From 95ec1245bfec1bf6ae9699a0f6ee3f9b6bd8273f Mon Sep 17 00:00:00 2001 From: Ricky Stewart Date: Wed, 24 Nov 2021 14:53:45 -0600 Subject: [PATCH] bazel: perform staticcheck checks in `nogo` Add a new binary `generate-staticcheck`, part of `dev generate bazel`, that creates a package in `build/bazelutil/staticcheckanalyzers` capturing a single `staticcheck` check. Then we capture the list of analyzers in `build/bazelutil/staticcheckanalyzers/def.bzl` and add all those checks to `nogo`. However, we can't directly use the `Analyzer`s provided by the upstream library, because they report *all* violations regardless of `lint:ignore` directives. In order to address this we add a helper library at `pkg/testutils/lint/passes/staticcheck` that munges the `Analyzer`s to additionally pull the `lint:ignore` directives and ignore any reported diagnostics that correspond to a `lint:ignore`. This follows the example set by https://github.com/sluongng/staticcheck-codegen, but we don't directly use that code, since we need to inject our own stuff and we want to make sure the content here is pinned to the right version of `staticcheck`. We run the `staticcheck` and `simple` [checks](https://staticcheck.io/docs/checks). `stylecheck` is still broken: #73568 Closes #68496. Release note: None --- .github/CODEOWNERS | 1 + BUILD.bazel | 3 +- build/bazelutil/bazel-generate.sh | 1 + build/bazelutil/nogo_config.json | 1313 +++++++++++++++++ .../staticcheckanalyzers/BUILD.bazel | 1 + .../bazelutil/staticcheckanalyzers/README.md | 1 + build/bazelutil/staticcheckanalyzers/def.bzl | 123 ++ .../staticcheckanalyzers/s1000/BUILD.bazel | 13 + .../staticcheckanalyzers/s1000/analyzer.go | 24 + .../staticcheckanalyzers/s1001/BUILD.bazel | 13 + .../staticcheckanalyzers/s1001/analyzer.go | 24 + .../staticcheckanalyzers/s1002/BUILD.bazel | 13 + .../staticcheckanalyzers/s1002/analyzer.go | 24 + .../staticcheckanalyzers/s1003/BUILD.bazel | 13 + .../staticcheckanalyzers/s1003/analyzer.go | 24 + .../staticcheckanalyzers/s1004/BUILD.bazel | 13 + .../staticcheckanalyzers/s1004/analyzer.go | 24 + .../staticcheckanalyzers/s1005/BUILD.bazel | 13 + .../staticcheckanalyzers/s1005/analyzer.go | 24 + .../staticcheckanalyzers/s1006/BUILD.bazel | 13 + .../staticcheckanalyzers/s1006/analyzer.go | 24 + .../staticcheckanalyzers/s1007/BUILD.bazel | 13 + .../staticcheckanalyzers/s1007/analyzer.go | 24 + .../staticcheckanalyzers/s1008/BUILD.bazel | 13 + .../staticcheckanalyzers/s1008/analyzer.go | 24 + .../staticcheckanalyzers/s1009/BUILD.bazel | 13 + .../staticcheckanalyzers/s1009/analyzer.go | 24 + .../staticcheckanalyzers/s1010/BUILD.bazel | 13 + .../staticcheckanalyzers/s1010/analyzer.go | 24 + .../staticcheckanalyzers/s1011/BUILD.bazel | 13 + .../staticcheckanalyzers/s1011/analyzer.go | 24 + .../staticcheckanalyzers/s1012/BUILD.bazel | 13 + .../staticcheckanalyzers/s1012/analyzer.go | 24 + .../staticcheckanalyzers/s1016/BUILD.bazel | 13 + .../staticcheckanalyzers/s1016/analyzer.go | 24 + .../staticcheckanalyzers/s1017/BUILD.bazel | 13 + .../staticcheckanalyzers/s1017/analyzer.go | 24 + .../staticcheckanalyzers/s1018/BUILD.bazel | 13 + .../staticcheckanalyzers/s1018/analyzer.go | 24 + .../staticcheckanalyzers/s1019/BUILD.bazel | 13 + .../staticcheckanalyzers/s1019/analyzer.go | 24 + .../staticcheckanalyzers/s1020/BUILD.bazel | 13 + .../staticcheckanalyzers/s1020/analyzer.go | 24 + .../staticcheckanalyzers/s1021/BUILD.bazel | 13 + .../staticcheckanalyzers/s1021/analyzer.go | 24 + .../staticcheckanalyzers/s1023/BUILD.bazel | 13 + .../staticcheckanalyzers/s1023/analyzer.go | 24 + .../staticcheckanalyzers/s1024/BUILD.bazel | 13 + .../staticcheckanalyzers/s1024/analyzer.go | 24 + .../staticcheckanalyzers/s1025/BUILD.bazel | 13 + .../staticcheckanalyzers/s1025/analyzer.go | 24 + .../staticcheckanalyzers/s1028/BUILD.bazel | 13 + .../staticcheckanalyzers/s1028/analyzer.go | 24 + .../staticcheckanalyzers/s1029/BUILD.bazel | 13 + .../staticcheckanalyzers/s1029/analyzer.go | 24 + .../staticcheckanalyzers/s1030/BUILD.bazel | 13 + .../staticcheckanalyzers/s1030/analyzer.go | 24 + .../staticcheckanalyzers/s1031/BUILD.bazel | 13 + .../staticcheckanalyzers/s1031/analyzer.go | 24 + .../staticcheckanalyzers/s1032/BUILD.bazel | 13 + .../staticcheckanalyzers/s1032/analyzer.go | 24 + .../staticcheckanalyzers/s1033/BUILD.bazel | 13 + .../staticcheckanalyzers/s1033/analyzer.go | 24 + .../staticcheckanalyzers/s1034/BUILD.bazel | 13 + .../staticcheckanalyzers/s1034/analyzer.go | 24 + .../staticcheckanalyzers/s1035/BUILD.bazel | 13 + .../staticcheckanalyzers/s1035/analyzer.go | 24 + .../staticcheckanalyzers/s1036/BUILD.bazel | 13 + .../staticcheckanalyzers/s1036/analyzer.go | 24 + .../staticcheckanalyzers/s1037/BUILD.bazel | 13 + .../staticcheckanalyzers/s1037/analyzer.go | 24 + .../staticcheckanalyzers/s1038/BUILD.bazel | 13 + .../staticcheckanalyzers/s1038/analyzer.go | 24 + .../staticcheckanalyzers/s1039/BUILD.bazel | 13 + .../staticcheckanalyzers/s1039/analyzer.go | 24 + .../staticcheckanalyzers/s1040/BUILD.bazel | 13 + .../staticcheckanalyzers/s1040/analyzer.go | 24 + .../staticcheckanalyzers/sa1000/BUILD.bazel | 13 + .../staticcheckanalyzers/sa1000/analyzer.go | 24 + .../staticcheckanalyzers/sa1001/BUILD.bazel | 13 + .../staticcheckanalyzers/sa1001/analyzer.go | 24 + .../staticcheckanalyzers/sa1002/BUILD.bazel | 13 + .../staticcheckanalyzers/sa1002/analyzer.go | 24 + .../staticcheckanalyzers/sa1003/BUILD.bazel | 13 + .../staticcheckanalyzers/sa1003/analyzer.go | 24 + .../staticcheckanalyzers/sa1004/BUILD.bazel | 13 + .../staticcheckanalyzers/sa1004/analyzer.go | 24 + .../staticcheckanalyzers/sa1005/BUILD.bazel | 13 + .../staticcheckanalyzers/sa1005/analyzer.go | 24 + .../staticcheckanalyzers/sa1006/BUILD.bazel | 13 + .../staticcheckanalyzers/sa1006/analyzer.go | 24 + .../staticcheckanalyzers/sa1007/BUILD.bazel | 13 + .../staticcheckanalyzers/sa1007/analyzer.go | 24 + .../staticcheckanalyzers/sa1008/BUILD.bazel | 13 + .../staticcheckanalyzers/sa1008/analyzer.go | 24 + .../staticcheckanalyzers/sa1010/BUILD.bazel | 13 + .../staticcheckanalyzers/sa1010/analyzer.go | 24 + .../staticcheckanalyzers/sa1011/BUILD.bazel | 13 + .../staticcheckanalyzers/sa1011/analyzer.go | 24 + .../staticcheckanalyzers/sa1012/BUILD.bazel | 13 + .../staticcheckanalyzers/sa1012/analyzer.go | 24 + .../staticcheckanalyzers/sa1013/BUILD.bazel | 13 + .../staticcheckanalyzers/sa1013/analyzer.go | 24 + .../staticcheckanalyzers/sa1014/BUILD.bazel | 13 + .../staticcheckanalyzers/sa1014/analyzer.go | 24 + .../staticcheckanalyzers/sa1015/BUILD.bazel | 13 + .../staticcheckanalyzers/sa1015/analyzer.go | 24 + .../staticcheckanalyzers/sa1016/BUILD.bazel | 13 + .../staticcheckanalyzers/sa1016/analyzer.go | 24 + .../staticcheckanalyzers/sa1017/BUILD.bazel | 13 + .../staticcheckanalyzers/sa1017/analyzer.go | 24 + .../staticcheckanalyzers/sa1018/BUILD.bazel | 13 + .../staticcheckanalyzers/sa1018/analyzer.go | 24 + .../staticcheckanalyzers/sa1019/BUILD.bazel | 13 + .../staticcheckanalyzers/sa1019/analyzer.go | 24 + .../staticcheckanalyzers/sa1020/BUILD.bazel | 13 + .../staticcheckanalyzers/sa1020/analyzer.go | 24 + .../staticcheckanalyzers/sa1021/BUILD.bazel | 13 + .../staticcheckanalyzers/sa1021/analyzer.go | 24 + .../staticcheckanalyzers/sa1023/BUILD.bazel | 13 + .../staticcheckanalyzers/sa1023/analyzer.go | 24 + .../staticcheckanalyzers/sa1024/BUILD.bazel | 13 + .../staticcheckanalyzers/sa1024/analyzer.go | 24 + .../staticcheckanalyzers/sa1025/BUILD.bazel | 13 + .../staticcheckanalyzers/sa1025/analyzer.go | 24 + .../staticcheckanalyzers/sa1026/BUILD.bazel | 13 + .../staticcheckanalyzers/sa1026/analyzer.go | 24 + .../staticcheckanalyzers/sa1027/BUILD.bazel | 13 + .../staticcheckanalyzers/sa1027/analyzer.go | 24 + .../staticcheckanalyzers/sa1028/BUILD.bazel | 13 + .../staticcheckanalyzers/sa1028/analyzer.go | 24 + .../staticcheckanalyzers/sa1029/BUILD.bazel | 13 + .../staticcheckanalyzers/sa1029/analyzer.go | 24 + .../staticcheckanalyzers/sa1030/BUILD.bazel | 13 + .../staticcheckanalyzers/sa1030/analyzer.go | 24 + .../staticcheckanalyzers/sa2000/BUILD.bazel | 13 + .../staticcheckanalyzers/sa2000/analyzer.go | 24 + .../staticcheckanalyzers/sa2001/BUILD.bazel | 13 + .../staticcheckanalyzers/sa2001/analyzer.go | 24 + .../staticcheckanalyzers/sa2002/BUILD.bazel | 13 + .../staticcheckanalyzers/sa2002/analyzer.go | 24 + .../staticcheckanalyzers/sa2003/BUILD.bazel | 13 + .../staticcheckanalyzers/sa2003/analyzer.go | 24 + .../staticcheckanalyzers/sa3000/BUILD.bazel | 13 + .../staticcheckanalyzers/sa3000/analyzer.go | 24 + .../staticcheckanalyzers/sa3001/BUILD.bazel | 13 + .../staticcheckanalyzers/sa3001/analyzer.go | 24 + .../staticcheckanalyzers/sa4000/BUILD.bazel | 13 + .../staticcheckanalyzers/sa4000/analyzer.go | 24 + .../staticcheckanalyzers/sa4001/BUILD.bazel | 13 + .../staticcheckanalyzers/sa4001/analyzer.go | 24 + .../staticcheckanalyzers/sa4003/BUILD.bazel | 13 + .../staticcheckanalyzers/sa4003/analyzer.go | 24 + .../staticcheckanalyzers/sa4004/BUILD.bazel | 13 + .../staticcheckanalyzers/sa4004/analyzer.go | 24 + .../staticcheckanalyzers/sa4005/BUILD.bazel | 13 + .../staticcheckanalyzers/sa4005/analyzer.go | 24 + .../staticcheckanalyzers/sa4006/BUILD.bazel | 13 + .../staticcheckanalyzers/sa4006/analyzer.go | 24 + .../staticcheckanalyzers/sa4008/BUILD.bazel | 13 + .../staticcheckanalyzers/sa4008/analyzer.go | 24 + .../staticcheckanalyzers/sa4009/BUILD.bazel | 13 + .../staticcheckanalyzers/sa4009/analyzer.go | 24 + .../staticcheckanalyzers/sa4010/BUILD.bazel | 13 + .../staticcheckanalyzers/sa4010/analyzer.go | 24 + .../staticcheckanalyzers/sa4011/BUILD.bazel | 13 + .../staticcheckanalyzers/sa4011/analyzer.go | 24 + .../staticcheckanalyzers/sa4012/BUILD.bazel | 13 + .../staticcheckanalyzers/sa4012/analyzer.go | 24 + .../staticcheckanalyzers/sa4013/BUILD.bazel | 13 + .../staticcheckanalyzers/sa4013/analyzer.go | 24 + .../staticcheckanalyzers/sa4014/BUILD.bazel | 13 + .../staticcheckanalyzers/sa4014/analyzer.go | 24 + .../staticcheckanalyzers/sa4015/BUILD.bazel | 13 + .../staticcheckanalyzers/sa4015/analyzer.go | 24 + .../staticcheckanalyzers/sa4016/BUILD.bazel | 13 + .../staticcheckanalyzers/sa4016/analyzer.go | 24 + .../staticcheckanalyzers/sa4017/BUILD.bazel | 13 + .../staticcheckanalyzers/sa4017/analyzer.go | 24 + .../staticcheckanalyzers/sa4018/BUILD.bazel | 13 + .../staticcheckanalyzers/sa4018/analyzer.go | 24 + .../staticcheckanalyzers/sa4019/BUILD.bazel | 13 + .../staticcheckanalyzers/sa4019/analyzer.go | 24 + .../staticcheckanalyzers/sa4020/BUILD.bazel | 13 + .../staticcheckanalyzers/sa4020/analyzer.go | 24 + .../staticcheckanalyzers/sa4021/BUILD.bazel | 13 + .../staticcheckanalyzers/sa4021/analyzer.go | 24 + .../staticcheckanalyzers/sa4022/BUILD.bazel | 13 + .../staticcheckanalyzers/sa4022/analyzer.go | 24 + .../staticcheckanalyzers/sa4023/BUILD.bazel | 13 + .../staticcheckanalyzers/sa4023/analyzer.go | 24 + .../staticcheckanalyzers/sa4024/BUILD.bazel | 13 + .../staticcheckanalyzers/sa4024/analyzer.go | 24 + .../staticcheckanalyzers/sa4025/BUILD.bazel | 13 + .../staticcheckanalyzers/sa4025/analyzer.go | 24 + .../staticcheckanalyzers/sa4026/BUILD.bazel | 13 + .../staticcheckanalyzers/sa4026/analyzer.go | 24 + .../staticcheckanalyzers/sa4027/BUILD.bazel | 13 + .../staticcheckanalyzers/sa4027/analyzer.go | 24 + .../staticcheckanalyzers/sa5000/BUILD.bazel | 13 + .../staticcheckanalyzers/sa5000/analyzer.go | 24 + .../staticcheckanalyzers/sa5001/BUILD.bazel | 13 + .../staticcheckanalyzers/sa5001/analyzer.go | 24 + .../staticcheckanalyzers/sa5002/BUILD.bazel | 13 + .../staticcheckanalyzers/sa5002/analyzer.go | 24 + .../staticcheckanalyzers/sa5003/BUILD.bazel | 13 + .../staticcheckanalyzers/sa5003/analyzer.go | 24 + .../staticcheckanalyzers/sa5004/BUILD.bazel | 13 + .../staticcheckanalyzers/sa5004/analyzer.go | 24 + .../staticcheckanalyzers/sa5005/BUILD.bazel | 13 + .../staticcheckanalyzers/sa5005/analyzer.go | 24 + .../staticcheckanalyzers/sa5007/BUILD.bazel | 13 + .../staticcheckanalyzers/sa5007/analyzer.go | 24 + .../staticcheckanalyzers/sa5008/BUILD.bazel | 13 + .../staticcheckanalyzers/sa5008/analyzer.go | 24 + .../staticcheckanalyzers/sa5009/BUILD.bazel | 13 + .../staticcheckanalyzers/sa5009/analyzer.go | 24 + .../staticcheckanalyzers/sa5010/BUILD.bazel | 13 + .../staticcheckanalyzers/sa5010/analyzer.go | 24 + .../staticcheckanalyzers/sa5011/BUILD.bazel | 13 + .../staticcheckanalyzers/sa5011/analyzer.go | 24 + .../staticcheckanalyzers/sa5012/BUILD.bazel | 13 + .../staticcheckanalyzers/sa5012/analyzer.go | 24 + .../staticcheckanalyzers/sa6000/BUILD.bazel | 13 + .../staticcheckanalyzers/sa6000/analyzer.go | 24 + .../staticcheckanalyzers/sa6001/BUILD.bazel | 13 + .../staticcheckanalyzers/sa6001/analyzer.go | 24 + .../staticcheckanalyzers/sa6002/BUILD.bazel | 13 + .../staticcheckanalyzers/sa6002/analyzer.go | 24 + .../staticcheckanalyzers/sa6003/BUILD.bazel | 13 + .../staticcheckanalyzers/sa6003/analyzer.go | 24 + .../staticcheckanalyzers/sa6005/BUILD.bazel | 13 + .../staticcheckanalyzers/sa6005/analyzer.go | 24 + .../staticcheckanalyzers/sa9001/BUILD.bazel | 13 + .../staticcheckanalyzers/sa9001/analyzer.go | 24 + .../staticcheckanalyzers/sa9002/BUILD.bazel | 13 + .../staticcheckanalyzers/sa9002/analyzer.go | 24 + .../staticcheckanalyzers/sa9003/BUILD.bazel | 13 + .../staticcheckanalyzers/sa9003/analyzer.go | 24 + .../staticcheckanalyzers/sa9004/BUILD.bazel | 13 + .../staticcheckanalyzers/sa9004/analyzer.go | 24 + .../staticcheckanalyzers/sa9005/BUILD.bazel | 13 + .../staticcheckanalyzers/sa9005/analyzer.go | 24 + .../staticcheckanalyzers/sa9006/BUILD.bazel | 13 + .../staticcheckanalyzers/sa9006/analyzer.go | 24 + pkg/cmd/dev/build.go | 1 + pkg/cmd/generate-staticcheck/BUILD.bazel | 19 + pkg/cmd/generate-staticcheck/main.go | 129 ++ pkg/testutils/lint/lint_test.go | 4 +- .../lint/passes/staticcheck/BUILD.bazel | 14 + .../lint/passes/staticcheck/staticcheck.go | 73 + pkg/util/log/stderr_redirect_windows.go | 5 +- 252 files changed, 6085 insertions(+), 6 deletions(-) create mode 100644 build/bazelutil/staticcheckanalyzers/BUILD.bazel create mode 100644 build/bazelutil/staticcheckanalyzers/README.md create mode 100644 build/bazelutil/staticcheckanalyzers/def.bzl create mode 100644 build/bazelutil/staticcheckanalyzers/s1000/BUILD.bazel create mode 100644 build/bazelutil/staticcheckanalyzers/s1000/analyzer.go create mode 100644 build/bazelutil/staticcheckanalyzers/s1001/BUILD.bazel create mode 100644 build/bazelutil/staticcheckanalyzers/s1001/analyzer.go create mode 100644 build/bazelutil/staticcheckanalyzers/s1002/BUILD.bazel create mode 100644 build/bazelutil/staticcheckanalyzers/s1002/analyzer.go create mode 100644 build/bazelutil/staticcheckanalyzers/s1003/BUILD.bazel create mode 100644 build/bazelutil/staticcheckanalyzers/s1003/analyzer.go create mode 100644 build/bazelutil/staticcheckanalyzers/s1004/BUILD.bazel create mode 100644 build/bazelutil/staticcheckanalyzers/s1004/analyzer.go create mode 100644 build/bazelutil/staticcheckanalyzers/s1005/BUILD.bazel create mode 100644 build/bazelutil/staticcheckanalyzers/s1005/analyzer.go create mode 100644 build/bazelutil/staticcheckanalyzers/s1006/BUILD.bazel create mode 100644 build/bazelutil/staticcheckanalyzers/s1006/analyzer.go create mode 100644 build/bazelutil/staticcheckanalyzers/s1007/BUILD.bazel create mode 100644 build/bazelutil/staticcheckanalyzers/s1007/analyzer.go create mode 100644 build/bazelutil/staticcheckanalyzers/s1008/BUILD.bazel create mode 100644 build/bazelutil/staticcheckanalyzers/s1008/analyzer.go create mode 100644 build/bazelutil/staticcheckanalyzers/s1009/BUILD.bazel create mode 100644 build/bazelutil/staticcheckanalyzers/s1009/analyzer.go create mode 100644 build/bazelutil/staticcheckanalyzers/s1010/BUILD.bazel create mode 100644 build/bazelutil/staticcheckanalyzers/s1010/analyzer.go create mode 100644 build/bazelutil/staticcheckanalyzers/s1011/BUILD.bazel create mode 100644 build/bazelutil/staticcheckanalyzers/s1011/analyzer.go create mode 100644 build/bazelutil/staticcheckanalyzers/s1012/BUILD.bazel create mode 100644 build/bazelutil/staticcheckanalyzers/s1012/analyzer.go create mode 100644 build/bazelutil/staticcheckanalyzers/s1016/BUILD.bazel create mode 100644 build/bazelutil/staticcheckanalyzers/s1016/analyzer.go create mode 100644 build/bazelutil/staticcheckanalyzers/s1017/BUILD.bazel create mode 100644 build/bazelutil/staticcheckanalyzers/s1017/analyzer.go create mode 100644 build/bazelutil/staticcheckanalyzers/s1018/BUILD.bazel create mode 100644 build/bazelutil/staticcheckanalyzers/s1018/analyzer.go create mode 100644 build/bazelutil/staticcheckanalyzers/s1019/BUILD.bazel create mode 100644 build/bazelutil/staticcheckanalyzers/s1019/analyzer.go create mode 100644 build/bazelutil/staticcheckanalyzers/s1020/BUILD.bazel create mode 100644 build/bazelutil/staticcheckanalyzers/s1020/analyzer.go create mode 100644 build/bazelutil/staticcheckanalyzers/s1021/BUILD.bazel create mode 100644 build/bazelutil/staticcheckanalyzers/s1021/analyzer.go create mode 100644 build/bazelutil/staticcheckanalyzers/s1023/BUILD.bazel create mode 100644 build/bazelutil/staticcheckanalyzers/s1023/analyzer.go create mode 100644 build/bazelutil/staticcheckanalyzers/s1024/BUILD.bazel create mode 100644 build/bazelutil/staticcheckanalyzers/s1024/analyzer.go create mode 100644 build/bazelutil/staticcheckanalyzers/s1025/BUILD.bazel create mode 100644 build/bazelutil/staticcheckanalyzers/s1025/analyzer.go create mode 100644 build/bazelutil/staticcheckanalyzers/s1028/BUILD.bazel create mode 100644 build/bazelutil/staticcheckanalyzers/s1028/analyzer.go create mode 100644 build/bazelutil/staticcheckanalyzers/s1029/BUILD.bazel create mode 100644 build/bazelutil/staticcheckanalyzers/s1029/analyzer.go create mode 100644 build/bazelutil/staticcheckanalyzers/s1030/BUILD.bazel create mode 100644 build/bazelutil/staticcheckanalyzers/s1030/analyzer.go create mode 100644 build/bazelutil/staticcheckanalyzers/s1031/BUILD.bazel create mode 100644 build/bazelutil/staticcheckanalyzers/s1031/analyzer.go create mode 100644 build/bazelutil/staticcheckanalyzers/s1032/BUILD.bazel create mode 100644 build/bazelutil/staticcheckanalyzers/s1032/analyzer.go create mode 100644 build/bazelutil/staticcheckanalyzers/s1033/BUILD.bazel create mode 100644 build/bazelutil/staticcheckanalyzers/s1033/analyzer.go create mode 100644 build/bazelutil/staticcheckanalyzers/s1034/BUILD.bazel create mode 100644 build/bazelutil/staticcheckanalyzers/s1034/analyzer.go create mode 100644 build/bazelutil/staticcheckanalyzers/s1035/BUILD.bazel create mode 100644 build/bazelutil/staticcheckanalyzers/s1035/analyzer.go create mode 100644 build/bazelutil/staticcheckanalyzers/s1036/BUILD.bazel create mode 100644 build/bazelutil/staticcheckanalyzers/s1036/analyzer.go create mode 100644 build/bazelutil/staticcheckanalyzers/s1037/BUILD.bazel create mode 100644 build/bazelutil/staticcheckanalyzers/s1037/analyzer.go create mode 100644 build/bazelutil/staticcheckanalyzers/s1038/BUILD.bazel create mode 100644 build/bazelutil/staticcheckanalyzers/s1038/analyzer.go create mode 100644 build/bazelutil/staticcheckanalyzers/s1039/BUILD.bazel create mode 100644 build/bazelutil/staticcheckanalyzers/s1039/analyzer.go create mode 100644 build/bazelutil/staticcheckanalyzers/s1040/BUILD.bazel create mode 100644 build/bazelutil/staticcheckanalyzers/s1040/analyzer.go create mode 100644 build/bazelutil/staticcheckanalyzers/sa1000/BUILD.bazel create mode 100644 build/bazelutil/staticcheckanalyzers/sa1000/analyzer.go create mode 100644 build/bazelutil/staticcheckanalyzers/sa1001/BUILD.bazel create mode 100644 build/bazelutil/staticcheckanalyzers/sa1001/analyzer.go create mode 100644 build/bazelutil/staticcheckanalyzers/sa1002/BUILD.bazel create mode 100644 build/bazelutil/staticcheckanalyzers/sa1002/analyzer.go create mode 100644 build/bazelutil/staticcheckanalyzers/sa1003/BUILD.bazel create mode 100644 build/bazelutil/staticcheckanalyzers/sa1003/analyzer.go create mode 100644 build/bazelutil/staticcheckanalyzers/sa1004/BUILD.bazel create mode 100644 build/bazelutil/staticcheckanalyzers/sa1004/analyzer.go create mode 100644 build/bazelutil/staticcheckanalyzers/sa1005/BUILD.bazel create mode 100644 build/bazelutil/staticcheckanalyzers/sa1005/analyzer.go create mode 100644 build/bazelutil/staticcheckanalyzers/sa1006/BUILD.bazel create mode 100644 build/bazelutil/staticcheckanalyzers/sa1006/analyzer.go create mode 100644 build/bazelutil/staticcheckanalyzers/sa1007/BUILD.bazel create mode 100644 build/bazelutil/staticcheckanalyzers/sa1007/analyzer.go create mode 100644 build/bazelutil/staticcheckanalyzers/sa1008/BUILD.bazel create mode 100644 build/bazelutil/staticcheckanalyzers/sa1008/analyzer.go create mode 100644 build/bazelutil/staticcheckanalyzers/sa1010/BUILD.bazel create mode 100644 build/bazelutil/staticcheckanalyzers/sa1010/analyzer.go create mode 100644 build/bazelutil/staticcheckanalyzers/sa1011/BUILD.bazel create mode 100644 build/bazelutil/staticcheckanalyzers/sa1011/analyzer.go create mode 100644 build/bazelutil/staticcheckanalyzers/sa1012/BUILD.bazel create mode 100644 build/bazelutil/staticcheckanalyzers/sa1012/analyzer.go create mode 100644 build/bazelutil/staticcheckanalyzers/sa1013/BUILD.bazel create mode 100644 build/bazelutil/staticcheckanalyzers/sa1013/analyzer.go create mode 100644 build/bazelutil/staticcheckanalyzers/sa1014/BUILD.bazel create mode 100644 build/bazelutil/staticcheckanalyzers/sa1014/analyzer.go create mode 100644 build/bazelutil/staticcheckanalyzers/sa1015/BUILD.bazel create mode 100644 build/bazelutil/staticcheckanalyzers/sa1015/analyzer.go create mode 100644 build/bazelutil/staticcheckanalyzers/sa1016/BUILD.bazel create mode 100644 build/bazelutil/staticcheckanalyzers/sa1016/analyzer.go create mode 100644 build/bazelutil/staticcheckanalyzers/sa1017/BUILD.bazel create mode 100644 build/bazelutil/staticcheckanalyzers/sa1017/analyzer.go create mode 100644 build/bazelutil/staticcheckanalyzers/sa1018/BUILD.bazel create mode 100644 build/bazelutil/staticcheckanalyzers/sa1018/analyzer.go create mode 100644 build/bazelutil/staticcheckanalyzers/sa1019/BUILD.bazel create mode 100644 build/bazelutil/staticcheckanalyzers/sa1019/analyzer.go create mode 100644 build/bazelutil/staticcheckanalyzers/sa1020/BUILD.bazel create mode 100644 build/bazelutil/staticcheckanalyzers/sa1020/analyzer.go create mode 100644 build/bazelutil/staticcheckanalyzers/sa1021/BUILD.bazel create mode 100644 build/bazelutil/staticcheckanalyzers/sa1021/analyzer.go create mode 100644 build/bazelutil/staticcheckanalyzers/sa1023/BUILD.bazel create mode 100644 build/bazelutil/staticcheckanalyzers/sa1023/analyzer.go create mode 100644 build/bazelutil/staticcheckanalyzers/sa1024/BUILD.bazel create mode 100644 build/bazelutil/staticcheckanalyzers/sa1024/analyzer.go create mode 100644 build/bazelutil/staticcheckanalyzers/sa1025/BUILD.bazel create mode 100644 build/bazelutil/staticcheckanalyzers/sa1025/analyzer.go create mode 100644 build/bazelutil/staticcheckanalyzers/sa1026/BUILD.bazel create mode 100644 build/bazelutil/staticcheckanalyzers/sa1026/analyzer.go create mode 100644 build/bazelutil/staticcheckanalyzers/sa1027/BUILD.bazel create mode 100644 build/bazelutil/staticcheckanalyzers/sa1027/analyzer.go create mode 100644 build/bazelutil/staticcheckanalyzers/sa1028/BUILD.bazel create mode 100644 