exclusion Presets
Some exclusions are considered common. To help golangci-lint users those common exclusions are provided through presets.
Preset comments
Linter | Issue Text |
---|---|
staticcheck | (ST1000|ST1020|ST1021|ST1022) |
revive | exported (.+) should have comment( \(or a comment on this block\))? or be unexported |
revive | package comment should be of the form "(.+)..." |
revive | comment on exported (.+) should be of the form "(.+)..." |
revive | should have a package comment |
Preset common-false-positives
Linter | Issue Text |
---|---|
gosec | G103: Use of unsafe calls should be audited |
gosec | G204: Subprocess launched with variable |
gosec | G304: Potential file inclusion via variable |
Preset legacy
Linter | Issue Text |
---|---|
govet | (possible misuse of unsafe.Pointer|should have signature) |
staticcheck | SA4011 |
gosec | G104 |
gosec | (G301|G302|G307): Expect (directory permissions to be 0750|file permissions to be 0600) or less |
Preset std-error-handling
Linter | Issue Text |
---|---|
errcheck | (?i)Error return value of .((os\.)?std(out|err)\..*|.*Close|.*Flush|os\.Remove(All)?|.*print(f|ln)?|os\.(Un)?Setenv). is not checked |