build/bazelutil/staticcheckanalyzers/sa1028/analyzer.go create mode 100644 build/bazelutil/staticcheckanalyzers/sa1029/BUILD.bazel create mode 100644 build/bazelutil/staticcheckanalyzers/sa1029/analyzer.go create mode 100644 build/bazelutil/staticcheckanalyzers/sa1030/BUILD.bazel create mode 100644 build/bazelutil/staticcheckanalyzers/sa1030/analyzer.go create mode 100644 build/bazelutil/staticcheckanalyzers/sa2000/BUILD.bazel create mode 100644 build/bazelutil/staticcheckanalyzers/sa2000/analyzer.go create mode 100644 build/bazelutil/staticcheckanalyzers/sa2001/BUILD.bazel create mode 100644 build/bazelutil/staticcheckanalyzers/sa2001/analyzer.go create mode 100644 build/bazelutil/staticcheckanalyzers/sa2002/BUILD.bazel create mode 100644 build/bazelutil/staticcheckanalyzers/sa2002/analyzer.go create mode 100644 build/bazelutil/staticcheckanalyzers/sa2003/BUILD.bazel create mode 100644 build/bazelutil/staticcheckanalyzers/sa2003/analyzer.go create mode 100644 build/bazelutil/staticcheckanalyzers/sa3000/BUILD.bazel create mode 100644 build/bazelutil/staticcheckanalyzers/sa3000/analyzer.go create mode 100644 build/bazelutil/staticcheckanalyzers/sa3001/BUILD.bazel create mode 100644 build/bazelutil/staticcheckanalyzers/sa3001/analyzer.go create mode 100644 build/bazelutil/staticcheckanalyzers/sa4000/BUILD.bazel create mode 100644 build/bazelutil/staticcheckanalyzers/sa4000/analyzer.go create mode 100644 build/bazelutil/staticcheckanalyzers/sa4001/BUILD.bazel create mode 100644 build/bazelutil/staticcheckanalyzers/sa4001/analyzer.go create mode 100644 build/bazelutil/staticcheckanalyzers/sa4003/BUILD.bazel create mode 100644 build/bazelutil/staticcheckanalyzers/sa4003/analyzer.go create mode 100644 build/bazelutil/staticcheckanalyzers/sa4004/BUILD.bazel create mode 100644 build/bazelutil/staticcheckanalyzers/sa4004/analyzer.go create mode 100644 build/bazelutil/staticcheckanalyzers/sa4005/BUILD.bazel create mode 100644 build/bazelutil/staticcheckanalyzers/sa4005/analyzer.go create mode 100644 build/bazelutil/staticcheckanalyzers/sa4006/BUILD.bazel create mode 100644 build/bazelutil/staticcheckanalyzers/sa4006/analyzer.go create mode 100644 build/bazelutil/staticcheckanalyzers/sa4008/BUILD.bazel create mode 100644 build/bazelutil/staticcheckanalyzers/sa4008/analyzer.go create mode 100644 build/bazelutil/staticcheckanalyzers/sa4009/BUILD.bazel create mode 100644 build/bazelutil/staticcheckanalyzers/sa4009/analyzer.go create mode 100644 build/bazelutil/staticcheckanalyzers/sa4010/BUILD.bazel create mode 100644 build/bazelutil/staticcheckanalyzers/sa4010/analyzer.go create mode 100644 build/bazelutil/staticcheckanalyzers/sa4011/BUILD.bazel create mode 100644 build/bazelutil/staticcheckanalyzers/sa4011/analyzer.go create mode 100644 build/bazelutil/staticcheckanalyzers/sa4012/BUILD.bazel create mode 100644 build/bazelutil/staticcheckanalyzers/sa4012/analyzer.go create mode 100644 build/bazelutil/staticcheckanalyzers/sa4013/BUILD.bazel create mode 100644 build/bazelutil/staticcheckanalyzers/sa4013/analyzer.go create mode 100644 build/bazelutil/staticcheckanalyzers/sa4014/BUILD.bazel create mode 100644 build/bazelutil/staticcheckanalyzers/sa4014/analyzer.go create mode 100644 build/bazelutil/staticcheckanalyzers/sa4015/BUILD.bazel create mode 100644 build/bazelutil/staticcheckanalyzers/sa4015/analyzer.go create mode 100644 build/bazelutil/staticcheckanalyzers/sa4016/BUILD.bazel create mode 100644 build/bazelutil/staticcheckanalyzers/sa4016/analyzer.go create mode 100644 build/bazelutil/staticcheckanalyzers/sa4017/BUILD.bazel create mode 100644 build/bazelutil/staticcheckanalyzers/sa4017/analyzer.go create mode 100644 build/bazelutil/staticcheckanalyzers/sa4018/BUILD.bazel create mode 100644 build/bazelutil/staticcheckanalyzers/sa4018/analyzer.go create mode 100644 build/bazelutil/staticcheckanalyzers/sa4019/BUILD.bazel create mode 100644 build/bazelutil/staticcheckanalyzers/sa4019/analyzer.go create mode 100644 build/bazelutil/staticcheckanalyzers/sa4020/BUILD.bazel create mode 100644 build/bazelutil/staticcheckanalyzers/sa4020/analyzer.go create mode 100644 build/bazelutil/staticcheckanalyzers/sa4021/BUILD.bazel create mode 100644 build/bazelutil/staticcheckanalyzers/sa4021/analyzer.go create mode 100644 build/bazelutil/staticcheckanalyzers/sa4022/BUILD.bazel create mode 100644 build/bazelutil/staticcheckanalyzers/sa4022/analyzer.go create mode 100644 build/bazelutil/staticcheckanalyzers/sa4023/BUILD.bazel create mode 100644 build/bazelutil/staticcheckanalyzers/sa4023/analyzer.go create mode 100644 build/bazelutil/staticcheckanalyzers/sa4024/BUILD.bazel create mode 100644 build/bazelutil/staticcheckanalyzers/sa4024/analyzer.go create mode 100644 build/bazelutil/staticcheckanalyzers/sa4025/BUILD.bazel create mode 100644 build/bazelutil/staticcheckanalyzers/sa4025/analyzer.go create mode 100644 build/bazelutil/staticcheckanalyzers/sa4026/BUILD.bazel create mode 100644 build/bazelutil/staticcheckanalyzers/sa4026/analyzer.go create mode 100644 build/bazelutil/staticcheckanalyzers/sa4027/BUILD.bazel create mode 100644 build/bazelutil/staticcheckanalyzers/sa4027/analyzer.go create mode 100644 build/bazelutil/staticcheckanalyzers/sa5000/BUILD.bazel create mode 100644 build/bazelutil/staticcheckanalyzers/sa5000/analyzer.go create mode 100644 build/bazelutil/staticcheckanalyzers/sa5001/BUILD.bazel create mode 100644 build/bazelutil/staticcheckanalyzers/sa5001/analyzer.go create mode 100644 build/bazelutil/staticcheckanalyzers/sa5002/BUILD.bazel create mode 100644 build/bazelutil/staticcheckanalyzers/sa5002/analyzer.go create mode 100644 build/bazelutil/staticcheckanalyzers/sa5003/BUILD.bazel create mode 100644 build/bazelutil/staticcheckanalyzers/sa5003/analyzer.go create mode 100644 build/bazelutil/staticcheckanalyzers/sa5004/BUILD.bazel create mode 100644 build/bazelutil/staticcheckanalyzers/sa5004/analyzer.go create mode 100644 build/bazelutil/staticcheckanalyzers/sa5005/BUILD.bazel create mode 100644 build/bazelutil/staticcheckanalyzers/sa5005/analyzer.go create mode 100644 build/bazelutil/staticcheckanalyzers/sa5007/BUILD.bazel create mode 100644 build/bazelutil/staticcheckanalyzers/sa5007/analyzer.go create mode 100644 build/bazelutil/staticcheckanalyzers/sa5008/BUILD.bazel create mode 100644 build/bazelutil/staticcheckanalyzers/sa5008/analyzer.go create mode 100644 build/bazelutil/staticcheckanalyzers/sa5009/BUILD.bazel create mode 100644 build/bazelutil/staticcheckanalyzers/sa5009/analyzer.go create mode 100644 build/bazelutil/staticcheckanalyzers/sa5010/BUILD.bazel create mode 100644 build/bazelutil/staticcheckanalyzers/sa5010/analyzer.go create mode 100644 build/bazelutil/staticcheckanalyzers/sa5011/BUILD.bazel create mode 100644 build/bazelutil/staticcheckanalyzers/sa5011/analyzer.go create mode 100644 build/bazelutil/staticcheckanalyzers/sa5012/BUILD.bazel create mode 100644 build/bazelutil/staticcheckanalyzers/sa5012/analyzer.go create mode 100644 build/bazelutil/staticcheckanalyzers/sa6000/BUILD.bazel create mode 100644 build/bazelutil/staticcheckanalyzers/sa6000/analyzer.go create mode 100644 build/bazelutil/staticcheckanalyzers/sa6001/BUILD.bazel create mode 100644 build/bazelutil/staticcheckanalyzers/sa6001/analyzer.go create mode 100644 build/bazelutil/staticcheckanalyzers/sa6002/BUILD.bazel create mode 100644 build/bazelutil/staticcheckanalyzers/sa6002/analyzer.go create mode 100644 build/bazelutil/staticcheckanalyzers/sa6003/BUILD.bazel create mode 100644 build/bazelutil/staticcheckanalyzers/sa6003/analyzer.go create mode 100644 build/bazelutil/staticcheckanalyzers/sa6005/BUILD.bazel create mode 100644 build/bazelutil/staticcheckanalyzers/sa6005/analyzer.go create mode 100644 build/bazelutil/staticcheckanalyzers/sa9001/BUILD.bazel create mode 100644 build/bazelutil/staticcheckanalyzers/sa9001/analyzer.go create mode 100644 build/bazelutil/staticcheckanalyzers/sa9002/BUILD.bazel create mode 100644 build/bazelutil/staticcheckanalyzers/sa9002/analyzer.go create mode 100644 build/bazelutil/staticcheckanalyzers/sa9003/BUILD.bazel create mode 100644 build/bazelutil/staticcheckanalyzers/sa9003/analyzer.go create mode 100644 build/bazelutil/staticcheckanalyzers/sa9004/BUILD.bazel create mode 100644 build/bazelutil/staticcheckanalyzers/sa9004/analyzer.go create mode 100644 build/bazelutil/staticcheckanalyzers/sa9005/BUILD.bazel create mode 100644 build/bazelutil/staticcheckanalyzers/sa9005/analyzer.go create mode 100644 build/bazelutil/staticcheckanalyzers/sa9006/BUILD.bazel create mode 100644 build/bazelutil/staticcheckanalyzers/sa9006/analyzer.go create mode 100644 pkg/cmd/generate-staticcheck/BUILD.bazel create mode 100644 pkg/cmd/generate-staticcheck/main.go create mode 100644 pkg/testutils/lint/passes/staticcheck/BUILD.bazel create mode 100644 pkg/testutils/lint/passes/staticcheck/staticcheck.go diff --git a/.github/CODEOWNERS b/.github/CODEOWNERS index b7ce34297a1f..858c897310b3 100644 --- a/.github/CODEOWNERS +++ b/.github/CODEOWNERS @@ -161,6 +161,7 @@ /pkg/cmd/generate-metadata-tables/ @cockroachdb/sql-experience /pkg/cmd/generate-spatial-ref-sys/ @cockroachdb/geospatial /pkg/cmd/generate-test-suites/ @cockroachdb/dev-inf +/pkg/cmd/generate-staticcheck/ @cockroachdb/dev-inf /pkg/cmd/geoviz/ @cockroachdb/geospatial /pkg/cmd/github-post/ @cockroachdb/test-eng /pkg/cmd/github-pull-request-make/ @cockroachdb/dev-inf diff --git a/BUILD.bazel b/BUILD.bazel index f1b5c20697a0..0cb1c5140d85 100644 --- a/BUILD.bazel +++ b/BUILD.bazel @@ -7,6 +7,7 @@ exports_files([ load("@bazel_gazelle//:def.bzl", "gazelle") load("@io_bazel_rules_go//go:def.bzl", "nogo") +load("//build/bazelutil/staticcheckanalyzers:def.bzl", "STATICCHECK_CHECKS") # The following directives inform gazelle how to auto-generate BUILD.bazel # files throughout the repo. By including them here, we can run gazelle using @@ -248,5 +249,5 @@ nogo( "//pkg/testutils/lint/passes/returnerrcheck", "//pkg/testutils/lint/passes/timer", "//pkg/testutils/lint/passes/unconvert", - ], + ] + STATICCHECK_CHECKS, ) diff --git a/build/bazelutil/bazel-generate.sh b/build/bazelutil/bazel-generate.sh index 08adeb3d6236..43b61002b4d8 100755 --- a/build/bazelutil/bazel-generate.sh +++ b/build/bazelutil/bazel-generate.sh @@ -9,6 +9,7 @@ set -euo pipefail CONTENTS=$(bazel run //pkg/cmd/mirror) echo "$CONTENTS" > DEPS.bzl +bazel run pkg/cmd/generate-staticcheck --run_under="cd $PWD && " bazel run //:gazelle CONTENTS=$(bazel run //pkg/cmd/generate-test-suites --run_under="cd $PWD && ") echo "$CONTENTS" > pkg/BUILD.bazel diff --git a/build/bazelutil/nogo_config.json b/build/bazelutil/nogo_config.json index d9391744eaca..16c02ff16d23 100644 --- a/build/bazelutil/nogo_config.json +++ b/build/bazelutil/nogo_config.json @@ -104,6 +104,1319 @@ "github.com/cockroachdb/cockroach/.*$": "first-party code" } }, + "S1000": { + "exclude_files": { + "github.com/cockroachdb/cockroach/.*\\.eg\\.go$": "generated code", + ".*\\.pb\\.go$": "generated code", + ".*\\.pb\\.gw\\.go$": "generated code", + "github.com/cockroachdb/cockroach/.*_generated\\.go$": "generated code" + }, + "only_files": { + "github.com/cockroachdb/cockroach/.*$": "first-party code" + } + }, + "S1001": { + "exclude_files": { + "github.com/cockroachdb/cockroach/.*\\.eg\\.go$": "generated code", + ".*\\.pb\\.go$": "generated code", + ".*\\.pb\\.gw\\.go$": "generated code", + "github.com/cockroachdb/cockroach/.*_generated\\.go$": "generated code" + }, + "only_files": { + "github.com/cockroachdb/cockroach/.*$": "first-party code" + } + }, + "S1002": { + "exclude_files": { + "github.com/cockroachdb/cockroach/.*\\.eg\\.go$": "generated code", + ".*\\.pb\\.go$": "generated code", + ".*\\.pb\\.gw\\.go$": "generated code", + "github.com/cockroachdb/cockroach/.*_generated\\.go$": "generated code" + }, + "only_files": { + "github.com/cockroachdb/cockroach/.*$": "first-party code" + } + }, + "S1003": { + "exclude_files": { + "github.com/cockroachdb/cockroach/.*\\.eg\\.go$": "generated code", + ".*\\.pb\\.go$": "generated code", + ".*\\.pb\\.gw\\.go$": "generated code", + "github.com/cockroachdb/cockroach/.*_generated\\.go$": "generated code" + }, + "only_files": { + "github.com/cockroachdb/cockroach/.*$": "first-party code" + } + }, + "S1004": { + "exclude_files": { + "github.com/cockroachdb/cockroach/.*\\.eg\\.go$": "generated code", + ".*\\.pb\\.go$": "generated code", + ".*\\.pb\\.gw\\.go$": "generated code", + "github.com/cockroachdb/cockroach/.*_generated\\.go$": "generated code" + }, + "only_files": { + "github.com/cockroachdb/cockroach/.*$": "first-party code" + } + }, + "S1005": { + "exclude_files": { + "github.com/cockroachdb/cockroach/.*\\.eg\\.go$": "generated code", + ".*\\.pb\\.go$": "generated code", + ".*\\.pb\\.gw\\.go$": "generated code", + "github.com/cockroachdb/cockroach/.*_generated\\.go$": "generated code" + }, + "only_files": { + "github.com/cockroachdb/cockroach/.*$": "first-party code" + } + }, + "S1006": { + "exclude_files": { + "github.com/cockroachdb/cockroach/.*\\.eg\\.go$": "generated code", + ".*\\.pb\\.go$": "generated code", + ".*\\.pb\\.gw\\.go$": "generated code", + "github.com/cockroachdb/cockroach/.*_generated\\.go$": "generated code" + }, + "only_files": { + "github.com/cockroachdb/cockroach/.*$": "first-party code" + } + }, + "S1007": { + "exclude_files": { + "github.com/cockroachdb/cockroach/.*\\.eg\\.go$": "generated code", + ".*\\.pb\\.go$": "generated code", + ".*\\.pb\\.gw\\.go$": "generated code", + "github.com/cockroachdb/cockroach/.*_generated\\.go$": "generated code" + }, + "only_files": { + "github.com/cockroachdb/cockroach/.*$": "first-party code" + } + }, + "S1008": { + "exclude_files": { + "github.com/cockroachdb/cockroach/.*\\.eg\\.go$": "generated code", + ".*\\.pb\\.go$": "generated code", + ".*\\.pb\\.gw\\.go$": "generated code", + "github.com/cockroachdb/cockroach/.*_generated\\.go$": "generated code" + }, + "only_files": { + "github.com/cockroachdb/cockroach/.*$": "first-party code" + } + }, + "S1009": { + "exclude_files": { + "github.com/cockroachdb/cockroach/.*\\.eg\\.go$": "generated code", + ".*\\.pb\\.go$": "generated code", + ".*\\.pb\\.gw\\.go$": "generated code", + "github.com/cockroachdb/cockroach/.*_generated\\.go$": "generated code" + }, + "only_files": { + "github.com/cockroachdb/cockroach/.*$": "first-party code" + } + }, + "S1010": { + "exclude_files": { + "github.com/cockroachdb/cockroach/.*\\.eg\\.go$": "generated code", + ".*\\.pb\\.go$": "generated code", + ".*\\.pb\\.gw\\.go$": "generated code", + "github.com/cockroachdb/cockroach/.*_generated\\.go$": "generated code" + }, + "only_files": { + "github.com/cockroachdb/cockroach/.*$": "first-party code" + } + }, + "S1011": { + "exclude_files": { + "github.com/cockroachdb/cockroach/.*\\.eg\\.go$": "generated code", + ".*\\.pb\\.go$": "generated code", + ".*\\.pb\\.gw\\.go$": "generated code", + "github.com/cockroachdb/cockroach/.*_generated\\.go$": "generated code" + }, + "only_files": { + "github.com/cockroachdb/cockroach/.*$": "first-party code" + } + }, + "S1012": { + "exclude_files": { + "github.com/cockroachdb/cockroach/.*\\.eg\\.go$": "generated code", + ".*\\.pb\\.go$": "generated code", + ".*\\.pb\\.gw\\.go$": "generated code", + "github.com/cockroachdb/cockroach/.*_generated\\.go$": "generated code" + }, + "only_files": { + "github.com/cockroachdb/cockroach/.*$": "first-party code" + } + }, + "S1016": { + "exclude_files": { + "github.com/cockroachdb/cockroach/.*\\.eg\\.go$": "generated code", + ".*\\.pb\\.go$": "generated code", + ".*\\.pb\\.gw\\.go$": "generated code", + "github.com/cockroachdb/cockroach/.*_generated\\.go$": "generated code" + }, + "only_files": { + "github.com/cockroachdb/cockroach/.*$": "first-party code" + } + }, + "S1017": { + "exclude_files": { + "github.com/cockroachdb/cockroach/.*\\.eg\\.go$": "generated code", + ".*\\.pb\\.go$": "generated code", + ".*\\.pb\\.gw\\.go$": "generated code", + "github.com/cockroachdb/cockroach/.*_generated\\.go$": "generated code" + }, + "only_files": { + "github.com/cockroachdb/cockroach/.*$": "first-party code" + } + }, + "S1018": { + "exclude_files": { + "github.com/cockroachdb/cockroach/.*\\.eg\\.go$": "generated code", + ".*\\.pb\\.go$": "generated code", + ".*\\.pb\\.gw\\.go$": "generated code", + "github.com/cockroachdb/cockroach/.*_generated\\.go$": "generated code" + }, + "only_files": { + "github.com/cockroachdb/cockroach/.*$": "first-party code" + } + }, + "S1019": { + "exclude_files": { + "github.com/cockroachdb/cockroach/.*\\.eg\\.go$": "generated code", + ".*\\.pb\\.go$": "generated code", + ".*\\.pb\\.gw\\.go$": "generated code", + "github.com/cockroachdb/cockroach/.*_generated\\.go$": "generated code" + }, + "only_files": { + "github.com/cockroachdb/cockroach/.*$": "first-party code" + } + }, + "S1020": { + "exclude_files": { + "github.com/cockroachdb/cockroach/.*\\.eg\\.go$": "generated code", + ".*\\.pb\\.go$": "generated code", + ".*\\.pb\\.gw\\.go$": "generated code", + "github.com/cockroachdb/cockroach/.*_generated\\.go$": "generated code" + }, + "only_files": { + "github.com/cockroachdb/cockroach/.*$": "first-party code" + } + }, + "S1021": { + "exclude_files": { + "github.com/cockroachdb/cockroach/.*\\.eg\\.go$": "generated code", + ".*\\.pb\\.go$": "generated code", + ".*\\.pb\\.gw\\.go$": "generated code", + "github.com/cockroachdb/cockroach/.*_generated\\.go$": "generated code" + }, + "only_files": { + "github.com/cockroachdb/cockroach/.*$": "first-party code" + } + }, + "S1023": { + "exclude_files": { + "github.com/cockroachdb/cockroach/.*\\.eg\\.go$": "generated code", + ".*\\.pb\\.go$": "generated code", + ".*\\.pb\\.gw\\.go$": "generated code", + "github.com/cockroachdb/cockroach/.*_generated\\.go$": "generated code" + }, + "only_files": { + "github.com/cockroachdb/cockroach/.*$": "first-party code" + } + }, + "S1024": { + "exclude_files": { + "github.com/cockroachdb/cockroach/.*\\.eg\\.go$": "generated code", + ".*\\.pb\\.go$": "generated code", + ".*\\.pb\\.gw\\.go$": "generated code", + "github.com/cockroachdb/cockroach/.*_generated\\.go$": "generated code" + }, + "only_files": { + "github.com/cockroachdb/cockroach/.*$": "first-party code" + } + }, + "S1025": { + "exclude_files": { + "github.com/cockroachdb/cockroach/.*\\.eg\\.go$": "generated code", + ".*\\.pb\\.go$": "generated code", + ".*\\.pb\\.gw\\.go$": "generated code", + "github.com/cockroachdb/cockroach/.*_generated\\.go$": "generated code" + }, + "only_files": { + "github.com/cockroachdb/cockroach/.*$": "first-party code" + } + }, + "S1028": { + "exclude_files": { + "github.com/cockroachdb/cockroach/.*\\.eg\\.go$": "generated code", + ".*\\.pb\\.go$": "generated code", + ".*\\.pb\\.gw\\.go$": "generated code", + "github.com/cockroachdb/cockroach/.*_generated\\.go$": "generated code" + }, + "only_files": { + "github.com/cockroachdb/cockroach/.*$": "first-party code" + } + }, + "S1029": { + "exclude_files": { + "github.com/cockroachdb/cockroach/.*\\.eg\\.go$": "generated code", + ".*\\.pb\\.go$": "generated code", + ".*\\.pb\\.gw\\.go$": "generated code", + "github.com/cockroachdb/cockroach/.*_generated\\.go$": "generated code" + }, + "only_files": { + "github.com/cockroachdb/cockroach/.*$": "first-party code" + } + }, + "S1030": { + "exclude_files": { + "github.com/cockroachdb/cockroach/.*\\.eg\\.go$": "generated code", + ".*\\.pb\\.go$": "generated code", + ".*\\.pb\\.gw\\.go$": "generated code", + "github.com/cockroachdb/cockroach/.*_generated\\.go$": "generated code" + }, + "only_files": { + "github.com/cockroachdb/cockroach/.*$": "first-party code" + } + }, + "S1031": { + "exclude_files": { + "github.com/cockroachdb/cockroach/.*\\.eg\\.go$": "generated code", + ".*\\.pb\\.go$": "generated code", + ".*\\.pb\\.gw\\.go$": "generated code", + "github.com/cockroachdb/cockroach/.*_generated\\.go$": "generated code" + }, + "only_files": { + "github.com/cockroachdb/cockroach/.*$": "first-party code" + } + }, + "S1032": { + "exclude_files": { + "github.com/cockroachdb/cockroach/.*\\.eg\\.go$": "generated code", + ".*\\.pb\\.go$": "generated code", + ".*\\.pb\\.gw\\.go$": "generated code", + "github.com/cockroachdb/cockroach/.*_generated\\.go$": "generated code" + }, + "only_files": { + "github.com/cockroachdb/cockroach/.*$": "first-party code" + } + }, + "S1033": { + "exclude_files": { + "github.com/cockroachdb/cockroach/.*\\.eg\\.go$": "generated code", + ".*\\.pb\\.go$": "generated code", + ".*\\.pb\\.gw\\.go$": "generated code", + "github.com/cockroachdb/cockroach/.*_generated\\.go$": "generated code" + }, + "only_files": { + "github.com/cockroachdb/cockroach/.*$": "first-party code" + } + }, + "S1034": { + "exclude_files": { + "github.com/cockroachdb/cockroach/.*\\.eg\\.go$": "generated code", + ".*\\.pb\\.go$": "generated code", + ".*\\.pb\\.gw\\.go$": "generated code", + "github.com/cockroachdb/cockroach/.*_generated\\.go$": "generated code" + }, + "only_files": { + "github.com/cockroachdb/cockroach/.*$": "first-party code" + } + }, + "S1035": { + "exclude_files": { + "github.com/cockroachdb/cockroach/.*\\.eg\\.go$": "generated code", + ".*\\.pb\\.go$": "generated code", + ".*\\.pb\\.gw\\.go$": "generated code", + "github.com/cockroachdb/cockroach/.*_generated\\.go$": "generated code" + }, + "only_files": { + "github.com/cockroachdb/cockroach/.*$": "first-party code" + } + }, + "S1036": { + "exclude_files": { + "github.com/cockroachdb/cockroach/.*\\.eg\\.go$": "generated code", + ".*\\.pb\\.go$": "generated code", + ".*\\.pb\\.gw\\.go$": "generated code", + "github.com/cockroachdb/cockroach/.*_generated\\.go$": "generated code" + }, + "only_files": { + "github.com/cockroachdb/cockroach/.*$": "first-party code" + } + }, + "S1037": { + "exclude_files": { + "github.com/cockroachdb/cockroach/.*\\.eg\\.go$": "generated code", + ".*\\.pb\\.go$": "generated code", + ".*\\.pb\\.gw\\.go$": "generated code", + "github.com/cockroachdb/cockroach/.*_generated\\.go$": "generated code" + }, + "only_files": { + "github.com/cockroachdb/cockroach/.*$": "first-party code" + } + }, + "S1038": { + "exclude_files": { + "github.com/cockroachdb/cockroach/.*\\.eg\\.go$": "generated code", + ".*\\.pb\\.go$": "generated code", + ".*\\.pb\\.gw\\.go$": "generated code", + "github.com/cockroachdb/cockroach/.*_generated\\.go$": "generated code" + }, + "only_files": { + "github.com/cockroachdb/cockroach/.*$": "first-party code" + } + }, + "S1039": { + "exclude_files": { + "github.com/cockroachdb/cockroach/.*\\.eg\\.go$": "generated code", + ".*\\.pb\\.go$": "generated code", + ".*\\.pb\\.gw\\.go$": "generated code", + "github.com/cockroachdb/cockroach/.*_generated\\.go$": "generated code" + }, + "only_files": { + "github.com/cockroachdb/cockroach/.*$": "first-party code" + } + }, + "S1040": { + "exclude_files": { + "github.com/cockroachdb/cockroach/.*\\.eg\\.go$": "generated code", + ".*\\.pb\\.go$": "generated code", + ".*\\.pb\\.gw\\.go$": "generated code", + "github.com/cockroachdb/cockroach/.*_generated\\.go$": "generated code" + }, + "only_files": { + "github.com/cockroachdb/cockroach/.*$": "first-party code" + } + }, + "SA1000": { + "exclude_files": { + "github.com/cockroachdb/cockroach/.*\\.eg\\.go$": "generated code", + ".*\\.pb\\.go$": "generated code", + ".*\\.pb\\.gw\\.go$": "generated code", + "github.com/cockroachdb/cockroach/.*_generated\\.go$": "generated code" + }, + "only_files": { + "github.com/cockroachdb/cockroach/.*$": "first-party code" + } + }, + "SA1001": { + "exclude_files": { + "github.com/cockroachdb/cockroach/.*\\.eg\\.go$": "generated code", + ".*\\.pb\\.go$": "generated code", + ".*\\.pb\\.gw\\.go$": "generated code", + "github.com/cockroachdb/cockroach/.*_generated\\.go$": "generated code" + }, + "only_files": { + "github.com/cockroachdb/cockroach/.*$": "first-party code" + } + }, + "SA1002": { + "exclude_files": { + "github.com/cockroachdb/cockroach/.*\\.eg\\.go$": "generated code", + ".*\\.pb\\.go$": "generated code", + ".*\\.pb\\.gw\\.go$": "generated code", + "github.com/cockroachdb/cockroach/.*_generated\\.go$": "generated code" + }, + "only_files": { + "github.com/cockroachdb/cockroach/.*$": "first-party code" + } + }, + "SA1003": { + "exclude_files": { + "github.com/cockroachdb/cockroach/.*\\.eg\\.go$": "generated code", + ".*\\.pb\\.go$": "generated code", + ".*\\.pb\\.gw\\.go$": "generated code", + "github.com/cockroachdb/cockroach/.*_generated\\.go$": "generated code" + }, + "only_files": { + "github.com/cockroachdb/cockroach/.*$": "first-party code" + } + }, + "SA1004": { + "exclude_files": { + "github.com/cockroachdb/cockroach/.*\\.eg\\.go$": "generated code", + ".*\\.pb\\.go$": "generated code", + ".*\\.pb\\.gw\\.go$": "generated code", + "github.com/cockroachdb/cockroach/.*_generated\\.go$": "generated code" + }, + "only_files": { + "github.com/cockroachdb/cockroach/.*$": "first-party code" + } + }, + "SA1005": { + "exclude_files": { + "github.com/cockroachdb/cockroach/.*\\.eg\\.go$": "generated code", + ".*\\.pb\\.go$": "generated code", + ".*\\.pb\\.gw\\.go$": "generated code", + "github.com/cockroachdb/cockroach/.*_generated\\.go$": "generated code" + }, + "only_files": { + "github.com/cockroachdb/cockroach/.*$": "first-party code" + } + }, + "SA1006": { + "exclude_files": { + "github.com/cockroachdb/cockroach/.*\\.eg\\.go$": "generated code", + ".*\\.pb\\.go$": "generated code", + ".*\\.pb\\.gw\\.go$": "generated code", + "github.com/cockroachdb/cockroach/.*_generated\\.go$": "generated code" + }, + "only_files": { + "github.com/cockroachdb/cockroach/.*$": "first-party code" + } + }, + "SA1007": { + "exclude_files": { + "github.com/cockroachdb/cockroach/.*\\.eg\\.go$": "generated code", + ".*\\.pb\\.go$": "generated code", + ".*\\.pb\\.gw\\.go$": "generated code", + "github.com/cockroachdb/cockroach/.*_generated\\.go$": "generated code" + }, + "only_files": { + "github.com/cockroachdb/cockroach/.*$": "first-party code" + } + }, + "SA1008": { + "exclude_files": { + "github.com/cockroachdb/cockroach/.*\\.eg\\.go$": "generated code", + ".*\\.pb\\.go$": "generated code", + ".*\\.pb\\.gw\\.go$": "generated code", + "github.com/cockroachdb/cockroach/.*_generated\\.go$": "generated code" + }, + "only_files": { + "github.com/cockroachdb/cockroach/.*$": "first-party code" + } + }, + "SA1010": { + "exclude_files": { + "github.com/cockroachdb/cockroach/.*\\.eg\\.go$": "generated code", + ".*\\.pb\\.go$": "generated code", + ".*\\.pb\\.gw\\.go$": "generated code", + "github.com/cockroachdb/cockroach/.*_generated\\.go$": "generated code" + }, + "only_files": { + "github.com/cockroachdb/cockroach/.*$": "first-party code" + } + }, + "SA1011": { + "exclude_files": { + "github.com/cockroachdb/cockroach/.*\\.eg\\.go$": "generated code", + ".*\\.pb\\.go$": "generated code", + ".*\\.pb\\.gw\\.go$": "generated code", + "github.com/cockroachdb/cockroach/.*_generated\\.go$": "generated code" + }, + "only_files": { + "github.com/cockroachdb/cockroach/.*$": "first-party code" + } + }, + "SA1012": { + "exclude_files": { + "github.com/cockroachdb/cockroach/.*\\.eg\\.go$": "generated code", + ".*\\.pb\\.go$": "generated code", + ".*\\.pb\\.gw\\.go$": "generated code", + "github.com/cockroachdb/cockroach/.*_generated\\.go$": "generated code" + }, + "only_files": { + "github.com/cockroachdb/cockroach/.*$": "first-party code" + } + }, + "SA1013": { + "exclude_files": { + "github.com/cockroachdb/cockroach/.*\\.eg\\.go$": "generated code", + ".*\\.pb\\.go$": "generated code", + ".*\\.pb\\.gw\\.go$": "generated code", + "github.com/cockroachdb/cockroach/.*_generated\\.go$": "generated code" + }, + "only_files": { + "github.com/cockroachdb/cockroach/.*$": "first-party code" + } + }, + "SA1014": { + "exclude_files": { + "github.com/cockroachdb/cockroach/.*\\.eg\\.go$": "generated code", + ".*\\.pb\\.go$": "generated code", + ".*\\.pb\\.gw\\.go$": "generated code", + "github.com/cockroachdb/cockroach/.*_generated\\.go$": "generated code" + }, + "only_files": { + "github.com/cockroachdb/cockroach/.*$": "first-party code" + } + }, + "SA1015": { + "exclude_files": { + "github.com/cockroachdb/cockroach/.*\\.eg\\.go$": "generated code", + ".*\\.pb\\.go$": "generated code", + ".*\\.pb\\.gw\\.go$": "generated code", + "github.com/cockroachdb/cockroach/.*_generated\\.go$": "generated code" + }, + "only_files": { + "github.com/cockroachdb/cockroach/.*$": "first-party code" + } + }, + "SA1016": { + "exclude_files": { + "github.com/cockroachdb/cockroach/.*\\.eg\\.go$": "generated code", + ".*\\.pb\\.go$": "generated code", + ".*\\.pb\\.gw\\.go$": "generated code", + "github.com/cockroachdb/cockroach/.*_generated\\.go$": "generated code" + }, + "only_files": { + "github.com/cockroachdb/cockroach/.*$": "first-party code" + } + }, + "SA1017": { + "exclude_files": { + "github.com/cockroachdb/cockroach/.*\\.eg\\.go$": "generated code", + ".*\\.pb\\.go$": "generated code", + ".*\\.pb\\.gw\\.go$": "generated code", + "github.com/cockroachdb/cockroach/.*_generated\\.go$": "generated code" + }, + "only_files": { + "github.com/cockroachdb/cockroach/.*$": "first-party code" + } + }, + "SA1018": { + "exclude_files": { + "github.com/cockroachdb/cockroach/.*\\.eg\\.go$": "generated code", + ".*\\.pb\\.go$": "generated code", + ".*\\.pb\\.gw\\.go$": "generated code", + "github.com/cockroachdb/cockroach/.*_generated\\.go$": "generated code" + }, + "only_files": { + "github.com/cockroachdb/cockroach/.*$": "first-party code" + } + }, + "SA1019": { + "exclude_files": { + "github.com/cockroachdb/cockroach/pkg/roachpb/api_test.go$": "same package that grpc-go imports", + "github.com/cockroachdb/cockroach/pkg/rpc/codec.go$": "rpc/codec.go imports the same proto package that grpc-go imports (as of crdb@dd87d1145 and grpc-go@7b167fd6).", + "github.com/cockroachdb/cockroach/pkg/rpc/stats_handler.go$": "Using deprecated WireLength call", + "github.com/cockroachdb/cockroach/.*\\.eg\\.go$": "generated code", + ".*\\.pb\\.go$": "generated code", + ".*\\.pb\\.gw\\.go$": "generated code", + "github.com/cockroachdb/cockroach/.*_generated\\.go$": "generated code" + }, + "only_files": { + "github.com/cockroachdb/cockroach/.*$": "first-party code" + } + }, + "SA1020": { + "exclude_files": { + "github.com/cockroachdb/cockroach/.*\\.eg\\.go$": "generated code", + ".*\\.pb\\.go$": "generated code", + ".*\\.pb\\.gw\\.go$": "generated code", + "github.com/cockroachdb/cockroach/.*_generated\\.go$": "generated code" + }, + "only_files": { + "github.com/cockroachdb/cockroach/.*$": "first-party code" + } + }, + "SA1021": { + "exclude_files": { + "github.com/cockroachdb/cockroach/.*\\.eg\\.go$": "generated code", + ".*\\.pb\\.go$": "generated code", + ".*\\.pb\\.gw\\.go$": "generated code", + "github.com/cockroachdb/cockroach/.*_generated\\.go$": "generated code" + }, + "only_files": { + "github.com/cockroachdb/cockroach/.*$": "first-party code" + } + }, + "SA1023": { + "exclude_files": { + "github.com/cockroachdb/cockroach/.*\\.eg\\.go$": "generated code", + ".*\\.pb\\.go$": "generated code", + ".*\\.pb\\.gw\\.go$": "generated code", + "github.com/cockroachdb/cockroach/.*_generated\\.go$": "generated code" + }, + "only_files": { + "github.com/cockroachdb/cockroach/.*$": "first-party code" + } + }, + "SA1024": { + "exclude_files": { + "github.com/cockroachdb/cockroach/.*\\.eg\\.go$": "generated code", + ".*\\.pb\\.go$": "generated code", + ".*\\.pb\\.gw\\.go$": "generated code", + "github.com/cockroachdb/cockroach/.*_generated\\.go$": "generated code" + }, + "only_files": { + "github.com/cockroachdb/cockroach/.*$": "first-party code" + } + }, + "SA1025": { + "exclude_files": { + "github.com/cockroachdb/cockroach/.*\\.eg\\.go$": "generated code", + ".*\\.pb\\.go$": "generated code", + ".*\\.pb\\.gw\\.go$": "generated code", + "github.com/cockroachdb/cockroach/.*_generated\\.go$": "generated code" + }, + "only_files": { + "github.com/cockroachdb/cockroach/.*$": "first-party code" + } + }, + "SA1026": { + "exclude_files": { + "github.com/cockroachdb/cockroach/.*\\.eg\\.go$": "generated code", + ".*\\.pb\\.go$": "generated code", + ".*\\.pb\\.gw\\.go$": "generated code", + "github.com/cockroachdb/cockroach/.*_generated\\.go$": "generated code" + }, + "only_files": { + "github.com/cockroachdb/cockroach/.*$": "first-party code" + } + }, + "SA1027": { + "exclude_files": { + "github.com/cockroachdb/cockroach/.*\\.eg\\.go$": "generated code", + ".*\\.pb\\.go$": "generated code", + ".*\\.pb\\.gw\\.go$": "generated code", + "github.com/cockroachdb/cockroach/.*_generated\\.go$": "generated code" + }, + "only_files": { + "github.com/cockroachdb/cockroach/.*$": "first-party code" + } + }, + "SA1028": { + "exclude_files": { + "github.com/cockroachdb/cockroach/.*\\.eg\\.go$": "generated code", + ".*\\.pb\\.go$": "generated code", + ".*\\.pb\\.gw\\.go$": "generated code", + "github.com/cockroachdb/cockroach/.*_generated\\.go$": "generated code" + }, + "only_files": { + "github.com/cockroachdb/cockroach/.*$": "first-party code" + } + }, + "SA1029": { + "exclude_files": { + "github.com/cockroachdb/cockroach/.*\\.eg\\.go$": "generated code", + ".*\\.pb\\.go$": "generated code", + ".*\\.pb\\.gw\\.go$": "generated code", + "github.com/cockroachdb/cockroach/.*_generated\\.go$": "generated code" + }, + "only_files": { + "github.com/cockroachdb/cockroach/.*$": "first-party code" + } + }, + "SA1030": { + "exclude_files": { + "github.com/cockroachdb/cockroach/.*\\.eg\\.go$": "generated code", + ".*\\.pb\\.go$": "generated code", + ".*\\.pb\\.gw\\.go$": "generated code", + "github.com/cockroachdb/cockroach/.*_generated\\.go$": "generated code" + }, + "only_files": { + "github.com/cockroachdb/cockroach/.*$": "first-party code" + } + }, + "SA2000": { + "exclude_files": { + "github.com/cockroachdb/cockroach/.*\\.eg\\.go$": "generated code", + ".*\\.pb\\.go$": "generated code", + ".*\\.pb\\.gw\\.go$": "generated code", + "github.com/cockroachdb/cockroach/.*_generated\\.go$": "generated code" + }, + "only_files": { + "github.com/cockroachdb/cockroach/.*$": "first-party code" + } + }, + "SA2001": { + "exclude_files": { + "github.com/cockroachdb/cockroach/.*\\.eg\\.go$": "generated code", + ".*\\.pb\\.go$": "generated code", + ".*\\.pb\\.gw\\.go$": "generated code", + "github.com/cockroachdb/cockroach/.*_generated\\.go$": "generated code" + }, + "only_files": { + "github.com/cockroachdb/cockroach/.*$": "first-party code" + } + }, + "SA2002": { + "exclude_files": { + "github.com/cockroachdb/cockroach/.*\\.eg\\.go$": "generated code", + ".*\\.pb\\.go$": "generated code", + ".*\\.pb\\.gw\\.go$": "generated code", + "github.com/cockroachdb/cockroach/.*_generated\\.go$": "generated code" + }, + "only_files": { + "github.com/cockroachdb/cockroach/.*$": "first-party code" + } + }, + "SA2003": { + "exclude_files": { + "github.com/cockroachdb/cockroach/.*\\.eg\\.go$": "generated code", + ".*\\.pb\\.go$": "generated code", + ".*\\.pb\\.gw\\.go$": "generated code", + "github.com/cockroachdb/cockroach/.*_generated\\.go$": "generated code" + }, + "only_files": { + "github.com/cockroachdb/cockroach/.*$": "first-party code" + } + }, + "SA3000": { + "exclude_files": { + "github.com/cockroachdb/cockroach/.*\\.eg\\.go$": "generated code", + ".*\\.pb\\.go$": "generated code", + ".*\\.pb\\.gw\\.go$": "generated code", + "github.com/cockroachdb/cockroach/.*_generated\\.go$": "generated code" + }, + "only_files": { + "github.com/cockroachdb/cockroach/.*$": "first-party code" + } + }, + "SA3001": { + "exclude_files": { + "github.com/cockroachdb/cockroach/.*\\.eg\\.go$": "generated code", + ".*\\.pb\\.go$": "generated code", + ".*\\.pb\\.gw\\.go$": "generated code", + "github.com/cockroachdb/cockroach/.*_generated\\.go$": "generated code" + }, + "only_files": { + "github.com/cockroachdb/cockroach/.*$": "first-party code" + } + }, + "SA4000": { + "exclude_files": { + "github.com/cockroachdb/cockroach/.*\\.eg\\.go$": "generated code", + ".*\\.pb\\.go$": "generated code", + ".*\\.pb\\.gw\\.go$": "generated code", + "github.com/cockroachdb/cockroach/.*_generated\\.go$": "generated code" + }, + "only_files": { + "github.com/cockroachdb/cockroach/.*$": "first-party code" + } + }, + "SA4001": { + "exclude_files": { + "github.com/cockroachdb/cockroach/.*\\.eg\\.go$": "generated code", + ".*\\.pb\\.go$": "generated code", + ".*\\.pb\\.gw\\.go$": "generated code", + "github.com/cockroachdb/cockroach/.*_generated\\.go$": "generated code" + }, + "only_files": { + "github.com/cockroachdb/cockroach/.*$": "first-party code" + } + }, + "SA4003": { + "exclude_files": { + "github.com/cockroachdb/cockroach/.*\\.eg\\.go$": "generated code", + ".*\\.pb\\.go$": "generated code", + ".*\\.pb\\.gw\\.go$": "generated code", + "github.com/cockroachdb/cockroach/.*_generated\\.go$": "generated code" + }, + "only_files": { + "github.com/cockroachdb/cockroach/.*$": "first-party code" + } + }, + "SA4004": { + "exclude_files": { + "github.com/cockroachdb/cockroach/.*\\.eg\\.go$": "generated code", + ".*\\.pb\\.go$": "generated code", + ".*\\.pb\\.gw\\.go$": "generated code", + "github.com/cockroachdb/cockroach/.*_generated\\.go$": "generated code" + }, + "only_files": { + "github.com/cockroachdb/cockroach/.*$": "first-party code" + } + }, + "SA4005": { + "exclude_files": { + "github.com/cockroachdb/cockroach/.*\\.eg\\.go$": "generated code", + ".*\\.pb\\.go$": "generated code", + ".*\\.pb\\.gw\\.go$": "generated code", + "github.com/cockroachdb/cockroach/.*_generated\\.go$": "generated code" + }, + "only_files": { + "github.com/cockroachdb/cockroach/.*$": "first-party code" + } + }, + "SA4006": { + "exclude_files": { + "github.com/cockroachdb/cockroach/.*\\.eg\\.go$": "generated code", + ".*\\.pb\\.go$": "generated code", + ".*\\.pb\\.gw\\.go$": "generated code", + "github.com/cockroachdb/cockroach/.*_generated\\.go$": "generated code" + }, + "only_files": { + "github.com/cockroachdb/cockroach/.*$": "first-party code" + } + }, + "SA4008": { + "exclude_files": { + "github.com/cockroachdb/cockroach/.*\\.eg\\.go$": "generated code", + ".*\\.pb\\.go$": "generated code", + ".*\\.pb\\.gw\\.go$": "generated code", + "github.com/cockroachdb/cockroach/.*_generated\\.go$": "generated code" + }, + "only_files": { + "github.com/cockroachdb/cockroach/.*$": "first-party code" + } + }, + "SA4009": { + "exclude_files": { + "github.com/cockroachdb/cockroach/.*\\.eg\\.go$": "generated code", + ".*\\.pb\\.go$": "generated code", + ".*\\.pb\\.gw\\.go$": "generated code", + "github.com/cockroachdb/cockroach/.*_generated\\.go$": "generated code" + }, + "only_files": { + "github.com/cockroachdb/cockroach/.*$": "first-party code" + } + }, + "SA4010": { + "exclude_files": { + "github.com/cockroachdb/cockroach/.*\\.eg\\.go$": "generated code", + ".*\\.pb\\.go$": "generated code", + ".*\\.pb\\.gw\\.go$": "generated code", + "github.com/cockroachdb/cockroach/.*_generated\\.go$": "generated code" + }, + "only_files": { + "github.com/cockroachdb/cockroach/.*$": "first-party code" + } + }, + "SA4011": { + "exclude_files": { + "github.com/cockroachdb/cockroach/.*\\.eg\\.go$": "generated code", + ".*\\.pb\\.go$": "generated code", + ".*\\.pb\\.gw\\.go$": "generated code", + "github.com/cockroachdb/cockroach/.*_generated\\.go$": "generated code" + }, + "only_files": { + "github.com/cockroachdb/cockroach/.*$": "first-party code" + } + }, + "SA4012": { + "exclude_files": { + "github.com/cockroachdb/cockroach/.*\\.eg\\.go$": "generated code", + ".*\\.pb\\.go$": "generated code", + ".*\\.pb\\.gw\\.go$": "generated code", + "github.com/cockroachdb/cockroach/.*_generated\\.go$": "generated code" + }, + "only_files": { + "github.com/cockroachdb/cockroach/.*$": "first-party code" + } + }, + "SA4013": { + "exclude_files": { + "github.com/cockroachdb/cockroach/.*\\.eg\\.go$": "generated code", + ".*\\.pb\\.go$": "generated code", + ".*\\.pb\\.gw\\.go$": "generated code", + "github.com/cockroachdb/cockroach/.*_generated\\.go$": "generated code" + }, + "only_files": { + "github.com/cockroachdb/cockroach/.*$": "first-party code" + } + }, + "SA4014": { + "exclude_files": { + "github.com/cockroachdb/cockroach/.*\\.eg\\.go$": "generated code", + ".*\\.pb\\.go$": "generated code", + ".*\\.pb\\.gw\\.go$": "generated code", + "github.com/cockroachdb/cockroach/.*_generated\\.go$": "generated code" + }, + "only_files": { + "github.com/cockroachdb/cockroach/.*$": "first-party code" + } + }, + "SA4015": { + "exclude_files": { + "github.com/cockroachdb/cockroach/.*\\.eg\\.go$": "generated code", + ".*\\.pb\\.go$": "generated code", + ".*\\.pb\\.gw\\.go$": "generated code", + "github.com/cockroachdb/cockroach/.*_generated\\.go$": "generated code" + }, + "only_files": { + "github.com/cockroachdb/cockroach/.*$": "first-party code" + } + }, + "SA4016": { + "exclude_files": { + "github.com/cockroachdb/cockroach/.*\\.eg\\.go$": "generated code", + ".*\\.pb\\.go$": "generated code", + ".*\\.pb\\.gw\\.go$": "generated code", + "github.com/cockroachdb/cockroach/.*_generated\\.go$": "generated code" + }, + "only_files": { + "github.com/cockroachdb/cockroach/.*$": "first-party code" + } + }, + "SA4017": { + "exclude_files": { + "github.com/cockroachdb/cockroach/.*\\.eg\\.go$": "generated code", + ".*\\.pb\\.go$": "generated code", + ".*\\.pb\\.gw\\.go$": "generated code", + "github.com/cockroachdb/cockroach/.*_generated\\.go$": "generated code" + }, + "only_files": { + "github.com/cockroachdb/cockroach/.*$": "first-party code" + } + }, + "SA4018": { + "exclude_files": { + "github.com/cockroachdb/cockroach/.*\\.eg\\.go$": "generated code", + ".*\\.pb\\.go$": "generated code", + ".*\\.pb\\.gw\\.go$": "generated code", + "github.com/cockroachdb/cockroach/.*_generated\\.go$": "generated code" + }, + "only_files": { + "github.com/cockroachdb/cockroach/.*$": "first-party code" + } + }, + "SA4019": { + "exclude_files": { + "github.com/cockroachdb/cockroach/.*\\.eg\\.go$": "generated code", + ".*\\.pb\\.go$": "generated code", + ".*\\.pb\\.gw\\.go$": "generated code", + "github.com/cockroachdb/cockroach/.*_generated\\.go$": "generated code" + }, + "only_files": { + "github.com/cockroachdb/cockroach/.*$": "first-party code" + } + }, + "SA4020": { + "exclude_files": { + "github.com/cockroachdb/cockroach/.*\\.eg\\.go$": "generated code", + ".*\\.pb\\.go$": "generated code", + ".*\\.pb\\.gw\\.go$": "generated code", + "github.com/cockroachdb/cockroach/.*_generated\\.go$": "generated code" + }, + "only_files": { + "github.com/cockroachdb/cockroach/.*$": "first-party code" + } + }, + "SA4021": { + "exclude_files": { + "github.com/cockroachdb/cockroach/.*\\.eg\\.go$": "generated code", + ".*\\.pb\\.go$": "generated code", + ".*\\.pb\\.gw\\.go$": "generated code", + "github.com/cockroachdb/cockroach/.*_generated\\.go$": "generated code" + }, + "only_files": { + "github.com/cockroachdb/cockroach/.*$": "first-party code" + } + }, + "SA4022": { + "exclude_files": { + "github.com/cockroachdb/cockroach/.*\\.eg\\.go$": "generated code", + ".*\\.pb\\.go$": "generated code", + ".*\\.pb\\.gw\\.go$": "generated code", + "github.com/cockroachdb/cockroach/.*_generated\\.go$": "generated code" + }, + "only_files": { + "github.com/cockroachdb/cockroach/.*$": "first-party code" + } + }, + "SA4023": { + "exclude_files": { + "github.com/cockroachdb/cockroach/.*\\.eg\\.go$": "generated code", + ".*\\.pb\\.go$": "generated code", + ".*\\.pb\\.gw\\.go$": "generated code", + "github.com/cockroachdb/cockroach/.*_generated\\.go$": "generated code" + }, + "only_files": { + "github.com/cockroachdb/cockroach/.*$": "first-party code" + } + }, + "SA4024": { + "exclude_files": { + "github.com/cockroachdb/cockroach/.*\\.eg\\.go$": "generated code", + ".*\\.pb\\.go$": "generated code", + ".*\\.pb\\.gw\\.go$": "generated code", + "github.com/cockroachdb/cockroach/.*_generated\\.go$": "generated code" + }, + "only_files": { + "github.com/cockroachdb/cockroach/.*$": "first-party code" + } + }, + "SA4025": { + "exclude_files": { + "github.com/cockroachdb/cockroach/.*\\.eg\\.go$": "generated code", + ".*\\.pb\\.go$": "generated code", + ".*\\.pb\\.gw\\.go$": "generated code", + "github.com/cockroachdb/cockroach/.*_generated\\.go$": "generated code" + }, + "only_files": { + "github.com/cockroachdb/cockroach/.*$": "first-party code" + } + }, + "SA4026": { + "exclude_files": { + "github.com/cockroachdb/cockroach/.*\\.eg\\.go$": "generated code", + ".*\\.pb\\.go$": "generated code", + ".*\\.pb\\.gw\\.go$": "generated code", + "github.com/cockroachdb/cockroach/.*_generated\\.go$": "generated code" + }, + "only_files": { + "github.com/cockroachdb/cockroach/.*$": "first-party code" + } + }, + "SA4027": { + "exclude_files": { + "github.com/cockroachdb/cockroach/.*\\.eg\\.go$": "generated code", + ".*\\.pb\\.go$": "generated code", + ".*\\.pb\\.gw\\.go$": "generated code", + "github.com/cockroachdb/cockroach/.*_generated\\.go$": "generated code" + }, + "only_files": { + "github.com/cockroachdb/cockroach/.*$": "first-party code" + } + }, + "SA5000": { + "exclude_files": { + "github.com/cockroachdb/cockroach/.*\\.eg\\.go$": "generated code", + ".*\\.pb\\.go$": "generated code", + ".*\\.pb\\.gw\\.go$": "generated code", + "github.com/cockroachdb/cockroach/.*_generated\\.go$": "generated code" + }, + "only_files": { + "github.com/cockroachdb/cockroach/.*$": "first-party code" + } + }, + "SA5001": { + "exclude_files": { + "github.com/cockroachdb/cockroach/.*\\.eg\\.go$": "generated code", + ".*\\.pb\\.go$": "generated code", + ".*\\.pb\\.gw\\.go$": "generated code", + "github.com/cockroachdb/cockroach/.*_generated\\.go$": "generated code" + }, + "only_files": { + "github.com/cockroachdb/cockroach/.*$": "first-party code" + } + }, + "SA5002": { + "exclude_files": { + "github.com/cockroachdb/cockroach/.*\\.eg\\.go$": "generated code", + ".*\\.pb\\.go$": "generated code", + ".*\\.pb\\.gw\\.go$": "generated code", + "github.com/cockroachdb/cockroach/.*_generated\\.go$": "generated code" + }, + "only_files": { + "github.com/cockroachdb/cockroach/.*$": "first-party code" + } + }, + "SA5003": { + "exclude_files": { + "github.com/cockroachdb/cockroach/.*\\.eg\\.go$": "generated code", + ".*\\.pb\\.go$": "generated code", + ".*\\.pb\\.gw\\.go$": "generated code", + "github.com/cockroachdb/cockroach/.*_generated\\.go$": "generated code" + }, + "only_files": { + "github.com/cockroachdb/cockroach/.*$": "first-party code" + } + }, + "SA5004": { + "exclude_files": { + "github.com/cockroachdb/cockroach/.*\\.eg\\.go$": "generated code", + ".*\\.pb\\.go$": "generated code", + ".*\\.pb\\.gw\\.go$": "generated code", + "github.com/cockroachdb/cockroach/.*_generated\\.go$": "generated code" + }, + "only_files": { + "github.com/cockroachdb/cockroach/.*$": "first-party code" + } + }, + "SA5005": { + "exclude_files": { + "github.com/cockroachdb/cockroach/.*\\.eg\\.go$": "generated code", + ".*\\.pb\\.go$": "generated code", + ".*\\.pb\\.gw\\.go$": "generated code", + "github.com/cockroachdb/cockroach/.*_generated\\.go$": "generated code" + }, + "only_files": { + "github.com/cockroachdb/cockroach/.*$": "first-party code" + } + }, + "SA5007": { + "exclude_files": { + "github.com/cockroachdb/cockroach/.*\\.eg\\.go$": "generated code", + ".*\\.pb\\.go$": "generated code", + ".*\\.pb\\.gw\\.go$": "generated code", + "github.com/cockroachdb/cockroach/.*_generated\\.go$": "generated code" + }, + "only_files": { + "github.com/cockroachdb/cockroach/.*$": "first-party code" + } + }, + "SA5008": { + "exclude_files": { + "github.com/cockroachdb/cockroach/.*\\.eg\\.go$": "generated code", + ".*\\.pb\\.go$": "generated code", + ".*\\.pb\\.gw\\.go$": "generated code", + "github.com/cockroachdb/cockroach/.*_generated\\.go$": "generated code" + }, + "only_files": { + "github.com/cockroachdb/cockroach/.*$": "first-party code" + } + }, + "SA5009": { + "exclude_files": { + "github.com/cockroachdb/cockroach/.*\\.eg\\.go$": "generated code", + ".*\\.pb\\.go$": "generated code", + ".*\\.pb\\.gw\\.go$": "generated code", + "github.com/cockroachdb/cockroach/.*_generated\\.go$": "generated code" + }, + "only_files": { + "github.com/cockroachdb/cockroach/.*$": "first-party code" + } + }, + "SA5010": { + "exclude_files": { + "github.com/cockroachdb/cockroach/.*\\.eg\\.go$": "generated code", + ".*\\.pb\\.go$": "generated code", + ".*\\.pb\\.gw\\.go$": "generated code", + "github.com/cockroachdb/cockroach/.*_generated\\.go$": "generated code" + }, + "only_files": { + "github.com/cockroachdb/cockroach/.*$": "first-party code" + } + }, + "SA5011": { + "exclude_files": { + "_test\\.go$": "tests", + "github.com/cockroachdb/cockroach/.*\\.eg\\.go$": "generated code", + ".*\\.pb\\.go$": "generated code", + ".*\\.pb\\.gw\\.go$": "generated code", + "github.com/cockroachdb/cockroach/.*_generated\\.go$": "generated code" + }, + "only_files": { + "github.com/cockroachdb/cockroach/.*$": "first-party code" + } + }, + "SA5012": { + "exclude_files": { + "github.com/cockroachdb/cockroach/.*\\.eg\\.go$": "generated code", + ".*\\.pb\\.go$": "generated code", + ".*\\.pb\\.gw\\.go$": "generated code", + "github.com/cockroachdb/cockroach/.*_generated\\.go$": "generated code" + }, + "only_files": { + "github.com/cockroachdb/cockroach/.*$": "first-party code" + } + }, + "SA6000": { + "exclude_files": { + "github.com/cockroachdb/cockroach/.*\\.eg\\.go$": "generated code", + ".*\\.pb\\.go$": "generated code", + ".*\\.pb\\.gw\\.go$": "generated code", + "github.com/cockroachdb/cockroach/.*_generated\\.go$": "generated code" + }, + "only_files": { + "github.com/cockroachdb/cockroach/.*$": "first-party code" + } + }, + "SA6001": { + "exclude_files": { + "github.com/cockroachdb/cockroach/.*\\.eg\\.go$": "generated code", + ".*\\.pb\\.go$": "generated code", + ".*\\.pb\\.gw\\.go$": "generated code", + "github.com/cockroachdb/cockroach/.*_generated\\.go$": "generated code" + }, + "only_files": { + "github.com/cockroachdb/cockroach/.*$": "first-party code" + } + }, + "SA6002": { + "exclude_files": { + "github.com/cockroachdb/cockroach/.*\\.eg\\.go$": "generated code", + ".*\\.pb\\.go$": "generated code", + ".*\\.pb\\.gw\\.go$": "generated code", + "github.com/cockroachdb/cockroach/.*_generated\\.go$": "generated code" + }, + "only_files": { + "github.com/cockroachdb/cockroach/.*$": "first-party code" + } + }, + "SA6003": { + "exclude_files": { + "github.com/cockroachdb/cockroach/.*\\.eg\\.go$": "generated code", + ".*\\.pb\\.go$": "generated code", + ".*\\.pb\\.gw\\.go$": "generated code", + "github.com/cockroachdb/cockroach/.*_generated\\.go$": "generated code" + }, + "only_files": { + "github.com/cockroachdb/cockroach/.*$": "first-party code" + } + }, + "SA6005": { + "exclude_files": { + "github.com/cockroachdb/cockroach/.*\\.eg\\.go$": "generated code", + ".*\\.pb\\.go$": "generated code", + ".*\\.pb\\.gw\\.go$": "generated code", + "github.com/cockroachdb/cockroach/.*_generated\\.go$": "generated code" + }, + "only_files": { + "github.com/cockroachdb/cockroach/.*$": "first-party code" + } + }, + "SA9001": { + "exclude_files": { + "github.com/cockroachdb/cockroach/.*\\.eg\\.go$": "generated code", + ".*\\.pb\\.go$": "generated code", + ".*\\.pb\\.gw\\.go$": "generated code", + "github.com/cockroachdb/cockroach/.*_generated\\.go$": "generated code" + }, + "only_files": { + "github.com/cockroachdb/cockroach/.*$": "first-party code" + } + }, + "SA9002": { + "exclude_files": { + "github.com/cockroachdb/cockroach/.*\\.eg\\.go$": "generated code", + ".*\\.pb\\.go$": "generated code", + ".*\\.pb\\.gw\\.go$": "generated code", + "github.com/cockroachdb/cockroach/.*_generated\\.go$": "generated code" + }, + "only_files": { + "github.com/cockroachdb/cockroach/.*$": "first-party code" + } + }, + "SA9003": { + "exclude_files": { + "github.com/cockroachdb/cockroach/.*\\.eg\\.go$": "generated code", + ".*\\.pb\\.go$": "generated code", + ".*\\.pb\\.gw\\.go$": "generated code", + "github.com/cockroachdb/cockroach/.*_generated\\.go$": "generated code" + }, + "only_files": { + "github.com/cockroachdb/cockroach/.*$": "first-party code" + } + }, + "SA9004": { + "exclude_files": { + "github.com/cockroachdb/cockroach/.*\\.eg\\.go$": "generated code", + ".*\\.pb\\.go$": "generated code", + ".*\\.pb\\.gw\\.go$": "generated code", + "github.com/cockroachdb/cockroach/.*_generated\\.go$": "generated code" + }, + "only_files": { + "github.com/cockroachdb/cockroach/.*$": "first-party code" + } + }, + "SA9005": { + "exclude_files": { + "github.com/cockroachdb/cockroach/.*\\.eg\\.go$": "generated code", + ".*\\.pb\\.go$": "generated code", + ".*\\.pb\\.gw\\.go$": "generated code", + "github.com/cockroachdb/cockroach/.*_generated\\.go$": "generated code" + }, + "only_files": { + "github.com/cockroachdb/cockroach/.*$": "first-party code" + } + }, + "SA9006": { + "exclude_files": { + "github.com/cockroachdb/cockroach/.*\\.eg\\.go$": "generated code", + ".*\\.pb\\.go$": "generated code", + ".*\\.pb\\.gw\\.go$": "generated code", + "github.com/cockroachdb/cockroach/.*_generated\\.go$": "generated code" + }, + "only_files": { + "github.com/cockroachdb/cockroach/.*$": "first-party code" + } + }, "stdmethods": { "only_files": { "github.com/cockroachdb/cockroach/.*$": "first-party code" diff --git a/build/bazelutil/staticcheckanalyzers/BUILD.bazel b/build/bazelutil/staticcheckanalyzers/BUILD.bazel new file mode 100644 index 000000000000..50f545d6c4e4 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/BUILD.bazel @@ -0,0 +1 @@ +exports_files(["def.bzl"]) diff --git a/build/bazelutil/staticcheckanalyzers/README.md b/build/bazelutil/staticcheckanalyzers/README.md new file mode 100644 index 000000000000..7a8ef54e330b --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/README.md @@ -0,0 +1 @@ +All of the code in this directory is generated by generate-staticcheck for use in Bazel. diff --git a/build/bazelutil/staticcheckanalyzers/def.bzl b/build/bazelutil/staticcheckanalyzers/def.bzl new file mode 100644 index 000000000000..362e48566fbb --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/def.bzl @@ -0,0 +1,123 @@ +# Code generated by generate-staticcheck; DO NOT EDIT. + +STATICCHECK_CHECKS = [ + "//build/bazelutil/staticcheckanalyzers/s1000", + "//build/bazelutil/staticcheckanalyzers/s1001", + "//build/bazelutil/staticcheckanalyzers/s1002", + "//build/bazelutil/staticcheckanalyzers/s1003", + "//build/bazelutil/staticcheckanalyzers/s1004", + "//build/bazelutil/staticcheckanalyzers/s1005", + "//build/bazelutil/staticcheckanalyzers/s1006", + "//build/bazelutil/staticcheckanalyzers/s1007", + "//build/bazelutil/staticcheckanalyzers/s1008", + "//build/bazelutil/staticcheckanalyzers/s1009", + "//build/bazelutil/staticcheckanalyzers/s1010", + "//build/bazelutil/staticcheckanalyzers/s1011", + "//build/bazelutil/staticcheckanalyzers/s1012", + "//build/bazelutil/staticcheckanalyzers/s1016", + "//build/bazelutil/staticcheckanalyzers/s1017", + "//build/bazelutil/staticcheckanalyzers/s1018", + "//build/bazelutil/staticcheckanalyzers/s1019", + "//build/bazelutil/staticcheckanalyzers/s1020", + "//build/bazelutil/staticcheckanalyzers/s1021", + "//build/bazelutil/staticcheckanalyzers/s1023", + "//build/bazelutil/staticcheckanalyzers/s1024", + "//build/bazelutil/staticcheckanalyzers/s1025", + "//build/bazelutil/staticcheckanalyzers/s1028", + "//build/bazelutil/staticcheckanalyzers/s1029", + "//build/bazelutil/staticcheckanalyzers/s1030", + "//build/bazelutil/staticcheckanalyzers/s1031", + "//build/bazelutil/staticcheckanalyzers/s1032", + "//build/bazelutil/staticcheckanalyzers/s1033", + "//build/bazelutil/staticcheckanalyzers/s1034", + "//build/bazelutil/staticcheckanalyzers/s1035", + "//build/bazelutil/staticcheckanalyzers/s1036", + "//build/bazelutil/staticcheckanalyzers/s1037", + "//build/bazelutil/staticcheckanalyzers/s1038", + "//build/bazelutil/staticcheckanalyzers/s1039", + "//build/bazelutil/staticcheckanalyzers/s1040", + "//build/bazelutil/staticcheckanalyzers/sa1000", + "//build/bazelutil/staticcheckanalyzers/sa1001", + "//build/bazelutil/staticcheckanalyzers/sa1002", + "//build/bazelutil/staticcheckanalyzers/sa1003", + "//build/bazelutil/staticcheckanalyzers/sa1004", + "//build/bazelutil/staticcheckanalyzers/sa1005", + "//build/bazelutil/staticcheckanalyzers/sa1006", + "//build/bazelutil/staticcheckanalyzers/sa1007", + "//build/bazelutil/staticcheckanalyzers/sa1008", + "//build/bazelutil/staticcheckanalyzers/sa1010", + "//build/bazelutil/staticcheckanalyzers/sa1011", + "//build/bazelutil/staticcheckanalyzers/sa1012", + "//build/bazelutil/staticcheckanalyzers/sa1013", + "//build/bazelutil/staticcheckanalyzers/sa1014", + "//build/bazelutil/staticcheckanalyzers/sa1015", + "//build/bazelutil/staticcheckanalyzers/sa1016", + "//build/bazelutil/staticcheckanalyzers/sa1017", + "//build/bazelutil/staticcheckanalyzers/sa1018", + "//build/bazelutil/staticcheckanalyzers/sa1019", + "//build/bazelutil/staticcheckanalyzers/sa1020", + "//build/bazelutil/staticcheckanalyzers/sa1021", + "//build/bazelutil/staticcheckanalyzers/sa1023", + "//build/bazelutil/staticcheckanalyzers/sa1024", + "//build/bazelutil/staticcheckanalyzers/sa1025", + "//build/bazelutil/staticcheckanalyzers/sa1026", + "//build/bazelutil/staticcheckanalyzers/sa1027", + "//build/bazelutil/staticcheckanalyzers/sa1028", + "//build/bazelutil/staticcheckanalyzers/sa1029", + "//build/bazelutil/staticcheckanalyzers/sa1030", + "//build/bazelutil/staticcheckanalyzers/sa2000", + "//build/bazelutil/staticcheckanalyzers/sa2001", + "//build/bazelutil/staticcheckanalyzers/sa2002", + "//build/bazelutil/staticcheckanalyzers/sa2003", + "//build/bazelutil/staticcheckanalyzers/sa3000", + "//build/bazelutil/staticcheckanalyzers/sa3001", + "//build/bazelutil/staticcheckanalyzers/sa4000", + "//build/bazelutil/staticcheckanalyzers/sa4001", + "//build/bazelutil/staticcheckanalyzers/sa4003", + "//build/bazelutil/staticcheckanalyzers/sa4004", + "//build/bazelutil/staticcheckanalyzers/sa4005", + "//build/bazelutil/staticcheckanalyzers/sa4006", + "//build/bazelutil/staticcheckanalyzers/sa4008", + "//build/bazelutil/staticcheckanalyzers/sa4009", + "//build/bazelutil/staticcheckanalyzers/sa4010", + "//build/bazelutil/staticcheckanalyzers/sa4011", + "//build/bazelutil/staticcheckanalyzers/sa4012", + "//build/bazelutil/staticcheckanalyzers/sa4013", + "//build/bazelutil/staticcheckanalyzers/sa4014", + "//build/bazelutil/staticcheckanalyzers/sa4015", + "//build/bazelutil/staticcheckanalyzers/sa4016", + "//build/bazelutil/staticcheckanalyzers/sa4017", + "//build/bazelutil/staticcheckanalyzers/sa4018", + "//build/bazelutil/staticcheckanalyzers/sa4019", + "//build/bazelutil/staticcheckanalyzers/sa4020", + "//build/bazelutil/staticcheckanalyzers/sa4021", + "//build/bazelutil/staticcheckanalyzers/sa4022", + "//build/bazelutil/staticcheckanalyzers/sa4023", + "//build/bazelutil/staticcheckanalyzers/sa4024", + "//build/bazelutil/staticcheckanalyzers/sa4025", + "//build/bazelutil/staticcheckanalyzers/sa4026", + "//build/bazelutil/staticcheckanalyzers/sa4027", + "//build/bazelutil/staticcheckanalyzers/sa5000", + "//build/bazelutil/staticcheckanalyzers/sa5001", + "//build/bazelutil/staticcheckanalyzers/sa5002", + "//build/bazelutil/staticcheckanalyzers/sa5003", + "//build/bazelutil/staticcheckanalyzers/sa5004", + "//build/bazelutil/staticcheckanalyzers/sa5005", + "//build/bazelutil/staticcheckanalyzers/sa5007", + "//build/bazelutil/staticcheckanalyzers/sa5008", + "//build/bazelutil/staticcheckanalyzers/sa5009", + "//build/bazelutil/staticcheckanalyzers/sa5010", + "//build/bazelutil/staticcheckanalyzers/sa5011", + "//build/bazelutil/staticcheckanalyzers/sa5012", + "//build/bazelutil/staticcheckanalyzers/sa6000", + "//build/bazelutil/staticcheckanalyzers/sa6001", + "//build/bazelutil/staticcheckanalyzers/sa6002", + "//build/bazelutil/staticcheckanalyzers/sa6003", + "//build/bazelutil/staticcheckanalyzers/sa6005", + "//build/bazelutil/staticcheckanalyzers/sa9001", + "//build/bazelutil/staticcheckanalyzers/sa9002", + "//build/bazelutil/staticcheckanalyzers/sa9003", + "//build/bazelutil/staticcheckanalyzers/sa9004", + "//build/bazelutil/staticcheckanalyzers/sa9005", + "//build/bazelutil/staticcheckanalyzers/sa9006", +] diff --git a/build/bazelutil/staticcheckanalyzers/s1000/BUILD.bazel b/build/bazelutil/staticcheckanalyzers/s1000/BUILD.bazel new file mode 100644 index 000000000000..96e279f3e950 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/s1000/BUILD.bazel @@ -0,0 +1,13 @@ +load("@io_bazel_rules_go//go:def.bzl", "go_library") + +go_library( + name = "s1000", + srcs = ["analyzer.go"], + importpath = "github.com/cockroachdb/cockroach/build/bazelutil/staticcheckanalyzers/s1000", + visibility = ["//visibility:public"], + deps = [ + "//pkg/testutils/lint/passes/staticcheck", + "@co_honnef_go_tools//simple", + "@org_golang_x_tools//go/analysis", + ], +) diff --git a/build/bazelutil/staticcheckanalyzers/s1000/analyzer.go b/build/bazelutil/staticcheckanalyzers/s1000/analyzer.go new file mode 100644 index 000000000000..873450b37983 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/s1000/analyzer.go @@ -0,0 +1,24 @@ +// Code generated by generate-staticcheck; DO NOT EDIT. + +//go:build bazel +// +build bazel + +package s1000 + +import ( + util "github.com/cockroachdb/cockroach/pkg/testutils/lint/passes/staticcheck" + "golang.org/x/tools/go/analysis" + "honnef.co/go/tools/simple" +) + +var Analyzer *analysis.Analyzer + +func init() { + for _, analyzer := range simple.Analyzers { + if analyzer.Analyzer.Name == "S1000" { + Analyzer = analyzer.Analyzer + break + } + } + util.MungeAnalyzer(Analyzer) +} diff --git a/build/bazelutil/staticcheckanalyzers/s1001/BUILD.bazel b/build/bazelutil/staticcheckanalyzers/s1001/BUILD.bazel new file mode 100644 index 000000000000..bd92983c2513 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/s1001/BUILD.bazel @@ -0,0 +1,13 @@ +load("@io_bazel_rules_go//go:def.bzl", "go_library") + +go_library( + name = "s1001", + srcs = ["analyzer.go"], + importpath = "github.com/cockroachdb/cockroach/build/bazelutil/staticcheckanalyzers/s1001", + visibility = ["//visibility:public"], + deps = [ + "//pkg/testutils/lint/passes/staticcheck", + "@co_honnef_go_tools//simple", + "@org_golang_x_tools//go/analysis", + ], +) diff --git a/build/bazelutil/staticcheckanalyzers/s1001/analyzer.go b/build/bazelutil/staticcheckanalyzers/s1001/analyzer.go new file mode 100644 index 000000000000..48a87bf68ae2 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/s1001/analyzer.go @@ -0,0 +1,24 @@ +// Code generated by generate-staticcheck; DO NOT EDIT. + +//go:build bazel +// +build bazel + +package s1001 + +import ( + util "github.com/cockroachdb/cockroach/pkg/testutils/lint/passes/staticcheck" + "golang.org/x/tools/go/analysis" + "honnef.co/go/tools/simple" +) + +var Analyzer *analysis.Analyzer + +func init() { + for _, analyzer := range simple.Analyzers { + if analyzer.Analyzer.Name == "S1001" { + Analyzer = analyzer.Analyzer + break + } + } + util.MungeAnalyzer(Analyzer) +} diff --git a/build/bazelutil/staticcheckanalyzers/s1002/BUILD.bazel b/build/bazelutil/staticcheckanalyzers/s1002/BUILD.bazel new file mode 100644 index 000000000000..c1f72e380e41 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/s1002/BUILD.bazel @@ -0,0 +1,13 @@ +load("@io_bazel_rules_go//go:def.bzl", "go_library") + +go_library( + name = "s1002", + srcs = ["analyzer.go"], + importpath = "github.com/cockroachdb/cockroach/build/bazelutil/staticcheckanalyzers/s1002", + visibility = ["//visibility:public"], + deps = [ + "//pkg/testutils/lint/passes/staticcheck", + "@co_honnef_go_tools//simple", + "@org_golang_x_tools//go/analysis", + ], +) diff --git a/build/bazelutil/staticcheckanalyzers/s1002/analyzer.go b/build/bazelutil/staticcheckanalyzers/s1002/analyzer.go new file mode 100644 index 000000000000..f09edb662c6a --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/s1002/analyzer.go @@ -0,0 +1,24 @@ +// Code generated by generate-staticcheck; DO NOT EDIT. + +//go:build bazel +// +build bazel + +package s1002 + +import ( + util "github.com/cockroachdb/cockroach/pkg/testutils/lint/passes/staticcheck" + "golang.org/x/tools/go/analysis" + "honnef.co/go/tools/simple" +) + +var Analyzer *analysis.Analyzer + +func init() { + for _, analyzer := range simple.Analyzers { + if analyzer.Analyzer.Name == "S1002" { + Analyzer = analyzer.Analyzer + break + } + } + util.MungeAnalyzer(Analyzer) +} diff --git a/build/bazelutil/staticcheckanalyzers/s1003/BUILD.bazel b/build/bazelutil/staticcheckanalyzers/s1003/BUILD.bazel new file mode 100644 index 000000000000..1aaac650a5fa --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/s1003/BUILD.bazel @@ -0,0 +1,13 @@ +load("@io_bazel_rules_go//go:def.bzl", "go_library") + +go_library( + name = "s1003", + srcs = ["analyzer.go"], + importpath = "github.com/cockroachdb/cockroach/build/bazelutil/staticcheckanalyzers/s1003", + visibility = ["//visibility:public"], + deps = [ + "//pkg/testutils/lint/passes/staticcheck", + "@co_honnef_go_tools//simple", + "@org_golang_x_tools//go/analysis", + ], +) diff --git a/build/bazelutil/staticcheckanalyzers/s1003/analyzer.go b/build/bazelutil/staticcheckanalyzers/s1003/analyzer.go new file mode 100644 index 000000000000..55946edc1117 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/s1003/analyzer.go @@ -0,0 +1,24 @@ +// Code generated by generate-staticcheck; DO NOT EDIT. + +//go:build bazel +// +build bazel + +package s1003 + +import ( + util "github.com/cockroachdb/cockroach/pkg/testutils/lint/passes/staticcheck" + "golang.org/x/tools/go/analysis" + "honnef.co/go/tools/simple" +) + +var Analyzer *analysis.Analyzer + +func init() { + for _, analyzer := range simple.Analyzers { + if analyzer.Analyzer.Name == "S1003" { + Analyzer = analyzer.Analyzer + break + } + } + util.MungeAnalyzer(Analyzer) +} diff --git a/build/bazelutil/staticcheckanalyzers/s1004/BUILD.bazel b/build/bazelutil/staticcheckanalyzers/s1004/BUILD.bazel new file mode 100644 index 000000000000..653a9456806c --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/s1004/BUILD.bazel @@ -0,0 +1,13 @@ +load("@io_bazel_rules_go//go:def.bzl", "go_library") + +go_library( + name = "s1004", + srcs = ["analyzer.go"], + importpath = "github.com/cockroachdb/cockroach/build/bazelutil/staticcheckanalyzers/s1004", + visibility = ["//visibility:public"], + deps = [ + "//pkg/testutils/lint/passes/staticcheck", + "@co_honnef_go_tools//simple", + "@org_golang_x_tools//go/analysis", + ], +) diff --git a/build/bazelutil/staticcheckanalyzers/s1004/analyzer.go b/build/bazelutil/staticcheckanalyzers/s1004/analyzer.go new file mode 100644 index 000000000000..fae3860850c8 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/s1004/analyzer.go @@ -0,0 +1,24 @@ +// Code generated by generate-staticcheck; DO NOT EDIT. + +//go:build bazel +// +build bazel + +package s1004 + +import ( + util "github.com/cockroachdb/cockroach/pkg/testutils/lint/passes/staticcheck" + "golang.org/x/tools/go/analysis" + "honnef.co/go/tools/simple" +) + +var Analyzer *analysis.Analyzer + +func init() { + for _, analyzer := range simple.Analyzers { + if analyzer.Analyzer.Name == "S1004" { + Analyzer = analyzer.Analyzer + break + } + } + util.MungeAnalyzer(Analyzer) +} diff --git a/build/bazelutil/staticcheckanalyzers/s1005/BUILD.bazel b/build/bazelutil/staticcheckanalyzers/s1005/BUILD.bazel new file mode 100644 index 000000000000..9fb5c1a7eb63 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/s1005/BUILD.bazel @@ -0,0 +1,13 @@ +load("@io_bazel_rules_go//go:def.bzl", "go_library") + +go_library( + name = "s1005", + srcs = ["analyzer.go"], + importpath = "github.com/cockroachdb/cockroach/build/bazelutil/staticcheckanalyzers/s1005", + visibility = ["//visibility:public"], + deps = [ + "//pkg/testutils/lint/passes/staticcheck", + "@co_honnef_go_tools//simple", + "@org_golang_x_tools//go/analysis", + ], +) diff --git a/build/bazelutil/staticcheckanalyzers/s1005/analyzer.go b/build/bazelutil/staticcheckanalyzers/s1005/analyzer.go new file mode 100644 index 000000000000..575023ad6910 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/s1005/analyzer.go @@ -0,0 +1,24 @@ +// Code generated by generate-staticcheck; DO NOT EDIT. + +//go:build bazel +// +build bazel + +package s1005 + +import ( + util "github.com/cockroachdb/cockroach/pkg/testutils/lint/passes/staticcheck" + "golang.org/x/tools/go/analysis" + "honnef.co/go/tools/simple" +) + +var Analyzer *analysis.Analyzer + +func init() { + for _, analyzer := range simple.Analyzers { + if analyzer.Analyzer.Name == "S1005" { + Analyzer = analyzer.Analyzer + break + } + } + util.MungeAnalyzer(Analyzer) +} diff --git a/build/bazelutil/staticcheckanalyzers/s1006/BUILD.bazel b/build/bazelutil/staticcheckanalyzers/s1006/BUILD.bazel new file mode 100644 index 000000000000..712621889385 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/s1006/BUILD.bazel @@ -0,0 +1,13 @@ +load("@io_bazel_rules_go//go:def.bzl", "go_library") + +go_library( + name = "s1006", + srcs = ["analyzer.go"], + importpath = "github.com/cockroachdb/cockroach/build/bazelutil/staticcheckanalyzers/s1006", + visibility = ["//visibility:public"], + deps = [ + "//pkg/testutils/lint/passes/staticcheck", + "@co_honnef_go_tools//simple", + "@org_golang_x_tools//go/analysis", + ], +) diff --git a/build/bazelutil/staticcheckanalyzers/s1006/analyzer.go b/build/bazelutil/staticcheckanalyzers/s1006/analyzer.go new file mode 100644 index 000000000000..4e6d35a1aa63 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/s1006/analyzer.go @@ -0,0 +1,24 @@ +// Code generated by generate-staticcheck; DO NOT EDIT. + +//go:build bazel +// +build bazel + +package s1006 + +import ( + util "github.com/cockroachdb/cockroach/pkg/testutils/lint/passes/staticcheck" + "golang.org/x/tools/go/analysis" + "honnef.co/go/tools/simple" +) + +var Analyzer *analysis.Analyzer + +func init() { + for _, analyzer := range simple.Analyzers { + if analyzer.Analyzer.Name == "S1006" { + Analyzer = analyzer.Analyzer + break + } + } + util.MungeAnalyzer(Analyzer) +} diff --git a/build/bazelutil/staticcheckanalyzers/s1007/BUILD.bazel b/build/bazelutil/staticcheckanalyzers/s1007/BUILD.bazel new file mode 100644 index 000000000000..9533db0316d2 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/s1007/BUILD.bazel @@ -0,0 +1,13 @@ +load("@io_bazel_rules_go//go:def.bzl", "go_library") + +go_library( + name = "s1007", + srcs = ["analyzer.go"], + importpath = "github.com/cockroachdb/cockroach/build/bazelutil/staticcheckanalyzers/s1007", + visibility = ["//visibility:public"], + deps = [ + "//pkg/testutils/lint/passes/staticcheck", + "@co_honnef_go_tools//simple", + "@org_golang_x_tools//go/analysis", + ], +) diff --git a/build/bazelutil/staticcheckanalyzers/s1007/analyzer.go b/build/bazelutil/staticcheckanalyzers/s1007/analyzer.go new file mode 100644 index 000000000000..72f893353669 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/s1007/analyzer.go @@ -0,0 +1,24 @@ +// Code generated by generate-staticcheck; DO NOT EDIT. + +//go:build bazel +// +build bazel + +package s1007 + +import ( + util "github.com/cockroachdb/cockroach/pkg/testutils/lint/passes/staticcheck" + "golang.org/x/tools/go/analysis" + "honnef.co/go/tools/simple" +) + +var Analyzer *analysis.Analyzer + +func init() { + for _, analyzer := range simple.Analyzers { + if analyzer.Analyzer.Name == "S1007" { + Analyzer = analyzer.Analyzer + break + } + } + util.MungeAnalyzer(Analyzer) +} diff --git a/build/bazelutil/staticcheckanalyzers/s1008/BUILD.bazel b/build/bazelutil/staticcheckanalyzers/s1008/BUILD.bazel new file mode 100644 index 000000000000..7b794b9c4280 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/s1008/BUILD.bazel @@ -0,0 +1,13 @@ +load("@io_bazel_rules_go//go:def.bzl", "go_library") + +go_library( + name = "s1008", + srcs = ["analyzer.go"], + importpath = "github.com/cockroachdb/cockroach/build/bazelutil/staticcheckanalyzers/s1008", + visibility = ["//visibility:public"], + deps = [ + "//pkg/testutils/lint/passes/staticcheck", + "@co_honnef_go_tools//simple", + "@org_golang_x_tools//go/analysis", + ], +) diff --git a/build/bazelutil/staticcheckanalyzers/s1008/analyzer.go b/build/bazelutil/staticcheckanalyzers/s1008/analyzer.go new file mode 100644 index 000000000000..c74632c326a8 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/s1008/analyzer.go @@ -0,0 +1,24 @@ +// Code generated by generate-staticcheck; DO NOT EDIT. + +//go:build bazel +// +build bazel + +package s1008 + +import ( + util "github.com/cockroachdb/cockroach/pkg/testutils/lint/passes/staticcheck" + "golang.org/x/tools/go/analysis" + "honnef.co/go/tools/simple" +) + +var Analyzer *analysis.Analyzer + +func init() { + for _, analyzer := range simple.Analyzers { + if analyzer.Analyzer.Name == "S1008" { + Analyzer = analyzer.Analyzer + break + } + } + util.MungeAnalyzer(Analyzer) +} diff --git a/build/bazelutil/staticcheckanalyzers/s1009/BUILD.bazel b/build/bazelutil/staticcheckanalyzers/s1009/BUILD.bazel new file mode 100644 index 000000000000..de68c1e43112 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/s1009/BUILD.bazel @@ -0,0 +1,13 @@ +load("@io_bazel_rules_go//go:def.bzl", "go_library") + +go_library( + name = "s1009", + srcs = ["analyzer.go"], + importpath = "github.com/cockroachdb/cockroach/build/bazelutil/staticcheckanalyzers/s1009", + visibility = ["//visibility:public"], + deps = [ + "//pkg/testutils/lint/passes/staticcheck", + "@co_honnef_go_tools//simple", + "@org_golang_x_tools//go/analysis", + ], +) diff --git a/build/bazelutil/staticcheckanalyzers/s1009/analyzer.go b/build/bazelutil/staticcheckanalyzers/s1009/analyzer.go new file mode 100644 index 000000000000..0607068f3161 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/s1009/analyzer.go @@ -0,0 +1,24 @@ +// Code generated by generate-staticcheck; DO NOT EDIT. + +//go:build bazel +// +build bazel + +package s1009 + +import ( + util "github.com/cockroachdb/cockroach/pkg/testutils/lint/passes/staticcheck" + "golang.org/x/tools/go/analysis" + "honnef.co/go/tools/simple" +) + +var Analyzer *analysis.Analyzer + +func init() { + for _, analyzer := range simple.Analyzers { + if analyzer.Analyzer.Name == "S1009" { + Analyzer = analyzer.Analyzer + break + } + } + util.MungeAnalyzer(Analyzer) +} diff --git a/build/bazelutil/staticcheckanalyzers/s1010/BUILD.bazel b/build/bazelutil/staticcheckanalyzers/s1010/BUILD.bazel new file mode 100644 index 000000000000..046c5396c388 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/s1010/BUILD.bazel @@ -0,0 +1,13 @@ +load("@io_bazel_rules_go//go:def.bzl", "go_library") + +go_library( + name = "s1010", + srcs = ["analyzer.go"], + importpath = "github.com/cockroachdb/cockroach/build/bazelutil/staticcheckanalyzers/s1010", + visibility = ["//visibility:public"], + deps = [ + "//pkg/testutils/lint/passes/staticcheck", + "@co_honnef_go_tools//simple", + "@org_golang_x_tools//go/analysis", + ], +) diff --git a/build/bazelutil/staticcheckanalyzers/s1010/analyzer.go b/build/bazelutil/staticcheckanalyzers/s1010/analyzer.go new file mode 100644 index 000000000000..ca2f98aef586 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/s1010/analyzer.go @@ -0,0 +1,24 @@ +// Code generated by generate-staticcheck; DO NOT EDIT. + +//go:build bazel +// +build bazel + +package s1010 + +import ( + util "github.com/cockroachdb/cockroach/pkg/testutils/lint/passes/staticcheck" + "golang.org/x/tools/go/analysis" + "honnef.co/go/tools/simple" +) + +var Analyzer *analysis.Analyzer + +func init() { + for _, analyzer := range simple.Analyzers { + if analyzer.Analyzer.Name == "S1010" { + Analyzer = analyzer.Analyzer + break + } + } + util.MungeAnalyzer(Analyzer) +} diff --git a/build/bazelutil/staticcheckanalyzers/s1011/BUILD.bazel b/build/bazelutil/staticcheckanalyzers/s1011/BUILD.bazel new file mode 100644 index 000000000000..c6812b7ac267 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/s1011/BUILD.bazel @@ -0,0 +1,13 @@ +load("@io_bazel_rules_go//go:def.bzl", "go_library") + +go_library( + name = "s1011", + srcs = ["analyzer.go"], + importpath = "github.com/cockroachdb/cockroach/build/bazelutil/staticcheckanalyzers/s1011", + visibility = ["//visibility:public"], + deps = [ + "//pkg/testutils/lint/passes/staticcheck", + "@co_honnef_go_tools//simple", + "@org_golang_x_tools//go/analysis", + ], +) diff --git a/build/bazelutil/staticcheckanalyzers/s1011/analyzer.go b/build/bazelutil/staticcheckanalyzers/s1011/analyzer.go new file mode 100644 index 000000000000..d740d277d985 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/s1011/analyzer.go @@ -0,0 +1,24 @@ +// Code generated by generate-staticcheck; DO NOT EDIT. + +//go:build bazel +// +build bazel + +package s1011 + +import ( + util "github.com/cockroachdb/cockroach/pkg/testutils/lint/passes/staticcheck" + "golang.org/x/tools/go/analysis" + "honnef.co/go/tools/simple" +) + +var Analyzer *analysis.Analyzer + +func init() { + for _, analyzer := range simple.Analyzers { + if analyzer.Analyzer.Name == "S1011" { + Analyzer = analyzer.Analyzer + break + } + } + util.MungeAnalyzer(Analyzer) +} diff --git a/build/bazelutil/staticcheckanalyzers/s1012/BUILD.bazel b/build/bazelutil/staticcheckanalyzers/s1012/BUILD.bazel new file mode 100644 index 000000000000..7dbd0d558a3c --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/s1012/BUILD.bazel @@ -0,0 +1,13 @@ +load("@io_bazel_rules_go//go:def.bzl", "go_library") + +go_library( + name = "s1012", + srcs = ["analyzer.go"], + importpath = "github.com/cockroachdb/cockroach/build/bazelutil/staticcheckanalyzers/s1012", + visibility = ["//visibility:public"], + deps = [ + "//pkg/testutils/lint/passes/staticcheck", + "@co_honnef_go_tools//simple", + "@org_golang_x_tools//go/analysis", + ], +) diff --git a/build/bazelutil/staticcheckanalyzers/s1012/analyzer.go b/build/bazelutil/staticcheckanalyzers/s1012/analyzer.go new file mode 100644 index 000000000000..3161722226f2 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/s1012/analyzer.go @@ -0,0 +1,24 @@ +// Code generated by generate-staticcheck; DO NOT EDIT. + +//go:build bazel +// +build bazel + +package s1012 + +import ( + util "github.com/cockroachdb/cockroach/pkg/testutils/lint/passes/staticcheck" + "golang.org/x/tools/go/analysis" + "honnef.co/go/tools/simple" +) + +var Analyzer *analysis.Analyzer + +func init() { + for _, analyzer := range simple.Analyzers { + if analyzer.Analyzer.Name == "S1012" { + Analyzer = analyzer.Analyzer + break + } + } + util.MungeAnalyzer(Analyzer) +} diff --git a/build/bazelutil/staticcheckanalyzers/s1016/BUILD.bazel b/build/bazelutil/staticcheckanalyzers/s1016/BUILD.bazel new file mode 100644 index 000000000000..a1667919777c --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/s1016/BUILD.bazel @@ -0,0 +1,13 @@ +load("@io_bazel_rules_go//go:def.bzl", "go_library") + +go_library( + name = "s1016", + srcs = ["analyzer.go"], + importpath = "github.com/cockroachdb/cockroach/build/bazelutil/staticcheckanalyzers/s1016", + visibility = ["//visibility:public"], + deps = [ + "//pkg/testutils/lint/passes/staticcheck", + "@co_honnef_go_tools//simple", + "@org_golang_x_tools//go/analysis", + ], +) diff --git a/build/bazelutil/staticcheckanalyzers/s1016/analyzer.go b/build/bazelutil/staticcheckanalyzers/s1016/analyzer.go new file mode 100644 index 000000000000..5897bdd06e27 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/s1016/analyzer.go @@ -0,0 +1,24 @@ +// Code generated by generate-staticcheck; DO NOT EDIT. + +//go:build bazel +// +build bazel + +package s1016 + +import ( + util "github.com/cockroachdb/cockroach/pkg/testutils/lint/passes/staticcheck" + "golang.org/x/tools/go/analysis" + "honnef.co/go/tools/simple" +) + +var Analyzer *analysis.Analyzer + +func init() { + for _, analyzer := range simple.Analyzers { + if analyzer.Analyzer.Name == "S1016" { + Analyzer = analyzer.Analyzer + break + } + } + util.MungeAnalyzer(Analyzer) +} diff --git a/build/bazelutil/staticcheckanalyzers/s1017/BUILD.bazel b/build/bazelutil/staticcheckanalyzers/s1017/BUILD.bazel new file mode 100644 index 000000000000..3969c0c1817c --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/s1017/BUILD.bazel @@ -0,0 +1,13 @@ +load("@io_bazel_rules_go//go:def.bzl", "go_library") + +go_library( + name = "s1017", + srcs = ["analyzer.go"], + importpath = "github.com/cockroachdb/cockroach/build/bazelutil/staticcheckanalyzers/s1017", + visibility = ["//visibility:public"], + deps = [ + "//pkg/testutils/lint/passes/staticcheck", + "@co_honnef_go_tools//simple", + "@org_golang_x_tools//go/analysis", + ], +) diff --git a/build/bazelutil/staticcheckanalyzers/s1017/analyzer.go b/build/bazelutil/staticcheckanalyzers/s1017/analyzer.go new file mode 100644 index 000000000000..e6e1d287208e --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/s1017/analyzer.go @@ -0,0 +1,24 @@ +// Code generated by generate-staticcheck; DO NOT EDIT. + +//go:build bazel +// +build bazel + +package s1017 + +import ( + util "github.com/cockroachdb/cockroach/pkg/testutils/lint/passes/staticcheck" + "golang.org/x/tools/go/analysis" + "honnef.co/go/tools/simple" +) + +var Analyzer *analysis.Analyzer + +func init() { + for _, analyzer := range simple.Analyzers { + if analyzer.Analyzer.Name == "S1017" { + Analyzer = analyzer.Analyzer + break + } + } + util.MungeAnalyzer(Analyzer) +} diff --git a/build/bazelutil/staticcheckanalyzers/s1018/BUILD.bazel b/build/bazelutil/staticcheckanalyzers/s1018/BUILD.bazel new file mode 100644 index 000000000000..f5e0dfa3749d --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/s1018/BUILD.bazel @@ -0,0 +1,13 @@ +load("@io_bazel_rules_go//go:def.bzl", "go_library") + +go_library( + name = "s1018", + srcs = ["analyzer.go"], + importpath = "github.com/cockroachdb/cockroach/build/bazelutil/staticcheckanalyzers/s1018", + visibility = ["//visibility:public"], + deps = [ + "//pkg/testutils/lint/passes/staticcheck", + "@co_honnef_go_tools//simple", + "@org_golang_x_tools//go/analysis", + ], +) diff --git a/build/bazelutil/staticcheckanalyzers/s1018/analyzer.go b/build/bazelutil/staticcheckanalyzers/s1018/analyzer.go new file mode 100644 index 000000000000..ddc0a87f404d --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/s1018/analyzer.go @@ -0,0 +1,24 @@ +// Code generated by generate-staticcheck; DO NOT EDIT. + +//go:build bazel +// +build bazel + +package s1018 + +import ( + util "github.com/cockroachdb/cockroach/pkg/testutils/lint/passes/staticcheck" + "golang.org/x/tools/go/analysis" + "honnef.co/go/tools/simple" +) + +var Analyzer *analysis.Analyzer + +func init() { + for _, analyzer := range simple.Analyzers { + if analyzer.Analyzer.Name == "S1018" { + Analyzer = analyzer.Analyzer + break + } + } + util.MungeAnalyzer(Analyzer) +} diff --git a/build/bazelutil/staticcheckanalyzers/s1019/BUILD.bazel b/build/bazelutil/staticcheckanalyzers/s1019/BUILD.bazel new file mode 100644 index 000000000000..0a7664167ab7 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/s1019/BUILD.bazel @@ -0,0 +1,13 @@ +load("@io_bazel_rules_go//go:def.bzl", "go_library") + +go_library( + name = "s1019", + srcs = ["analyzer.go"], + importpath = "github.com/cockroachdb/cockroach/build/bazelutil/staticcheckanalyzers/s1019", + visibility = ["//visibility:public"], + deps = [ + "//pkg/testutils/lint/passes/staticcheck", + "@co_honnef_go_tools//simple", + "@org_golang_x_tools//go/analysis", + ], +) diff --git a/build/bazelutil/staticcheckanalyzers/s1019/analyzer.go b/build/bazelutil/staticcheckanalyzers/s1019/analyzer.go new file mode 100644 index 000000000000..c937e7107dd6 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/s1019/analyzer.go @@ -0,0 +1,24 @@ +// Code generated by generate-staticcheck; DO NOT EDIT. + +//go:build bazel +// +build bazel + +package s1019 + +import ( + util "github.com/cockroachdb/cockroach/pkg/testutils/lint/passes/staticcheck" + "golang.org/x/tools/go/analysis" + "honnef.co/go/tools/simple" +) + +var Analyzer *analysis.Analyzer + +func init() { + for _, analyzer := range simple.Analyzers { + if analyzer.Analyzer.Name == "S1019" { + Analyzer = analyzer.Analyzer + break + } + } + util.MungeAnalyzer(Analyzer) +} diff --git a/build/bazelutil/staticcheckanalyzers/s1020/BUILD.bazel b/build/bazelutil/staticcheckanalyzers/s1020/BUILD.bazel new file mode 100644 index 000000000000..80ed8d7b2980 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/s1020/BUILD.bazel @@ -0,0 +1,13 @@ +load("@io_bazel_rules_go//go:def.bzl", "go_library") + +go_library( + name = "s1020", + srcs = ["analyzer.go"], + importpath = "github.com/cockroachdb/cockroach/build/bazelutil/staticcheckanalyzers/s1020", + visibility = ["//visibility:public"], + deps = [ + "//pkg/testutils/lint/passes/staticcheck", + "@co_honnef_go_tools//simple", + "@org_golang_x_tools//go/analysis", + ], +) diff --git a/build/bazelutil/staticcheckanalyzers/s1020/analyzer.go b/build/bazelutil/staticcheckanalyzers/s1020/analyzer.go new file mode 100644 index 000000000000..c19f5464fe44 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/s1020/analyzer.go @@ -0,0 +1,24 @@ +// Code generated by generate-staticcheck; DO NOT EDIT. + +//go:build bazel +// +build bazel + +package s1020 + +import ( + util "github.com/cockroachdb/cockroach/pkg/testutils/lint/passes/staticcheck" + "golang.org/x/tools/go/analysis" + "honnef.co/go/tools/simple" +) + +var Analyzer *analysis.Analyzer + +func init() { + for _, analyzer := range simple.Analyzers { + if analyzer.Analyzer.Name == "S1020" { + Analyzer = analyzer.Analyzer + break + } + } + util.MungeAnalyzer(Analyzer) +} diff --git a/build/bazelutil/staticcheckanalyzers/s1021/BUILD.bazel b/build/bazelutil/staticcheckanalyzers/s1021/BUILD.bazel new file mode 100644 index 000000000000..dec08b6c1360 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/s1021/BUILD.bazel @@ -0,0 +1,13 @@ +load("@io_bazel_rules_go//go:def.bzl", "go_library") + +go_library( + name = "s1021", + srcs = ["analyzer.go"], + importpath = "github.com/cockroachdb/cockroach/build/bazelutil/staticcheckanalyzers/s1021", + visibility = ["//visibility:public"], + deps = [ + "//pkg/testutils/lint/passes/staticcheck", + "@co_honnef_go_tools//simple", + "@org_golang_x_tools//go/analysis", + ], +) diff --git a/build/bazelutil/staticcheckanalyzers/s1021/analyzer.go b/build/bazelutil/staticcheckanalyzers/s1021/analyzer.go new file mode 100644 index 000000000000..48f9c71e810c --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/s1021/analyzer.go @@ -0,0 +1,24 @@ +// Code generated by generate-staticcheck; DO NOT EDIT. + +//go:build bazel +// +build bazel + +package s1021 + +import ( + util "github.com/cockroachdb/cockroach/pkg/testutils/lint/passes/staticcheck" + "golang.org/x/tools/go/analysis" + "honnef.co/go/tools/simple" +) + +var Analyzer *analysis.Analyzer + +func init() { + for _, analyzer := range simple.Analyzers { + if analyzer.Analyzer.Name == "S1021" { + Analyzer = analyzer.Analyzer + break + } + } + util.MungeAnalyzer(Analyzer) +} diff --git a/build/bazelutil/staticcheckanalyzers/s1023/BUILD.bazel b/build/bazelutil/staticcheckanalyzers/s1023/BUILD.bazel new file mode 100644 index 000000000000..dd28f453c532 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/s1023/BUILD.bazel @@ -0,0 +1,13 @@ +load("@io_bazel_rules_go//go:def.bzl", "go_library") + +go_library( + name = "s1023", + srcs = ["analyzer.go"], + importpath = "github.com/cockroachdb/cockroach/build/bazelutil/staticcheckanalyzers/s1023", + visibility = ["//visibility:public"], + deps = [ + "//pkg/testutils/lint/passes/staticcheck", + "@co_honnef_go_tools//simple", + "@org_golang_x_tools//go/analysis", + ], +) diff --git a/build/bazelutil/staticcheckanalyzers/s1023/analyzer.go b/build/bazelutil/staticcheckanalyzers/s1023/analyzer.go new file mode 100644 index 000000000000..ef98962c876a --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/s1023/analyzer.go @@ -0,0 +1,24 @@ +// Code generated by generate-staticcheck; DO NOT EDIT. + +//go:build bazel +// +build bazel + +package s1023 + +import ( + util "github.com/cockroachdb/cockroach/pkg/testutils/lint/passes/staticcheck" + "golang.org/x/tools/go/analysis" + "honnef.co/go/tools/simple" +) + +var Analyzer *analysis.Analyzer + +func init() { + for _, analyzer := range simple.Analyzers { + if analyzer.Analyzer.Name == "S1023" { + Analyzer = analyzer.Analyzer + break + } + } + util.MungeAnalyzer(Analyzer) +} diff --git a/build/bazelutil/staticcheckanalyzers/s1024/BUILD.bazel b/build/bazelutil/staticcheckanalyzers/s1024/BUILD.bazel new file mode 100644 index 000000000000..6f1b1f4e3a4a --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/s1024/BUILD.bazel @@ -0,0 +1,13 @@ +load("@io_bazel_rules_go//go:def.bzl", "go_library") + +go_library( + name = "s1024", + srcs = ["analyzer.go"], + importpath = "github.com/cockroachdb/cockroach/build/bazelutil/staticcheckanalyzers/s1024", + visibility = ["//visibility:public"], + deps = [ + "//pkg/testutils/lint/passes/staticcheck", + "@co_honnef_go_tools//simple", + "@org_golang_x_tools//go/analysis", + ], +) diff --git a/build/bazelutil/staticcheckanalyzers/s1024/analyzer.go b/build/bazelutil/staticcheckanalyzers/s1024/analyzer.go new file mode 100644 index 000000000000..f656e83fff10 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/s1024/analyzer.go @@ -0,0 +1,24 @@ +// Code generated by generate-staticcheck; DO NOT EDIT. + +//go:build bazel +// +build bazel + +package s1024 + +import ( + util "github.com/cockroachdb/cockroach/pkg/testutils/lint/passes/staticcheck" + "golang.org/x/tools/go/analysis" + "honnef.co/go/tools/simple" +) + +var Analyzer *analysis.Analyzer + +func init() { + for _, analyzer := range simple.Analyzers { + if analyzer.Analyzer.Name == "S1024" { + Analyzer = analyzer.Analyzer + break + } + } + util.MungeAnalyzer(Analyzer) +} diff --git a/build/bazelutil/staticcheckanalyzers/s1025/BUILD.bazel b/build/bazelutil/staticcheckanalyzers/s1025/BUILD.bazel new file mode 100644 index 000000000000..4b82a5192d08 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/s1025/BUILD.bazel @@ -0,0 +1,13 @@ +load("@io_bazel_rules_go//go:def.bzl", "go_library") + +go_library( + name = "s1025", + srcs = ["analyzer.go"], + importpath = "github.com/cockroachdb/cockroach/build/bazelutil/staticcheckanalyzers/s1025", + visibility = ["//visibility:public"], + deps = [ + "//pkg/testutils/lint/passes/staticcheck", + "@co_honnef_go_tools//simple", + "@org_golang_x_tools//go/analysis", + ], +) diff --git a/build/bazelutil/staticcheckanalyzers/s1025/analyzer.go b/build/bazelutil/staticcheckanalyzers/s1025/analyzer.go new file mode 100644 index 000000000000..b410282c94f9 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/s1025/analyzer.go @@ -0,0 +1,24 @@ +// Code generated by generate-staticcheck; DO NOT EDIT. + +//go:build bazel +// +build bazel + +package s1025 + +import ( + util "github.com/cockroachdb/cockroach/pkg/testutils/lint/passes/staticcheck" + "golang.org/x/tools/go/analysis" + "honnef.co/go/tools/simple" +) + +var Analyzer *analysis.Analyzer + +func init() { + for _, analyzer := range simple.Analyzers { + if analyzer.Analyzer.Name == "S1025" { + Analyzer = analyzer.Analyzer + break + } + } + util.MungeAnalyzer(Analyzer) +} diff --git a/build/bazelutil/staticcheckanalyzers/s1028/BUILD.bazel b/build/bazelutil/staticcheckanalyzers/s1028/BUILD.bazel new file mode 100644 index 000000000000..f08aecab60db --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/s1028/BUILD.bazel @@ -0,0 +1,13 @@ +load("@io_bazel_rules_go//go:def.bzl", "go_library") + +go_library( + name = "s1028", + srcs = ["analyzer.go"], + importpath = "github.com/cockroachdb/cockroach/build/bazelutil/staticcheckanalyzers/s1028", + visibility = ["//visibility:public"], + deps = [ + "//pkg/testutils/lint/passes/staticcheck", + "@co_honnef_go_tools//simple", + "@org_golang_x_tools//go/analysis", + ], +) diff --git a/build/bazelutil/staticcheckanalyzers/s1028/analyzer.go b/build/bazelutil/staticcheckanalyzers/s1028/analyzer.go new file mode 100644 index 000000000000..9567d6fd466d --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/s1028/analyzer.go @@ -0,0 +1,24 @@ +// Code generated by generate-staticcheck; DO NOT EDIT. + +//go:build bazel +// +build bazel + +package s1028 + +import ( + util "github.com/cockroachdb/cockroach/pkg/testutils/lint/passes/staticcheck" + "golang.org/x/tools/go/analysis" + "honnef.co/go/tools/simple" +) + +var Analyzer *analysis.Analyzer + +func init() { + for _, analyzer := range simple.Analyzers { + if analyzer.Analyzer.Name == "S1028" { + Analyzer = analyzer.Analyzer + break + } + } + util.MungeAnalyzer(Analyzer) +} diff --git a/build/bazelutil/staticcheckanalyzers/s1029/BUILD.bazel b/build/bazelutil/staticcheckanalyzers/s1029/BUILD.bazel new file mode 100644 index 000000000000..997a930bedf8 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/s1029/BUILD.bazel @@ -0,0 +1,13 @@ +load("@io_bazel_rules_go//go:def.bzl", "go_library") + +go_library( + name = "s1029", + srcs = ["analyzer.go"], + importpath = "github.com/cockroachdb/cockroach/build/bazelutil/staticcheckanalyzers/s1029", + visibility = ["//visibility:public"], + deps = [ + "//pkg/testutils/lint/passes/staticcheck", + "@co_honnef_go_tools//simple", + "@org_golang_x_tools//go/analysis", + ], +) diff --git a/build/bazelutil/staticcheckanalyzers/s1029/analyzer.go b/build/bazelutil/staticcheckanalyzers/s1029/analyzer.go new file mode 100644 index 000000000000..ff97319c229f --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/s1029/analyzer.go @@ -0,0 +1,24 @@ +// Code generated by generate-staticcheck; DO NOT EDIT. + +//go:build bazel +// +build bazel + +package s1029 + +import ( + util "github.com/cockroachdb/cockroach/pkg/testutils/lint/passes/staticcheck" + "golang.org/x/tools/go/analysis" + "honnef.co/go/tools/simple" +) + +var Analyzer *analysis.Analyzer + +func init() { + for _, analyzer := range simple.Analyzers { + if analyzer.Analyzer.Name == "S1029" { + Analyzer = analyzer.Analyzer + break + } + } + util.MungeAnalyzer(Analyzer) +} diff --git a/build/bazelutil/staticcheckanalyzers/s1030/BUILD.bazel b/build/bazelutil/staticcheckanalyzers/s1030/BUILD.bazel new file mode 100644 index 000000000000..d61906987926 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/s1030/BUILD.bazel @@ -0,0 +1,13 @@ +load("@io_bazel_rules_go//go:def.bzl", "go_library") + +go_library( + name = "s1030", + srcs = ["analyzer.go"], + importpath = "github.com/cockroachdb/cockroach/build/bazelutil/staticcheckanalyzers/s1030", + visibility = ["//visibility:public"], + deps = [ + "//pkg/testutils/lint/passes/staticcheck", + "@co_honnef_go_tools//simple", + "@org_golang_x_tools//go/analysis", + ], +) diff --git a/build/bazelutil/staticcheckanalyzers/s1030/analyzer.go b/build/bazelutil/staticcheckanalyzers/s1030/analyzer.go new file mode 100644 index 000000000000..e8016cf91395 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/s1030/analyzer.go @@ -0,0 +1,24 @@ +// Code generated by generate-staticcheck; DO NOT EDIT. + +//go:build bazel +// +build bazel + +package s1030 + +import ( + util "github.com/cockroachdb/cockroach/pkg/testutils/lint/passes/staticcheck" + "golang.org/x/tools/go/analysis" + "honnef.co/go/tools/simple" +) + +var Analyzer *analysis.Analyzer + +func init() { + for _, analyzer := range simple.Analyzers { + if analyzer.Analyzer.Name == "S1030" { + Analyzer = analyzer.Analyzer + break + } + } + util.MungeAnalyzer(Analyzer) +} diff --git a/build/bazelutil/staticcheckanalyzers/s1031/BUILD.bazel b/build/bazelutil/staticcheckanalyzers/s1031/BUILD.bazel new file mode 100644 index 000000000000..836c47a6a109 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/s1031/BUILD.bazel @@ -0,0 +1,13 @@ +load("@io_bazel_rules_go//go:def.bzl", "go_library") + +go_library( + name = "s1031", + srcs = ["analyzer.go"], + importpath = "github.com/cockroachdb/cockroach/build/bazelutil/staticcheckanalyzers/s1031", + visibility = ["//visibility:public"], + deps = [ + "//pkg/testutils/lint/passes/staticcheck", + "@co_honnef_go_tools//simple", + "@org_golang_x_tools//go/analysis", + ], +) diff --git a/build/bazelutil/staticcheckanalyzers/s1031/analyzer.go b/build/bazelutil/staticcheckanalyzers/s1031/analyzer.go new file mode 100644 index 000000000000..fa3af4766af9 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/s1031/analyzer.go @@ -0,0 +1,24 @@ +// Code generated by generate-staticcheck; DO NOT EDIT. + +//go:build bazel +// +build bazel + +package s1031 + +import ( + util "github.com/cockroachdb/cockroach/pkg/testutils/lint/passes/staticcheck" + "golang.org/x/tools/go/analysis" + "honnef.co/go/tools/simple" +) + +var Analyzer *analysis.Analyzer + +func init() { + for _, analyzer := range simple.Analyzers { + if analyzer.Analyzer.Name == "S1031" { + Analyzer = analyzer.Analyzer + break + } + } + util.MungeAnalyzer(Analyzer) +} diff --git a/build/bazelutil/staticcheckanalyzers/s1032/BUILD.bazel b/build/bazelutil/staticcheckanalyzers/s1032/BUILD.bazel new file mode 100644 index 000000000000..f59d6b589996 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/s1032/BUILD.bazel @@ -0,0 +1,13 @@ +load("@io_bazel_rules_go//go:def.bzl", "go_library") + +go_library( + name = "s1032", + srcs = ["analyzer.go"], + importpath = "github.com/cockroachdb/cockroach/build/bazelutil/staticcheckanalyzers/s1032", + visibility = ["//visibility:public"], + deps = [ + "//pkg/testutils/lint/passes/staticcheck", + "@co_honnef_go_tools//simple", + "@org_golang_x_tools//go/analysis", + ], +) diff --git a/build/bazelutil/staticcheckanalyzers/s1032/analyzer.go b/build/bazelutil/staticcheckanalyzers/s1032/analyzer.go new file mode 100644 index 000000000000..2f359651c95b --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/s1032/analyzer.go @@ -0,0 +1,24 @@ +// Code generated by generate-staticcheck; DO NOT EDIT. + +//go:build bazel +// +build bazel + +package s1032 + +import ( + util "github.com/cockroachdb/cockroach/pkg/testutils/lint/passes/staticcheck" + "golang.org/x/tools/go/analysis" + "honnef.co/go/tools/simple" +) + +var Analyzer *analysis.Analyzer + +func init() { + for _, analyzer := range simple.Analyzers { + if analyzer.Analyzer.Name == "S1032" { + Analyzer = analyzer.Analyzer + break + } + } + util.MungeAnalyzer(Analyzer) +} diff --git a/build/bazelutil/staticcheckanalyzers/s1033/BUILD.bazel b/build/bazelutil/staticcheckanalyzers/s1033/BUILD.bazel new file mode 100644 index 000000000000..52efec5656a0 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/s1033/BUILD.bazel @@ -0,0 +1,13 @@ +load("@io_bazel_rules_go//go:def.bzl", "go_library") + +go_library( + name = "s1033", + srcs = ["analyzer.go"], + importpath = "github.com/cockroachdb/cockroach/build/bazelutil/staticcheckanalyzers/s1033", + visibility = ["//visibility:public"], + deps = [ + "//pkg/testutils/lint/passes/staticcheck", + "@co_honnef_go_tools//simple", + "@org_golang_x_tools//go/analysis", + ], +) diff --git a/build/bazelutil/staticcheckanalyzers/s1033/analyzer.go b/build/bazelutil/staticcheckanalyzers/s1033/analyzer.go new file mode 100644 index 000000000000..2f0800baab06 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/s1033/analyzer.go @@ -0,0 +1,24 @@ +// Code generated by generate-staticcheck; DO NOT EDIT. + +//go:build bazel +// +build bazel + +package s1033 + +import ( + util "github.com/cockroachdb/cockroach/pkg/testutils/lint/passes/staticcheck" + "golang.org/x/tools/go/analysis" + "honnef.co/go/tools/simple" +) + +var Analyzer *analysis.Analyzer + +func init() { + for _, analyzer := range simple.Analyzers { + if analyzer.Analyzer.Name == "S1033" { + Analyzer = analyzer.Analyzer + break + } + } + util.MungeAnalyzer(Analyzer) +} diff --git a/build/bazelutil/staticcheckanalyzers/s1034/BUILD.bazel b/build/bazelutil/staticcheckanalyzers/s1034/BUILD.bazel new file mode 100644 index 000000000000..894c72d74904 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/s1034/BUILD.bazel @@ -0,0 +1,13 @@ +load("@io_bazel_rules_go//go:def.bzl", "go_library") + +go_library( + name = "s1034", + srcs = ["analyzer.go"], + importpath = "github.com/cockroachdb/cockroach/build/bazelutil/staticcheckanalyzers/s1034", + visibility = ["//visibility:public"], + deps = [ + "//pkg/testutils/lint/passes/staticcheck", + "@co_honnef_go_tools//simple", + "@org_golang_x_tools//go/analysis", + ], +) diff --git a/build/bazelutil/staticcheckanalyzers/s1034/analyzer.go b/build/bazelutil/staticcheckanalyzers/s1034/analyzer.go new file mode 100644 index 000000000000..ebc6ab9b90d7 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/s1034/analyzer.go @@ -0,0 +1,24 @@ +// Code generated by generate-staticcheck; DO NOT EDIT. + +//go:build bazel +// +build bazel + +package s1034 + +import ( + util "github.com/cockroachdb/cockroach/pkg/testutils/lint/passes/staticcheck" + "golang.org/x/tools/go/analysis" + "honnef.co/go/tools/simple" +) + +var Analyzer *analysis.Analyzer + +func init() { + for _, analyzer := range simple.Analyzers { + if analyzer.Analyzer.Name == "S1034" { + Analyzer = analyzer.Analyzer + break + } + } + util.MungeAnalyzer(Analyzer) +} diff --git a/build/bazelutil/staticcheckanalyzers/s1035/BUILD.bazel b/build/bazelutil/staticcheckanalyzers/s1035/BUILD.bazel new file mode 100644 index 000000000000..864d0daab96c --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/s1035/BUILD.bazel @@ -0,0 +1,13 @@ +load("@io_bazel_rules_go//go:def.bzl", "go_library") + +go_library( + name = "s1035", + srcs = ["analyzer.go"], + importpath = "github.com/cockroachdb/cockroach/build/bazelutil/staticcheckanalyzers/s1035", + visibility = ["//visibility:public"], + deps = [ + "//pkg/testutils/lint/passes/staticcheck", + "@co_honnef_go_tools//simple", + "@org_golang_x_tools//go/analysis", + ], +) diff --git a/build/bazelutil/staticcheckanalyzers/s1035/analyzer.go b/build/bazelutil/staticcheckanalyzers/s1035/analyzer.go new file mode 100644 index 000000000000..4ebf44dbfb12 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/s1035/analyzer.go @@ -0,0 +1,24 @@ +// Code generated by generate-staticcheck; DO NOT EDIT. + +//go:build bazel +// +build bazel + +package s1035 + +import ( + util "github.com/cockroachdb/cockroach/pkg/testutils/lint/passes/staticcheck" + "golang.org/x/tools/go/analysis" + "honnef.co/go/tools/simple" +) + +var Analyzer *analysis.Analyzer + +func init() { + for _, analyzer := range simple.Analyzers { + if analyzer.Analyzer.Name == "S1035" { + Analyzer = analyzer.Analyzer + break + } + } + util.MungeAnalyzer(Analyzer) +} diff --git a/build/bazelutil/staticcheckanalyzers/s1036/BUILD.bazel b/build/bazelutil/staticcheckanalyzers/s1036/BUILD.bazel new file mode 100644 index 000000000000..a047a9077d62 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/s1036/BUILD.bazel @@ -0,0 +1,13 @@ +load("@io_bazel_rules_go//go:def.bzl", "go_library") + +go_library( + name = "s1036", + srcs = ["analyzer.go"], + importpath = "github.com/cockroachdb/cockroach/build/bazelutil/staticcheckanalyzers/s1036", + visibility = ["//visibility:public"], + deps = [ + "//pkg/testutils/lint/passes/staticcheck", + "@co_honnef_go_tools//simple", + "@org_golang_x_tools//go/analysis", + ], +) diff --git a/build/bazelutil/staticcheckanalyzers/s1036/analyzer.go b/build/bazelutil/staticcheckanalyzers/s1036/analyzer.go new file mode 100644 index 000000000000..7c0438b1d3a8 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/s1036/analyzer.go @@ -0,0 +1,24 @@ +// Code generated by generate-staticcheck; DO NOT EDIT. + +//go:build bazel +// +build bazel + +package s1036 + +import ( + util "github.com/cockroachdb/cockroach/pkg/testutils/lint/passes/staticcheck" + "golang.org/x/tools/go/analysis" + "honnef.co/go/tools/simple" +) + +var Analyzer *analysis.Analyzer + +func init() { + for _, analyzer := range simple.Analyzers { + if analyzer.Analyzer.Name == "S1036" { + Analyzer = analyzer.Analyzer + break + } + } + util.MungeAnalyzer(Analyzer) +} diff --git a/build/bazelutil/staticcheckanalyzers/s1037/BUILD.bazel b/build/bazelutil/staticcheckanalyzers/s1037/BUILD.bazel new file mode 100644 index 000000000000..02e43b9ff301 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/s1037/BUILD.bazel @@ -0,0 +1,13 @@ +load("@io_bazel_rules_go//go:def.bzl", "go_library") + +go_library( + name = "s1037", + srcs = ["analyzer.go"], + importpath = "github.com/cockroachdb/cockroach/build/bazelutil/staticcheckanalyzers/s1037", + visibility = ["//visibility:public"], + deps = [ + "//pkg/testutils/lint/passes/staticcheck", + "@co_honnef_go_tools//simple", + "@org_golang_x_tools//go/analysis", + ], +) diff --git a/build/bazelutil/staticcheckanalyzers/s1037/analyzer.go b/build/bazelutil/staticcheckanalyzers/s1037/analyzer.go new file mode 100644 index 000000000000..b768430aec07 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/s1037/analyzer.go @@ -0,0 +1,24 @@ +// Code generated by generate-staticcheck; DO NOT EDIT. + +//go:build bazel +// +build bazel + +package s1037 + +import ( + util "github.com/cockroachdb/cockroach/pkg/testutils/lint/passes/staticcheck" + "golang.org/x/tools/go/analysis" + "honnef.co/go/tools/simple" +) + +var Analyzer *analysis.Analyzer + +func init() { + for _, analyzer := range simple.Analyzers { + if analyzer.Analyzer.Name == "S1037" { + Analyzer = analyzer.Analyzer + break + } + } + util.MungeAnalyzer(Analyzer) +} diff --git a/build/bazelutil/staticcheckanalyzers/s1038/BUILD.bazel b/build/bazelutil/staticcheckanalyzers/s1038/BUILD.bazel new file mode 100644 index 000000000000..d1d451c95255 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/s1038/BUILD.bazel @@ -0,0 +1,13 @@ +load("@io_bazel_rules_go//go:def.bzl", "go_library") + +go_library( + name = "s1038", + srcs = ["analyzer.go"], + importpath = "github.com/cockroachdb/cockroach/build/bazelutil/staticcheckanalyzers/s1038", + visibility = ["//visibility:public"], + deps = [ + "//pkg/testutils/lint/passes/staticcheck", + "@co_honnef_go_tools//simple", + "@org_golang_x_tools//go/analysis", + ], +) diff --git a/build/bazelutil/staticcheckanalyzers/s1038/analyzer.go b/build/bazelutil/staticcheckanalyzers/s1038/analyzer.go new file mode 100644 index 000000000000..5867c44bb258 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/s1038/analyzer.go @@ -0,0 +1,24 @@ +// Code generated by generate-staticcheck; DO NOT EDIT. + +//go:build bazel +// +build bazel + +package s1038 + +import ( + util "github.com/cockroachdb/cockroach/pkg/testutils/lint/passes/staticcheck" + "golang.org/x/tools/go/analysis" + "honnef.co/go/tools/simple" +) + +var Analyzer *analysis.Analyzer + +func init() { + for _, analyzer := range simple.Analyzers { + if analyzer.Analyzer.Name == "S1038" { + Analyzer = analyzer.Analyzer + break + } + } + util.MungeAnalyzer(Analyzer) +} diff --git a/build/bazelutil/staticcheckanalyzers/s1039/BUILD.bazel b/build/bazelutil/staticcheckanalyzers/s1039/BUILD.bazel new file mode 100644 index 000000000000..752e4d105090 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/s1039/BUILD.bazel @@ -0,0 +1,13 @@ +load("@io_bazel_rules_go//go:def.bzl", "go_library") + +go_library( + name = "s1039", + srcs = ["analyzer.go"], + importpath = "github.com/cockroachdb/cockroach/build/bazelutil/staticcheckanalyzers/s1039", + visibility = ["//visibility:public"], + deps = [ + "//pkg/testutils/lint/passes/staticcheck", + "@co_honnef_go_tools//simple", + "@org_golang_x_tools//go/analysis", + ], +) diff --git a/build/bazelutil/staticcheckanalyzers/s1039/analyzer.go b/build/bazelutil/staticcheckanalyzers/s1039/analyzer.go new file mode 100644 index 000000000000..2c7bd76b9710 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/s1039/analyzer.go @@ -0,0 +1,24 @@ +// Code generated by generate-staticcheck; DO NOT EDIT. + +//go:build bazel +// +build bazel + +package s1039 + +import ( + util "github.com/cockroachdb/cockroach/pkg/testutils/lint/passes/staticcheck" + "golang.org/x/tools/go/analysis" + "honnef.co/go/tools/simple" +) + +var Analyzer *analysis.Analyzer + +func init() { + for _, analyzer := range simple.Analyzers { + if analyzer.Analyzer.Name == "S1039" { + Analyzer = analyzer.Analyzer + break + } + } + util.MungeAnalyzer(Analyzer) +} diff --git a/build/bazelutil/staticcheckanalyzers/s1040/BUILD.bazel b/build/bazelutil/staticcheckanalyzers/s1040/BUILD.bazel new file mode 100644 index 000000000000..6eae37ef0715 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/s1040/BUILD.bazel @@ -0,0 +1,13 @@ +load("@io_bazel_rules_go//go:def.bzl", "go_library") + +go_library( + name = "s1040", + srcs = ["analyzer.go"], + importpath = "github.com/cockroachdb/cockroach/build/bazelutil/staticcheckanalyzers/s1040", + visibility = ["//visibility:public"], + deps = [ + "//pkg/testutils/lint/passes/staticcheck", + "@co_honnef_go_tools//simple", + "@org_golang_x_tools//go/analysis", + ], +) diff --git a/build/bazelutil/staticcheckanalyzers/s1040/analyzer.go b/build/bazelutil/staticcheckanalyzers/s1040/analyzer.go new file mode 100644 index 000000000000..7afad78749e6 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/s1040/analyzer.go @@ -0,0 +1,24 @@ +// Code generated by generate-staticcheck; DO NOT EDIT. + +//go:build bazel +// +build bazel + +package s1040 + +import ( + util "github.com/cockroachdb/cockroach/pkg/testutils/lint/passes/staticcheck" + "golang.org/x/tools/go/analysis" + "honnef.co/go/tools/simple" +) + +var Analyzer *analysis.Analyzer + +func init() { + for _, analyzer := range simple.Analyzers { + if analyzer.Analyzer.Name == "S1040" { + Analyzer = analyzer.Analyzer + break + } + } + util.MungeAnalyzer(Analyzer) +} diff --git a/build/bazelutil/staticcheckanalyzers/sa1000/BUILD.bazel b/build/bazelutil/staticcheckanalyzers/sa1000/BUILD.bazel new file mode 100644 index 000000000000..ec4c15457faa --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa1000/BUILD.bazel @@ -0,0 +1,13 @@ +load("@io_bazel_rules_go//go:def.bzl", "go_library") + +go_library( + name = "sa1000", + srcs = ["analyzer.go"], + importpath = "github.com/cockroachdb/cockroach/build/bazelutil/staticcheckanalyzers/sa1000", + visibility = ["//visibility:public"], + deps = [ + "//pkg/testutils/lint/passes/staticcheck", + "@co_honnef_go_tools//staticcheck", + "@org_golang_x_tools//go/analysis", + ], +) diff --git a/build/bazelutil/staticcheckanalyzers/sa1000/analyzer.go b/build/bazelutil/staticcheckanalyzers/sa1000/analyzer.go new file mode 100644 index 000000000000..4acf9bc1cce7 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa1000/analyzer.go @@ -0,0 +1,24 @@ +// Code generated by generate-staticcheck; DO NOT EDIT. + +//go:build bazel +// +build bazel + +package sa1000 + +import ( + util "github.com/cockroachdb/cockroach/pkg/testutils/lint/passes/staticcheck" + "golang.org/x/tools/go/analysis" + "honnef.co/go/tools/staticcheck" +) + +var Analyzer *analysis.Analyzer + +func init() { + for _, analyzer := range staticcheck.Analyzers { + if analyzer.Analyzer.Name == "SA1000" { + Analyzer = analyzer.Analyzer + break + } + } + util.MungeAnalyzer(Analyzer) +} diff --git a/build/bazelutil/staticcheckanalyzers/sa1001/BUILD.bazel b/build/bazelutil/staticcheckanalyzers/sa1001/BUILD.bazel new file mode 100644 index 000000000000..757a7842fe1b --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa1001/BUILD.bazel @@ -0,0 +1,13 @@ +load("@io_bazel_rules_go//go:def.bzl", "go_library") + +go_library( + name = "sa1001", + srcs = ["analyzer.go"], + importpath = "github.com/cockroachdb/cockroach/build/bazelutil/staticcheckanalyzers/sa1001", + visibility = ["//visibility:public"], + deps = [ + "//pkg/testutils/lint/passes/staticcheck", + "@co_honnef_go_tools//staticcheck", + "@org_golang_x_tools//go/analysis", + ], +) diff --git a/build/bazelutil/staticcheckanalyzers/sa1001/analyzer.go b/build/bazelutil/staticcheckanalyzers/sa1001/analyzer.go new file mode 100644 index 000000000000..e0a14fead722 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa1001/analyzer.go @@ -0,0 +1,24 @@ +// Code generated by generate-staticcheck; DO NOT EDIT. + +//go:build bazel +// +build bazel + +package sa1001 + +import ( + util "github.com/cockroachdb/cockroach/pkg/testutils/lint/passes/staticcheck" + "golang.org/x/tools/go/analysis" + "honnef.co/go/tools/staticcheck" +) + +var Analyzer *analysis.Analyzer + +func init() { + for _, analyzer := range staticcheck.Analyzers { + if analyzer.Analyzer.Name == "SA1001" { + Analyzer = analyzer.Analyzer + break + } + } + util.MungeAnalyzer(Analyzer) +} diff --git a/build/bazelutil/staticcheckanalyzers/sa1002/BUILD.bazel b/build/bazelutil/staticcheckanalyzers/sa1002/BUILD.bazel new file mode 100644 index 000000000000..6fde3e73c46a --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa1002/BUILD.bazel @@ -0,0 +1,13 @@ +load("@io_bazel_rules_go//go:def.bzl", "go_library") + +go_library( + name = "sa1002", + srcs = ["analyzer.go"], + importpath = "github.com/cockroachdb/cockroach/build/bazelutil/staticcheckanalyzers/sa1002", + visibility = ["//visibility:public"], + deps = [ + "//pkg/testutils/lint/passes/staticcheck", + "@co_honnef_go_tools//staticcheck", + "@org_golang_x_tools//go/analysis", + ], +) diff --git a/build/bazelutil/staticcheckanalyzers/sa1002/analyzer.go b/build/bazelutil/staticcheckanalyzers/sa1002/analyzer.go new file mode 100644 index 000000000000..75133d88c83d --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa1002/analyzer.go @@ -0,0 +1,24 @@ +// Code generated by generate-staticcheck; DO NOT EDIT. + +//go:build bazel +// +build bazel + +package sa1002 + +import ( + util "github.com/cockroachdb/cockroach/pkg/testutils/lint/passes/staticcheck" + "golang.org/x/tools/go/analysis" + "honnef.co/go/tools/staticcheck" +) + +var Analyzer *analysis.Analyzer + +func init() { + for _, analyzer := range staticcheck.Analyzers { + if analyzer.Analyzer.Name == "SA1002" { + Analyzer = analyzer.Analyzer + break + } + } + util.MungeAnalyzer(Analyzer) +} diff --git a/build/bazelutil/staticcheckanalyzers/sa1003/BUILD.bazel b/build/bazelutil/staticcheckanalyzers/sa1003/BUILD.bazel new file mode 100644 index 000000000000..e854d6e07aae --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa1003/BUILD.bazel @@ -0,0 +1,13 @@ +load("@io_bazel_rules_go//go:def.bzl", "go_library") + +go_library( + name = "sa1003", + srcs = ["analyzer.go"], + importpath = "github.com/cockroachdb/cockroach/build/bazelutil/staticcheckanalyzers/sa1003", + visibility = ["//visibility:public"], + deps = [ + "//pkg/testutils/lint/passes/staticcheck", + "@co_honnef_go_tools//staticcheck", + "@org_golang_x_tools//go/analysis", + ], +) diff --git a/build/bazelutil/staticcheckanalyzers/sa1003/analyzer.go b/build/bazelutil/staticcheckanalyzers/sa1003/analyzer.go new file mode 100644 index 000000000000..ea7b45a9c479 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa1003/analyzer.go @@ -0,0 +1,24 @@ +// Code generated by generate-staticcheck; DO NOT EDIT. + +//go:build bazel +// +build bazel + +package sa1003 + +import ( + util "github.com/cockroachdb/cockroach/pkg/testutils/lint/passes/staticcheck" + "golang.org/x/tools/go/analysis" + "honnef.co/go/tools/staticcheck" +) + +var Analyzer *analysis.Analyzer + +func init() { + for _, analyzer := range staticcheck.Analyzers { + if analyzer.Analyzer.Name == "SA1003" { + Analyzer = analyzer.Analyzer + break + } + } + util.MungeAnalyzer(Analyzer) +} diff --git a/build/bazelutil/staticcheckanalyzers/sa1004/BUILD.bazel b/build/bazelutil/staticcheckanalyzers/sa1004/BUILD.bazel new file mode 100644 index 000000000000..a66ed151d959 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa1004/BUILD.bazel @@ -0,0 +1,13 @@ +load("@io_bazel_rules_go//go:def.bzl", "go_library") + +go_library( + name = "sa1004", + srcs = ["analyzer.go"], + importpath = "github.com/cockroachdb/cockroach/build/bazelutil/staticcheckanalyzers/sa1004", + visibility = ["//visibility:public"], + deps = [ + "//pkg/testutils/lint/passes/staticcheck", + "@co_honnef_go_tools//staticcheck", + "@org_golang_x_tools//go/analysis", + ], +) diff --git a/build/bazelutil/staticcheckanalyzers/sa1004/analyzer.go b/build/bazelutil/staticcheckanalyzers/sa1004/analyzer.go new file mode 100644 index 000000000000..5b4c2c5a663d --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa1004/analyzer.go @@ -0,0 +1,24 @@ +// Code generated by generate-staticcheck; DO NOT EDIT. + +//go:build bazel +// +build bazel + +package sa1004 + +import ( + util "github.com/cockroachdb/cockroach/pkg/testutils/lint/passes/staticcheck" + "golang.org/x/tools/go/analysis" + "honnef.co/go/tools/staticcheck" +) + +var Analyzer *analysis.Analyzer + +func init() { + for _, analyzer := range staticcheck.Analyzers { + if analyzer.Analyzer.Name == "SA1004" { + Analyzer = analyzer.Analyzer + break + } + } + util.MungeAnalyzer(Analyzer) +} diff --git a/build/bazelutil/staticcheckanalyzers/sa1005/BUILD.bazel b/build/bazelutil/staticcheckanalyzers/sa1005/BUILD.bazel new file mode 100644 index 000000000000..53b6f70199f5 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa1005/BUILD.bazel @@ -0,0 +1,13 @@ +load("@io_bazel_rules_go//go:def.bzl", "go_library") + +go_library( + name = "sa1005", + srcs = ["analyzer.go"], + importpath = "github.com/cockroachdb/cockroach/build/bazelutil/staticcheckanalyzers/sa1005", + visibility = ["//visibility:public"], + deps = [ + "//pkg/testutils/lint/passes/staticcheck", + "@co_honnef_go_tools//staticcheck", + "@org_golang_x_tools//go/analysis", + ], +) diff --git a/build/bazelutil/staticcheckanalyzers/sa1005/analyzer.go b/build/bazelutil/staticcheckanalyzers/sa1005/analyzer.go new file mode 100644 index 000000000000..703a10d0b49a --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa1005/analyzer.go @@ -0,0 +1,24 @@ +// Code generated by generate-staticcheck; DO NOT EDIT. + +//go:build bazel +// +build bazel + +package sa1005 + +import ( + util "github.com/cockroachdb/cockroach/pkg/testutils/lint/passes/staticcheck" + "golang.org/x/tools/go/analysis" + "honnef.co/go/tools/staticcheck" +) + +var Analyzer *analysis.Analyzer + +func init() { + for _, analyzer := range staticcheck.Analyzers { + if analyzer.Analyzer.Name == "SA1005" { + Analyzer = analyzer.Analyzer + break + } + } + util.MungeAnalyzer(Analyzer) +} diff --git a/build/bazelutil/staticcheckanalyzers/sa1006/BUILD.bazel b/build/bazelutil/staticcheckanalyzers/sa1006/BUILD.bazel new file mode 100644 index 000000000000..fd9d4631e2e4 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa1006/BUILD.bazel @@ -0,0 +1,13 @@ +load("@io_bazel_rules_go//go:def.bzl", "go_library") + +go_library( + name = "sa1006", + srcs = ["analyzer.go"], + importpath = "github.com/cockroachdb/cockroach/build/bazelutil/staticcheckanalyzers/sa1006", + visibility = ["//visibility:public"], + deps = [ + "//pkg/testutils/lint/passes/staticcheck", + "@co_honnef_go_tools//staticcheck", + "@org_golang_x_tools//go/analysis", + ], +) diff --git a/build/bazelutil/staticcheckanalyzers/sa1006/analyzer.go b/build/bazelutil/staticcheckanalyzers/sa1006/analyzer.go new file mode 100644 index 000000000000..de6cd892f60d --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa1006/analyzer.go @@ -0,0 +1,24 @@ +// Code generated by generate-staticcheck; DO NOT EDIT. + +//go:build bazel +// +build bazel + +package sa1006 + +import ( + util "github.com/cockroachdb/cockroach/pkg/testutils/lint/passes/staticcheck" + "golang.org/x/tools/go/analysis" + "honnef.co/go/tools/staticcheck" +) + +var Analyzer *analysis.Analyzer + +func init() { + for _, analyzer := range staticcheck.Analyzers { + if analyzer.Analyzer.Name == "SA1006" { + Analyzer = analyzer.Analyzer + break + } + } + util.MungeAnalyzer(Analyzer) +} diff --git a/build/bazelutil/staticcheckanalyzers/sa1007/BUILD.bazel b/build/bazelutil/staticcheckanalyzers/sa1007/BUILD.bazel new file mode 100644 index 000000000000..dbafdff204f5 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa1007/BUILD.bazel @@ -0,0 +1,13 @@ +load("@io_bazel_rules_go//go:def.bzl", "go_library") + +go_library( + name = "sa1007", + srcs = ["analyzer.go"], + importpath = "github.com/cockroachdb/cockroach/build/bazelutil/staticcheckanalyzers/sa1007", + visibility = ["//visibility:public"], + deps = [ + "//pkg/testutils/lint/passes/staticcheck", + "@co_honnef_go_tools//staticcheck", + "@org_golang_x_tools//go/analysis", + ], +) diff --git a/build/bazelutil/staticcheckanalyzers/sa1007/analyzer.go b/build/bazelutil/staticcheckanalyzers/sa1007/analyzer.go new file mode 100644 index 000000000000..dc4130d8a969 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa1007/analyzer.go @@ -0,0 +1,24 @@ +// Code generated by generate-staticcheck; DO NOT EDIT. + +//go:build bazel +// +build bazel + +package sa1007 + +import ( + util "github.com/cockroachdb/cockroach/pkg/testutils/lint/passes/staticcheck" + "golang.org/x/tools/go/analysis" + "honnef.co/go/tools/staticcheck" +) + +var Analyzer *analysis.Analyzer + +func init() { + for _, analyzer := range staticcheck.Analyzers { + if analyzer.Analyzer.Name == "SA1007" { + Analyzer = analyzer.Analyzer + break + } + } + util.MungeAnalyzer(Analyzer) +} diff --git a/build/bazelutil/staticcheckanalyzers/sa1008/BUILD.bazel b/build/bazelutil/staticcheckanalyzers/sa1008/BUILD.bazel new file mode 100644 index 000000000000..42094c1b8334 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa1008/BUILD.bazel @@ -0,0 +1,13 @@ +load("@io_bazel_rules_go//go:def.bzl", "go_library") + +go_library( + name = "sa1008", + srcs = ["analyzer.go"], + importpath = "github.com/cockroachdb/cockroach/build/bazelutil/staticcheckanalyzers/sa1008", + visibility = ["//visibility:public"], + deps = [ + "//pkg/testutils/lint/passes/staticcheck", + "@co_honnef_go_tools//staticcheck", + "@org_golang_x_tools//go/analysis", + ], +) diff --git a/build/bazelutil/staticcheckanalyzers/sa1008/analyzer.go b/build/bazelutil/staticcheckanalyzers/sa1008/analyzer.go new file mode 100644 index 000000000000..8e1428e9a0c9 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa1008/analyzer.go @@ -0,0 +1,24 @@ +// Code generated by generate-staticcheck; DO NOT EDIT. + +//go:build bazel +// +build bazel + +package sa1008 + +import ( + util "github.com/cockroachdb/cockroach/pkg/testutils/lint/passes/staticcheck" + "golang.org/x/tools/go/analysis" + "honnef.co/go/tools/staticcheck" +) + +var Analyzer *analysis.Analyzer + +func init() { + for _, analyzer := range staticcheck.Analyzers { + if analyzer.Analyzer.Name == "SA1008" { + Analyzer = analyzer.Analyzer + break + } + } + util.MungeAnalyzer(Analyzer) +} diff --git a/build/bazelutil/staticcheckanalyzers/sa1010/BUILD.bazel b/build/bazelutil/staticcheckanalyzers/sa1010/BUILD.bazel new file mode 100644 index 000000000000..95c5e53a8e18 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa1010/BUILD.bazel @@ -0,0 +1,13 @@ +load("@io_bazel_rules_go//go:def.bzl", "go_library") + +go_library( + name = "sa1010", + srcs = ["analyzer.go"], + importpath = "github.com/cockroachdb/cockroach/build/bazelutil/staticcheckanalyzers/sa1010", + visibility = ["//visibility:public"], + deps = [ + "//pkg/testutils/lint/passes/staticcheck", + "@co_honnef_go_tools//staticcheck", + "@org_golang_x_tools//go/analysis", + ], +) diff --git a/build/bazelutil/staticcheckanalyzers/sa1010/analyzer.go b/build/bazelutil/staticcheckanalyzers/sa1010/analyzer.go new file mode 100644 index 000000000000..4a4d85230db8 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa1010/analyzer.go @@ -0,0 +1,24 @@ +// Code generated by generate-staticcheck; DO NOT EDIT. + +//go:build bazel +// +build bazel + +package sa1010 + +import ( + util "github.com/cockroachdb/cockroach/pkg/testutils/lint/passes/staticcheck" + "golang.org/x/tools/go/analysis" + "honnef.co/go/tools/staticcheck" +) + +var Analyzer *analysis.Analyzer + +func init() { + for _, analyzer := range staticcheck.Analyzers { + if analyzer.Analyzer.Name == "SA1010" { + Analyzer = analyzer.Analyzer + break + } + } + util.MungeAnalyzer(Analyzer) +} diff --git a/build/bazelutil/staticcheckanalyzers/sa1011/BUILD.bazel b/build/bazelutil/staticcheckanalyzers/sa1011/BUILD.bazel new file mode 100644 index 000000000000..473d8b0391ef --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa1011/BUILD.bazel @@ -0,0 +1,13 @@ +load("@io_bazel_rules_go//go:def.bzl", "go_library") + +go_library( + name = "sa1011", + srcs = ["analyzer.go"], + importpath = "github.com/cockroachdb/cockroach/build/bazelutil/staticcheckanalyzers/sa1011", + visibility = ["//visibility:public"], + deps = [ + "//pkg/testutils/lint/passes/staticcheck", + "@co_honnef_go_tools//staticcheck", + "@org_golang_x_tools//go/analysis", + ], +) diff --git a/build/bazelutil/staticcheckanalyzers/sa1011/analyzer.go b/build/bazelutil/staticcheckanalyzers/sa1011/analyzer.go new file mode 100644 index 000000000000..9b6bc63c05aa --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa1011/analyzer.go @@ -0,0 +1,24 @@ +// Code generated by generate-staticcheck; DO NOT EDIT. + +//go:build bazel +// +build bazel + +package sa1011 + +import ( + util "github.com/cockroachdb/cockroach/pkg/testutils/lint/passes/staticcheck" + "golang.org/x/tools/go/analysis" + "honnef.co/go/tools/staticcheck" +) + +var Analyzer *analysis.Analyzer + +func init() { + for _, analyzer := range staticcheck.Analyzers { + if analyzer.Analyzer.Name == "SA1011" { + Analyzer = analyzer.Analyzer + break + } + } + util.MungeAnalyzer(Analyzer) +} diff --git a/build/bazelutil/staticcheckanalyzers/sa1012/BUILD.bazel b/build/bazelutil/staticcheckanalyzers/sa1012/BUILD.bazel new file mode 100644 index 000000000000..9591420a3ca8 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa1012/BUILD.bazel @@ -0,0 +1,13 @@ +load("@io_bazel_rules_go//go:def.bzl", "go_library") + +go_library( + name = "sa1012", + srcs = ["analyzer.go"], + importpath = "github.com/cockroachdb/cockroach/build/bazelutil/staticcheckanalyzers/sa1012", + visibility = ["//visibility:public"], + deps = [ + "//pkg/testutils/lint/passes/staticcheck", + "@co_honnef_go_tools//staticcheck", + "@org_golang_x_tools//go/analysis", + ], +) diff --git a/build/bazelutil/staticcheckanalyzers/sa1012/analyzer.go b/build/bazelutil/staticcheckanalyzers/sa1012/analyzer.go new file mode 100644 index 000000000000..dcd2eb117ed8 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa1012/analyzer.go @@ -0,0 +1,24 @@ +// Code generated by generate-staticcheck; DO NOT EDIT. + +//go:build bazel +// +build bazel + +package sa1012 + +import ( + util "github.com/cockroachdb/cockroach/pkg/testutils/lint/passes/staticcheck" + "golang.org/x/tools/go/analysis" + "honnef.co/go/tools/staticcheck" +) + +var Analyzer *analysis.Analyzer + +func init() { + for _, analyzer := range staticcheck.Analyzers { + if analyzer.Analyzer.Name == "SA1012" { + Analyzer = analyzer.Analyzer + break + } + } + util.MungeAnalyzer(Analyzer) +} diff --git a/build/bazelutil/staticcheckanalyzers/sa1013/BUILD.bazel b/build/bazelutil/staticcheckanalyzers/sa1013/BUILD.bazel new file mode 100644 index 000000000000..05ee93c8a880 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa1013/BUILD.bazel @@ -0,0 +1,13 @@ +load("@io_bazel_rules_go//go:def.bzl", "go_library") + +go_library( + name = "sa1013", + srcs = ["analyzer.go"], + importpath = "github.com/cockroachdb/cockroach/build/bazelutil/staticcheckanalyzers/sa1013", + visibility = ["//visibility:public"], + deps = [ + "//pkg/testutils/lint/passes/staticcheck", + "@co_honnef_go_tools//staticcheck", + "@org_golang_x_tools//go/analysis", + ], +) diff --git a/build/bazelutil/staticcheckanalyzers/sa1013/analyzer.go b/build/bazelutil/staticcheckanalyzers/sa1013/analyzer.go new file mode 100644 index 000000000000..ea401ef91d81 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa1013/analyzer.go @@ -0,0 +1,24 @@ +// Code generated by generate-staticcheck; DO NOT EDIT. + +//go:build bazel +// +build bazel + +package sa1013 + +import ( + util "github.com/cockroachdb/cockroach/pkg/testutils/lint/passes/staticcheck" + "golang.org/x/tools/go/analysis" + "honnef.co/go/tools/staticcheck" +) + +var Analyzer *analysis.Analyzer + +func init() { + for _, analyzer := range staticcheck.Analyzers { + if analyzer.Analyzer.Name == "SA1013" { + Analyzer = analyzer.Analyzer + break + } + } + util.MungeAnalyzer(Analyzer) +} diff --git a/build/bazelutil/staticcheckanalyzers/sa1014/BUILD.bazel b/build/bazelutil/staticcheckanalyzers/sa1014/BUILD.bazel new file mode 100644 index 000000000000..2048ba964e90 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa1014/BUILD.bazel @@ -0,0 +1,13 @@ +load("@io_bazel_rules_go//go:def.bzl", "go_library") + +go_library( + name = "sa1014", + srcs = ["analyzer.go"], + importpath = "github.com/cockroachdb/cockroach/build/bazelutil/staticcheckanalyzers/sa1014", + visibility = ["//visibility:public"], + deps = [ + "//pkg/testutils/lint/passes/staticcheck", + "@co_honnef_go_tools//staticcheck", + "@org_golang_x_tools//go/analysis", + ], +) diff --git a/build/bazelutil/staticcheckanalyzers/sa1014/analyzer.go b/build/bazelutil/staticcheckanalyzers/sa1014/analyzer.go new file mode 100644 index 000000000000..b31355c7838f --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa1014/analyzer.go @@ -0,0 +1,24 @@ +// Code generated by generate-staticcheck; DO NOT EDIT. + +//go:build bazel +// +build bazel + +package sa1014 + +import ( + util "github.com/cockroachdb/cockroach/pkg/testutils/lint/passes/staticcheck" + "golang.org/x/tools/go/analysis" + "honnef.co/go/tools/staticcheck" +) + +var Analyzer *analysis.Analyzer + +func init() { + for _, analyzer := range staticcheck.Analyzers { + if analyzer.Analyzer.Name == "SA1014" { + Analyzer = analyzer.Analyzer + break + } + } + util.MungeAnalyzer(Analyzer) +} diff --git a/build/bazelutil/staticcheckanalyzers/sa1015/BUILD.bazel b/build/bazelutil/staticcheckanalyzers/sa1015/BUILD.bazel new file mode 100644 index 000000000000..34c983041084 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa1015/BUILD.bazel @@ -0,0 +1,13 @@ +load("@io_bazel_rules_go//go:def.bzl", "go_library") + +go_library( + name = "sa1015", + srcs = ["analyzer.go"], + importpath = "github.com/cockroachdb/cockroach/build/bazelutil/staticcheckanalyzers/sa1015", + visibility = ["//visibility:public"], + deps = [ + "//pkg/testutils/lint/passes/staticcheck", + "@co_honnef_go_tools//staticcheck", + "@org_golang_x_tools//go/analysis", + ], +) diff --git a/build/bazelutil/staticcheckanalyzers/sa1015/analyzer.go b/build/bazelutil/staticcheckanalyzers/sa1015/analyzer.go new file mode 100644 index 000000000000..4ef3aa02cdaf --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa1015/analyzer.go @@ -0,0 +1,24 @@ +// Code generated by generate-staticcheck; DO NOT EDIT. + +//go:build bazel +// +build bazel + +package sa1015 + +import ( + util "github.com/cockroachdb/cockroach/pkg/testutils/lint/passes/staticcheck" + "golang.org/x/tools/go/analysis" + "honnef.co/go/tools/staticcheck" +) + +var Analyzer *analysis.Analyzer + +func init() { + for _, analyzer := range staticcheck.Analyzers { + if analyzer.Analyzer.Name == "SA1015" { + Analyzer = analyzer.Analyzer + break + } + } + util.MungeAnalyzer(Analyzer) +} diff --git a/build/bazelutil/staticcheckanalyzers/sa1016/BUILD.bazel b/build/bazelutil/staticcheckanalyzers/sa1016/BUILD.bazel new file mode 100644 index 000000000000..dcd76fa89274 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa1016/BUILD.bazel @@ -0,0 +1,13 @@ +load("@io_bazel_rules_go//go:def.bzl", "go_library") + +go_library( + name = "sa1016", + srcs = ["analyzer.go"], + importpath = "github.com/cockroachdb/cockroach/build/bazelutil/staticcheckanalyzers/sa1016", + visibility = ["//visibility:public"], + deps = [ + "//pkg/testutils/lint/passes/staticcheck", + "@co_honnef_go_tools//staticcheck", + "@org_golang_x_tools//go/analysis", + ], +) diff --git a/build/bazelutil/staticcheckanalyzers/sa1016/analyzer.go b/build/bazelutil/staticcheckanalyzers/sa1016/analyzer.go new file mode 100644 index 000000000000..947d35a221f2 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa1016/analyzer.go @@ -0,0 +1,24 @@ +// Code generated by generate-staticcheck; DO NOT EDIT. + +//go:build bazel +// +build bazel + +package sa1016 + +import ( + util "github.com/cockroachdb/cockroach/pkg/testutils/lint/passes/staticcheck" + "golang.org/x/tools/go/analysis" + "honnef.co/go/tools/staticcheck" +) + +var Analyzer *analysis.Analyzer + +func init() { + for _, analyzer := range staticcheck.Analyzers { + if analyzer.Analyzer.Name == "SA1016" { + Analyzer = analyzer.Analyzer + break + } + } + util.MungeAnalyzer(Analyzer) +} diff --git a/build/bazelutil/staticcheckanalyzers/sa1017/BUILD.bazel b/build/bazelutil/staticcheckanalyzers/sa1017/BUILD.bazel new file mode 100644 index 000000000000..7e3cbb531e92 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa1017/BUILD.bazel @@ -0,0 +1,13 @@ +load("@io_bazel_rules_go//go:def.bzl", "go_library") + +go_library( + name = "sa1017", + srcs = ["analyzer.go"], + importpath = "github.com/cockroachdb/cockroach/build/bazelutil/staticcheckanalyzers/sa1017", + visibility = ["//visibility:public"], + deps = [ + "//pkg/testutils/lint/passes/staticcheck", + "@co_honnef_go_tools//staticcheck", + "@org_golang_x_tools//go/analysis", + ], +) diff --git a/build/bazelutil/staticcheckanalyzers/sa1017/analyzer.go b/build/bazelutil/staticcheckanalyzers/sa1017/analyzer.go new file mode 100644 index 000000000000..ca66e3346654 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa1017/analyzer.go @@ -0,0 +1,24 @@ +// Code generated by generate-staticcheck; DO NOT EDIT. + +//go:build bazel +// +build bazel + +package sa1017 + +import ( + util "github.com/cockroachdb/cockroach/pkg/testutils/lint/passes/staticcheck" + "golang.org/x/tools/go/analysis" + "honnef.co/go/tools/staticcheck" +) + +var Analyzer *analysis.Analyzer + +func init() { + for _, analyzer := range staticcheck.Analyzers { + if analyzer.Analyzer.Name == "SA1017" { + Analyzer = analyzer.Analyzer + break + } + } + util.MungeAnalyzer(Analyzer) +} diff --git a/build/bazelutil/staticcheckanalyzers/sa1018/BUILD.bazel b/build/bazelutil/staticcheckanalyzers/sa1018/BUILD.bazel new file mode 100644 index 000000000000..95f60e904145 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa1018/BUILD.bazel @@ -0,0 +1,13 @@ +load("@io_bazel_rules_go//go:def.bzl", "go_library") + +go_library( + name = "sa1018", + srcs = ["analyzer.go"], + importpath = "github.com/cockroachdb/cockroach/build/bazelutil/staticcheckanalyzers/sa1018", + visibility = ["//visibility:public"], + deps = [ + "//pkg/testutils/lint/passes/staticcheck", + "@co_honnef_go_tools//staticcheck", + "@org_golang_x_tools//go/analysis", + ], +) diff --git a/build/bazelutil/staticcheckanalyzers/sa1018/analyzer.go b/build/bazelutil/staticcheckanalyzers/sa1018/analyzer.go new file mode 100644 index 000000000000..082baf37f4d9 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa1018/analyzer.go @@ -0,0 +1,24 @@ +// Code generated by generate-staticcheck; DO NOT EDIT. + +//go:build bazel +// +build bazel + +package sa1018 + +import ( + util "github.com/cockroachdb/cockroach/pkg/testutils/lint/passes/staticcheck" + "golang.org/x/tools/go/analysis" + "honnef.co/go/tools/staticcheck" +) + +var Analyzer *analysis.Analyzer + +func init() { + for _, analyzer := range staticcheck.Analyzers { + if analyzer.Analyzer.Name == "SA1018" { + Analyzer = analyzer.Analyzer + break + } + } + util.MungeAnalyzer(Analyzer) +} diff --git a/build/bazelutil/staticcheckanalyzers/sa1019/BUILD.bazel b/build/bazelutil/staticcheckanalyzers/sa1019/BUILD.bazel new file mode 100644 index 000000000000..ce5326e30371 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa1019/BUILD.bazel @@ -0,0 +1,13 @@ +load("@io_bazel_rules_go//go:def.bzl", "go_library") + +go_library( + name = "sa1019", + srcs = ["analyzer.go"], + importpath = "github.com/cockroachdb/cockroach/build/bazelutil/staticcheckanalyzers/sa1019", + visibility = ["//visibility:public"], + deps = [ + "//pkg/testutils/lint/passes/staticcheck", + "@co_honnef_go_tools//staticcheck", + "@org_golang_x_tools//go/analysis", + ], +) diff --git a/build/bazelutil/staticcheckanalyzers/sa1019/analyzer.go b/build/bazelutil/staticcheckanalyzers/sa1019/analyzer.go new file mode 100644 index 000000000000..6ba7721c784f --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa1019/analyzer.go @@ -0,0 +1,24 @@ +// Code generated by generate-staticcheck; DO NOT EDIT. + +//go:build bazel +// +build bazel + +package sa1019 + +import ( + util "github.com/cockroachdb/cockroach/pkg/testutils/lint/passes/staticcheck" + "golang.org/x/tools/go/analysis" + "honnef.co/go/tools/staticcheck" +) + +var Analyzer *analysis.Analyzer + +func init() { + for _, analyzer := range staticcheck.Analyzers { + if analyzer.Analyzer.Name == "SA1019" { + Analyzer = analyzer.Analyzer + break + } + } + util.MungeAnalyzer(Analyzer) +} diff --git a/build/bazelutil/staticcheckanalyzers/sa1020/BUILD.bazel b/build/bazelutil/staticcheckanalyzers/sa1020/BUILD.bazel new file mode 100644 index 000000000000..b5305d4e9b3a --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa1020/BUILD.bazel @@ -0,0 +1,13 @@ +load("@io_bazel_rules_go//go:def.bzl", "go_library") + +go_library( + name = "sa1020", + srcs = ["analyzer.go"], + importpath = "github.com/cockroachdb/cockroach/build/bazelutil/staticcheckanalyzers/sa1020", + visibility = ["//visibility:public"], + deps = [ + "//pkg/testutils/lint/passes/staticcheck", + "@co_honnef_go_tools//staticcheck", + "@org_golang_x_tools//go/analysis", + ], +) diff --git a/build/bazelutil/staticcheckanalyzers/sa1020/analyzer.go b/build/bazelutil/staticcheckanalyzers/sa1020/analyzer.go new file mode 100644 index 000000000000..d6b2c1cfffbc --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa1020/analyzer.go @@ -0,0 +1,24 @@ +// Code generated by generate-staticcheck; DO NOT EDIT. + +//go:build bazel +// +build bazel + +package sa1020 + +import ( + util "github.com/cockroachdb/cockroach/pkg/testutils/lint/passes/staticcheck" + "golang.org/x/tools/go/analysis" + "honnef.co/go/tools/staticcheck" +) + +var Analyzer *analysis.Analyzer + +func init() { + for _, analyzer := range staticcheck.Analyzers { + if analyzer.Analyzer.Name == "SA1020" { + Analyzer = analyzer.Analyzer + break + } + } + util.MungeAnalyzer(Analyzer) +} diff --git a/build/bazelutil/staticcheckanalyzers/sa1021/BUILD.bazel b/build/bazelutil/staticcheckanalyzers/sa1021/BUILD.bazel new file mode 100644 index 000000000000..197e010ff31a --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa1021/BUILD.bazel @@ -0,0 +1,13 @@ +load("@io_bazel_rules_go//go:def.bzl", "go_library") + +go_library( + name = "sa1021", + srcs = ["analyzer.go"], + importpath = "github.com/cockroachdb/cockroach/build/bazelutil/staticcheckanalyzers/sa1021", + visibility = ["//visibility:public"], + deps = [ + "//pkg/testutils/lint/passes/staticcheck", + "@co_honnef_go_tools//staticcheck", + "@org_golang_x_tools//go/analysis", + ], +) diff --git a/build/bazelutil/staticcheckanalyzers/sa1021/analyzer.go b/build/bazelutil/staticcheckanalyzers/sa1021/analyzer.go new file mode 100644 index 000000000000..0a570f851886 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa1021/analyzer.go @@ -0,0 +1,24 @@ +// Code generated by generate-staticcheck; DO NOT EDIT. + +//go:build bazel +// +build bazel + +package sa1021 + +import ( + util "github.com/cockroachdb/cockroach/pkg/testutils/lint/passes/staticcheck" + "golang.org/x/tools/go/analysis" + "honnef.co/go/tools/staticcheck" +) + +var Analyzer *analysis.Analyzer + +func init() { + for _, analyzer := range staticcheck.Analyzers { + if analyzer.Analyzer.Name == "SA1021" { + Analyzer = analyzer.Analyzer + break + } + } + util.MungeAnalyzer(Analyzer) +} diff --git a/build/bazelutil/staticcheckanalyzers/sa1023/BUILD.bazel b/build/bazelutil/staticcheckanalyzers/sa1023/BUILD.bazel new file mode 100644 index 000000000000..483a52f8de41 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa1023/BUILD.bazel @@ -0,0 +1,13 @@ +load("@io_bazel_rules_go//go:def.bzl", "go_library") + +go_library( + name = "sa1023", + srcs = ["analyzer.go"], + importpath = "github.com/cockroachdb/cockroach/build/bazelutil/staticcheckanalyzers/sa1023", + visibility = ["//visibility:public"], + deps = [ + "//pkg/testutils/lint/passes/staticcheck", + "@co_honnef_go_tools//staticcheck", + "@org_golang_x_tools//go/analysis", + ], +) diff --git a/build/bazelutil/staticcheckanalyzers/sa1023/analyzer.go b/build/bazelutil/staticcheckanalyzers/sa1023/analyzer.go new file mode 100644 index 000000000000..8b2ec5b54e38 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa1023/analyzer.go @@ -0,0 +1,24 @@ +// Code generated by generate-staticcheck; DO NOT EDIT. + +//go:build bazel +// +build bazel + +package sa1023 + +import ( + util "github.com/cockroachdb/cockroach/pkg/testutils/lint/passes/staticcheck" + "golang.org/x/tools/go/analysis" + "honnef.co/go/tools/staticcheck" +) + +var Analyzer *analysis.Analyzer + +func init() { + for _, analyzer := range staticcheck.Analyzers { + if analyzer.Analyzer.Name == "SA1023" { + Analyzer = analyzer.Analyzer + break + } + } + util.MungeAnalyzer(Analyzer) +} diff --git a/build/bazelutil/staticcheckanalyzers/sa1024/BUILD.bazel b/build/bazelutil/staticcheckanalyzers/sa1024/BUILD.bazel new file mode 100644 index 000000000000..8c5ecdfd9cbb --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa1024/BUILD.bazel @@ -0,0 +1,13 @@ +load("@io_bazel_rules_go//go:def.bzl", "go_library") + +go_library( + name = "sa1024", + srcs = ["analyzer.go"], + importpath = "github.com/cockroachdb/cockroach/build/bazelutil/staticcheckanalyzers/sa1024", + visibility = ["//visibility:public"], + deps = [ + "//pkg/testutils/lint/passes/staticcheck", + "@co_honnef_go_tools//staticcheck", + "@org_golang_x_tools//go/analysis", + ], +) diff --git a/build/bazelutil/staticcheckanalyzers/sa1024/analyzer.go b/build/bazelutil/staticcheckanalyzers/sa1024/analyzer.go new file mode 100644 index 000000000000..acc052bd6e13 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa1024/analyzer.go @@ -0,0 +1,24 @@ +// Code generated by generate-staticcheck; DO NOT EDIT. + +//go:build bazel +// +build bazel + +package sa1024 + +import ( + util "github.com/cockroachdb/cockroach/pkg/testutils/lint/passes/staticcheck" + "golang.org/x/tools/go/analysis" + "honnef.co/go/tools/staticcheck" +) + +var Analyzer *analysis.Analyzer + +func init() { + for _, analyzer := range staticcheck.Analyzers { + if analyzer.Analyzer.Name == "SA1024" { + Analyzer = analyzer.Analyzer + break + } + } + util.MungeAnalyzer(Analyzer) +} diff --git a/build/bazelutil/staticcheckanalyzers/sa1025/BUILD.bazel b/build/bazelutil/staticcheckanalyzers/sa1025/BUILD.bazel new file mode 100644 index 000000000000..f73118b9db3c --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa1025/BUILD.bazel @@ -0,0 +1,13 @@ +load("@io_bazel_rules_go//go:def.bzl", "go_library") + +go_library( + name = "sa1025", + srcs = ["analyzer.go"], + importpath = "github.com/cockroachdb/cockroach/build/bazelutil/staticcheckanalyzers/sa1025", + visibility = ["//visibility:public"], + deps = [ + "//pkg/testutils/lint/passes/staticcheck", + "@co_honnef_go_tools//staticcheck", + "@org_golang_x_tools//go/analysis", + ], +) diff --git a/build/bazelutil/staticcheckanalyzers/sa1025/analyzer.go b/build/bazelutil/staticcheckanalyzers/sa1025/analyzer.go new file mode 100644 index 000000000000..32e0649d7378 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa1025/analyzer.go @@ -0,0 +1,24 @@ +// Code generated by generate-staticcheck; DO NOT EDIT. + +//go:build bazel +// +build bazel + +package sa1025 + +import ( + util "github.com/cockroachdb/cockroach/pkg/testutils/lint/passes/staticcheck" + "golang.org/x/tools/go/analysis" + "honnef.co/go/tools/staticcheck" +) + +var Analyzer *analysis.Analyzer + +func init() { + for _, analyzer := range staticcheck.Analyzers { + if analyzer.Analyzer.Name == "SA1025" { + Analyzer = analyzer.Analyzer + break + } + } + util.MungeAnalyzer(Analyzer) +} diff --git a/build/bazelutil/staticcheckanalyzers/sa1026/BUILD.bazel b/build/bazelutil/staticcheckanalyzers/sa1026/BUILD.bazel new file mode 100644 index 000000000000..c78b97ebfca6 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa1026/BUILD.bazel @@ -0,0 +1,13 @@ +load("@io_bazel_rules_go//go:def.bzl", "go_library") + +go_library( + name = "sa1026", + srcs = ["analyzer.go"], + importpath = "github.com/cockroachdb/cockroach/build/bazelutil/staticcheckanalyzers/sa1026", + visibility = ["//visibility:public"], + deps = [ + "//pkg/testutils/lint/passes/staticcheck", + "@co_honnef_go_tools//staticcheck", + "@org_golang_x_tools//go/analysis", + ], +) diff --git a/build/bazelutil/staticcheckanalyzers/sa1026/analyzer.go b/build/bazelutil/staticcheckanalyzers/sa1026/analyzer.go new file mode 100644 index 000000000000..c5e696ce6da5 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa1026/analyzer.go @@ -0,0 +1,24 @@ +// Code generated by generate-staticcheck; DO NOT EDIT. + +//go:build bazel +// +build bazel + +package sa1026 + +import ( + util "github.com/cockroachdb/cockroach/pkg/testutils/lint/passes/staticcheck" + "golang.org/x/tools/go/analysis" + "honnef.co/go/tools/staticcheck" +) + +var Analyzer *analysis.Analyzer + +func init() { + for _, analyzer := range staticcheck.Analyzers { + if analyzer.Analyzer.Name == "SA1026" { + Analyzer = analyzer.Analyzer + break + } + } + util.MungeAnalyzer(Analyzer) +} diff --git a/build/bazelutil/staticcheckanalyzers/sa1027/BUILD.bazel b/build/bazelutil/staticcheckanalyzers/sa1027/BUILD.bazel new file mode 100644 index 000000000000..e6b60d13307e --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa1027/BUILD.bazel @@ -0,0 +1,13 @@ +load("@io_bazel_rules_go//go:def.bzl", "go_library") + +go_library( + name = "sa1027", + srcs = ["analyzer.go"], + importpath = "github.com/cockroachdb/cockroach/build/bazelutil/staticcheckanalyzers/sa1027", + visibility = ["//visibility:public"], + deps = [ + "//pkg/testutils/lint/passes/staticcheck", + "@co_honnef_go_tools//staticcheck", + "@org_golang_x_tools//go/analysis", + ], +) diff --git a/build/bazelutil/staticcheckanalyzers/sa1027/analyzer.go b/build/bazelutil/staticcheckanalyzers/sa1027/analyzer.go new file mode 100644 index 000000000000..55572d71e325 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa1027/analyzer.go @@ -0,0 +1,24 @@ +// Code generated by generate-staticcheck; DO NOT EDIT. + +//go:build bazel +// +build bazel + +package sa1027 + +import ( + util "github.com/cockroachdb/cockroach/pkg/testutils/lint/passes/staticcheck" + "golang.org/x/tools/go/analysis" + "honnef.co/go/tools/staticcheck" +) + +var Analyzer *analysis.Analyzer + +func init() { + for _, analyzer := range staticcheck.Analyzers { + if analyzer.Analyzer.Name == "SA1027" { + Analyzer = analyzer.Analyzer + break + } + } + util.MungeAnalyzer(Analyzer) +} diff --git a/build/bazelutil/staticcheckanalyzers/sa1028/BUILD.bazel b/build/bazelutil/staticcheckanalyzers/sa1028/BUILD.bazel new file mode 100644 index 000000000000..edde4ba83779 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa1028/BUILD.bazel @@ -0,0 +1,13 @@ +load("@io_bazel_rules_go//go:def.bzl", "go_library") + +go_library( + name = "sa1028", + srcs = ["analyzer.go"], + importpath = "github.com/cockroachdb/cockroach/build/bazelutil/staticcheckanalyzers/sa1028", + visibility = ["//visibility:public"], + deps = [ + "//pkg/testutils/lint/passes/staticcheck", + "@co_honnef_go_tools//staticcheck", + "@org_golang_x_tools//go/analysis", + ], +) diff --git a/build/bazelutil/staticcheckanalyzers/sa1028/analyzer.go b/build/bazelutil/staticcheckanalyzers/sa1028/analyzer.go new file mode 100644 index 000000000000..9a23b5c2071d --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa1028/analyzer.go @@ -0,0 +1,24 @@ +// Code generated by generate-staticcheck; DO NOT EDIT. + +//go:build bazel +// +build bazel + +package sa1028 + +import ( + util "github.com/cockroachdb/cockroach/pkg/testutils/lint/passes/staticcheck" + "golang.org/x/tools/go/analysis" + "honnef.co/go/tools/staticcheck" +) + +var Analyzer *analysis.Analyzer + +func init() { + for _, analyzer := range staticcheck.Analyzers { + if analyzer.Analyzer.Name == "SA1028" { + Analyzer = analyzer.Analyzer + break + } + } + util.MungeAnalyzer(Analyzer) +} diff --git a/build/bazelutil/staticcheckanalyzers/sa1029/BUILD.bazel b/build/bazelutil/staticcheckanalyzers/sa1029/BUILD.bazel new file mode 100644 index 000000000000..3f8ec7cc6a3f --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa1029/BUILD.bazel @@ -0,0 +1,13 @@ +load("@io_bazel_rules_go//go:def.bzl", "go_library") + +go_library( + name = "sa1029", + srcs = ["analyzer.go"], + importpath = "github.com/cockroachdb/cockroach/build/bazelutil/staticcheckanalyzers/sa1029", + visibility = ["//visibility:public"], + deps = [ + "//pkg/testutils/lint/passes/staticcheck", + "@co_honnef_go_tools//staticcheck", + "@org_golang_x_tools//go/analysis", + ], +) diff --git a/build/bazelutil/staticcheckanalyzers/sa1029/analyzer.go b/build/bazelutil/staticcheckanalyzers/sa1029/analyzer.go new file mode 100644 index 000000000000..ac55442eb729 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa1029/analyzer.go @@ -0,0 +1,24 @@ +// Code generated by generate-staticcheck; DO NOT EDIT. + +//go:build bazel +// +build bazel + +package sa1029 + +import ( + util "github.com/cockroachdb/cockroach/pkg/testutils/lint/passes/staticcheck" + "golang.org/x/tools/go/analysis" + "honnef.co/go/tools/staticcheck" +) + +var Analyzer *analysis.Analyzer + +func init() { + for _, analyzer := range staticcheck.Analyzers { + if analyzer.Analyzer.Name == "SA1029" { + Analyzer = analyzer.Analyzer + break + } + } + util.MungeAnalyzer(Analyzer) +} diff --git a/build/bazelutil/staticcheckanalyzers/sa1030/BUILD.bazel b/build/bazelutil/staticcheckanalyzers/sa1030/BUILD.bazel new file mode 100644 index 000000000000..9701b3296f9d --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa1030/BUILD.bazel @@ -0,0 +1,13 @@ +load("@io_bazel_rules_go//go:def.bzl", "go_library") + +go_library( + name = "sa1030", + srcs = ["analyzer.go"], + importpath = "github.com/cockroachdb/cockroach/build/bazelutil/staticcheckanalyzers/sa1030", + visibility = ["//visibility:public"], + deps = [ + "//pkg/testutils/lint/passes/staticcheck", + "@co_honnef_go_tools//staticcheck", + "@org_golang_x_tools//go/analysis", + ], +) diff --git a/build/bazelutil/staticcheckanalyzers/sa1030/analyzer.go b/build/bazelutil/staticcheckanalyzers/sa1030/analyzer.go new file mode 100644 index 000000000000..0e2b99e8b4cd --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa1030/analyzer.go @@ -0,0 +1,24 @@ +// Code generated by generate-staticcheck; DO NOT EDIT. + +//go:build bazel +// +build bazel + +package sa1030 + +import ( + util "github.com/cockroachdb/cockroach/pkg/testutils/lint/passes/staticcheck" + "golang.org/x/tools/go/analysis" + "honnef.co/go/tools/staticcheck" +) + +var Analyzer *analysis.Analyzer + +func init() { + for _, analyzer := range staticcheck.Analyzers { + if analyzer.Analyzer.Name == "SA1030" { + Analyzer = analyzer.Analyzer + break + } + } + util.MungeAnalyzer(Analyzer) +} diff --git a/build/bazelutil/staticcheckanalyzers/sa2000/BUILD.bazel b/build/bazelutil/staticcheckanalyzers/sa2000/BUILD.bazel new file mode 100644 index 000000000000..58bcec68d3a9 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa2000/BUILD.bazel @@ -0,0 +1,13 @@ +load("@io_bazel_rules_go//go:def.bzl", "go_library") + +go_library( + name = "sa2000", + srcs = ["analyzer.go"], + importpath = "github.com/cockroachdb/cockroach/build/bazelutil/staticcheckanalyzers/sa2000", + visibility = ["//visibility:public"], + deps = [ + "//pkg/testutils/lint/passes/staticcheck", + "@co_honnef_go_tools//staticcheck", + "@org_golang_x_tools//go/analysis", + ], +) diff --git a/build/bazelutil/staticcheckanalyzers/sa2000/analyzer.go b/build/bazelutil/staticcheckanalyzers/sa2000/analyzer.go new file mode 100644 index 000000000000..f4406584ed96 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa2000/analyzer.go @@ -0,0 +1,24 @@ +// Code generated by generate-staticcheck; DO NOT EDIT. + +//go:build bazel +// +build bazel + +package sa2000 + +import ( + util "github.com/cockroachdb/cockroach/pkg/testutils/lint/passes/staticcheck" + "golang.org/x/tools/go/analysis" + "honnef.co/go/tools/staticcheck" +) + +var Analyzer *analysis.Analyzer + +func init() { + for _, analyzer := range staticcheck.Analyzers { + if analyzer.Analyzer.Name == "SA2000" { + Analyzer = analyzer.Analyzer + break + } + } + util.MungeAnalyzer(Analyzer) +} diff --git a/build/bazelutil/staticcheckanalyzers/sa2001/BUILD.bazel b/build/bazelutil/staticcheckanalyzers/sa2001/BUILD.bazel new file mode 100644 index 000000000000..b358613fdc7d --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa2001/BUILD.bazel @@ -0,0 +1,13 @@ +load("@io_bazel_rules_go//go:def.bzl", "go_library") + +go_library( + name = "sa2001", + srcs = ["analyzer.go"], + importpath = "github.com/cockroachdb/cockroach/build/bazelutil/staticcheckanalyzers/sa2001", + visibility = ["//visibility:public"], + deps = [ + "//pkg/testutils/lint/passes/staticcheck", + "@co_honnef_go_tools//staticcheck", + "@org_golang_x_tools//go/analysis", + ], +) diff --git a/build/bazelutil/staticcheckanalyzers/sa2001/analyzer.go b/build/bazelutil/staticcheckanalyzers/sa2001/analyzer.go new file mode 100644 index 000000000000..202a9d36887d --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa2001/analyzer.go @@ -0,0 +1,24 @@ +// Code generated by generate-staticcheck; DO NOT EDIT. + +//go:build bazel +// +build bazel + +package sa2001 + +import ( + util "github.com/cockroachdb/cockroach/pkg/testutils/lint/passes/staticcheck" + "golang.org/x/tools/go/analysis" + "honnef.co/go/tools/staticcheck" +) + +var Analyzer *analysis.Analyzer + +func init() { + for _, analyzer := range staticcheck.Analyzers { + if analyzer.Analyzer.Name == "SA2001" { + Analyzer = analyzer.Analyzer + break + } + } + util.MungeAnalyzer(Analyzer) +} diff --git a/build/bazelutil/staticcheckanalyzers/sa2002/BUILD.bazel b/build/bazelutil/staticcheckanalyzers/sa2002/BUILD.bazel new file mode 100644 index 000000000000..65e33d0370f7 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa2002/BUILD.bazel @@ -0,0 +1,13 @@ +load("@io_bazel_rules_go//go:def.bzl", "go_library") + +go_library( + name = "sa2002", + srcs = ["analyzer.go"], + importpath = "github.com/cockroachdb/cockroach/build/bazelutil/staticcheckanalyzers/sa2002", + visibility = ["//visibility:public"], + deps = [ + "//pkg/testutils/lint/passes/staticcheck", + "@co_honnef_go_tools//staticcheck", + "@org_golang_x_tools//go/analysis", + ], +) diff --git a/build/bazelutil/staticcheckanalyzers/sa2002/analyzer.go b/build/bazelutil/staticcheckanalyzers/sa2002/analyzer.go new file mode 100644 index 000000000000..25d36638dc13 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa2002/analyzer.go @@ -0,0 +1,24 @@ +// Code generated by generate-staticcheck; DO NOT EDIT. + +//go:build bazel +// +build bazel + +package sa2002 + +import ( + util "github.com/cockroachdb/cockroach/pkg/testutils/lint/passes/staticcheck" + "golang.org/x/tools/go/analysis" + "honnef.co/go/tools/staticcheck" +) + +var Analyzer *analysis.Analyzer + +func init() { + for _, analyzer := range staticcheck.Analyzers { + if analyzer.Analyzer.Name == "SA2002" { + Analyzer = analyzer.Analyzer + break + } + } + util.MungeAnalyzer(Analyzer) +} diff --git a/build/bazelutil/staticcheckanalyzers/sa2003/BUILD.bazel b/build/bazelutil/staticcheckanalyzers/sa2003/BUILD.bazel new file mode 100644 index 000000000000..a105f40c5009 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa2003/BUILD.bazel @@ -0,0 +1,13 @@ +load("@io_bazel_rules_go//go:def.bzl", "go_library") + +go_library( + name = "sa2003", + srcs = ["analyzer.go"], + importpath = "github.com/cockroachdb/cockroach/build/bazelutil/staticcheckanalyzers/sa2003", + visibility = ["//visibility:public"], + deps = [ + "//pkg/testutils/lint/passes/staticcheck", + "@co_honnef_go_tools//staticcheck", + "@org_golang_x_tools//go/analysis", + ], +) diff --git a/build/bazelutil/staticcheckanalyzers/sa2003/analyzer.go b/build/bazelutil/staticcheckanalyzers/sa2003/analyzer.go new file mode 100644 index 000000000000..5665d9f8c589 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa2003/analyzer.go @@ -0,0 +1,24 @@ +// Code generated by generate-staticcheck; DO NOT EDIT. + +//go:build bazel +// +build bazel + +package sa2003 + +import ( + util "github.com/cockroachdb/cockroach/pkg/testutils/lint/passes/staticcheck" + "golang.org/x/tools/go/analysis" + "honnef.co/go/tools/staticcheck" +) + +var Analyzer *analysis.Analyzer + +func init() { + for _, analyzer := range staticcheck.Analyzers { + if analyzer.Analyzer.Name == "SA2003" { + Analyzer = analyzer.Analyzer + break + } + } + util.MungeAnalyzer(Analyzer) +} diff --git a/build/bazelutil/staticcheckanalyzers/sa3000/BUILD.bazel b/build/bazelutil/staticcheckanalyzers/sa3000/BUILD.bazel new file mode 100644 index 000000000000..ec0e785bb4d3 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa3000/BUILD.bazel @@ -0,0 +1,13 @@ +load("@io_bazel_rules_go//go:def.bzl", "go_library") + +go_library( + name = "sa3000", + srcs = ["analyzer.go"], + importpath = "github.com/cockroachdb/cockroach/build/bazelutil/staticcheckanalyzers/sa3000", + visibility = ["//visibility:public"], + deps = [ + "//pkg/testutils/lint/passes/staticcheck", + "@co_honnef_go_tools//staticcheck", + "@org_golang_x_tools//go/analysis", + ], +) diff --git a/build/bazelutil/staticcheckanalyzers/sa3000/analyzer.go b/build/bazelutil/staticcheckanalyzers/sa3000/analyzer.go new file mode 100644 index 000000000000..bc4c3d01cce3 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa3000/analyzer.go @@ -0,0 +1,24 @@ +// Code generated by generate-staticcheck; DO NOT EDIT. + +//go:build bazel +// +build bazel + +package sa3000 + +import ( + util "github.com/cockroachdb/cockroach/pkg/testutils/lint/passes/staticcheck" + "golang.org/x/tools/go/analysis" + "honnef.co/go/tools/staticcheck" +) + +var Analyzer *analysis.Analyzer + +func init() { + for _, analyzer := range staticcheck.Analyzers { + if analyzer.Analyzer.Name == "SA3000" { + Analyzer = analyzer.Analyzer + break + } + } + util.MungeAnalyzer(Analyzer) +} diff --git a/build/bazelutil/staticcheckanalyzers/sa3001/BUILD.bazel b/build/bazelutil/staticcheckanalyzers/sa3001/BUILD.bazel new file mode 100644 index 000000000000..9c1af386b583 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa3001/BUILD.bazel @@ -0,0 +1,13 @@ +load("@io_bazel_rules_go//go:def.bzl", "go_library") + +go_library( + name = "sa3001", + srcs = ["analyzer.go"], + importpath = "github.com/cockroachdb/cockroach/build/bazelutil/staticcheckanalyzers/sa3001", + visibility = ["//visibility:public"], + deps = [ + "//pkg/testutils/lint/passes/staticcheck", + "@co_honnef_go_tools//staticcheck", + "@org_golang_x_tools//go/analysis", + ], +) diff --git a/build/bazelutil/staticcheckanalyzers/sa3001/analyzer.go b/build/bazelutil/staticcheckanalyzers/sa3001/analyzer.go new file mode 100644 index 000000000000..6127f07e9b94 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa3001/analyzer.go @@ -0,0 +1,24 @@ +// Code generated by generate-staticcheck; DO NOT EDIT. + +//go:build bazel +// +build bazel + +package sa3001 + +import ( + util "github.com/cockroachdb/cockroach/pkg/testutils/lint/passes/staticcheck" + "golang.org/x/tools/go/analysis" + "honnef.co/go/tools/staticcheck" +) + +var Analyzer *analysis.Analyzer + +func init() { + for _, analyzer := range staticcheck.Analyzers { + if analyzer.Analyzer.Name == "SA3001" { + Analyzer = analyzer.Analyzer + break + } + } + util.MungeAnalyzer(Analyzer) +} diff --git a/build/bazelutil/staticcheckanalyzers/sa4000/BUILD.bazel b/build/bazelutil/staticcheckanalyzers/sa4000/BUILD.bazel new file mode 100644 index 000000000000..60993906bd3f --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa4000/BUILD.bazel @@ -0,0 +1,13 @@ +load("@io_bazel_rules_go//go:def.bzl", "go_library") + +go_library( + name = "sa4000", + srcs = ["analyzer.go"], + importpath = "github.com/cockroachdb/cockroach/build/bazelutil/staticcheckanalyzers/sa4000", + visibility = ["//visibility:public"], + deps = [ + "//pkg/testutils/lint/passes/staticcheck", + "@co_honnef_go_tools//staticcheck", + "@org_golang_x_tools//go/analysis", + ], +) diff --git a/build/bazelutil/staticcheckanalyzers/sa4000/analyzer.go b/build/bazelutil/staticcheckanalyzers/sa4000/analyzer.go new file mode 100644 index 000000000000..1ab514adefa6 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa4000/analyzer.go @@ -0,0 +1,24 @@ +// Code generated by generate-staticcheck; DO NOT EDIT. + +//go:build bazel +// +build bazel + +package sa4000 + +import ( + util "github.com/cockroachdb/cockroach/pkg/testutils/lint/passes/staticcheck" + "golang.org/x/tools/go/analysis" + "honnef.co/go/tools/staticcheck" +) + +var Analyzer *analysis.Analyzer + +func init() { + for _, analyzer := range staticcheck.Analyzers { + if analyzer.Analyzer.Name == "SA4000" { + Analyzer = analyzer.Analyzer + break + } + } + util.MungeAnalyzer(Analyzer) +} diff --git a/build/bazelutil/staticcheckanalyzers/sa4001/BUILD.bazel b/build/bazelutil/staticcheckanalyzers/sa4001/BUILD.bazel new file mode 100644 index 000000000000..35e7db70a04a --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa4001/BUILD.bazel @@ -0,0 +1,13 @@ +load("@io_bazel_rules_go//go:def.bzl", "go_library") + +go_library( + name = "sa4001", + srcs = ["analyzer.go"], + importpath = "github.com/cockroachdb/cockroach/build/bazelutil/staticcheckanalyzers/sa4001", + visibility = ["//visibility:public"], + deps = [ + "//pkg/testutils/lint/passes/staticcheck", + "@co_honnef_go_tools//staticcheck", + "@org_golang_x_tools//go/analysis", + ], +) diff --git a/build/bazelutil/staticcheckanalyzers/sa4001/analyzer.go b/build/bazelutil/staticcheckanalyzers/sa4001/analyzer.go new file mode 100644 index 000000000000..105b83d45636 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa4001/analyzer.go @@ -0,0 +1,24 @@ +// Code generated by generate-staticcheck; DO NOT EDIT. + +//go:build bazel +// +build bazel + +package sa4001 + +import ( + util "github.com/cockroachdb/cockroach/pkg/testutils/lint/passes/staticcheck" + "golang.org/x/tools/go/analysis" + "honnef.co/go/tools/staticcheck" +) + +var Analyzer *analysis.Analyzer + +func init() { + for _, analyzer := range staticcheck.Analyzers { + if analyzer.Analyzer.Name == "SA4001" { + Analyzer = analyzer.Analyzer + break + } + } + util.MungeAnalyzer(Analyzer) +} diff --git a/build/bazelutil/staticcheckanalyzers/sa4003/BUILD.bazel b/build/bazelutil/staticcheckanalyzers/sa4003/BUILD.bazel new file mode 100644 index 000000000000..127c3f9b706c --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa4003/BUILD.bazel @@ -0,0 +1,13 @@ +load("@io_bazel_rules_go//go:def.bzl", "go_library") + +go_library( + name = "sa4003", + srcs = ["analyzer.go"], + importpath = "github.com/cockroachdb/cockroach/build/bazelutil/staticcheckanalyzers/sa4003", + visibility = ["//visibility:public"], + deps = [ + "//pkg/testutils/lint/passes/staticcheck", + "@co_honnef_go_tools//staticcheck", + "@org_golang_x_tools//go/analysis", + ], +) diff --git a/build/bazelutil/staticcheckanalyzers/sa4003/analyzer.go b/build/bazelutil/staticcheckanalyzers/sa4003/analyzer.go new file mode 100644 index 000000000000..9115abb4a4c9 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa4003/analyzer.go @@ -0,0 +1,24 @@ +// Code generated by generate-staticcheck; DO NOT EDIT. + +//go:build bazel +// +build bazel + +package sa4003 + +import ( + util "github.com/cockroachdb/cockroach/pkg/testutils/lint/passes/staticcheck" + "golang.org/x/tools/go/analysis" + "honnef.co/go/tools/staticcheck" +) + +var Analyzer *analysis.Analyzer + +func init() { + for _, analyzer := range staticcheck.Analyzers { + if analyzer.Analyzer.Name == "SA4003" { + Analyzer = analyzer.Analyzer + break + } + } + util.MungeAnalyzer(Analyzer) +} diff --git a/build/bazelutil/staticcheckanalyzers/sa4004/BUILD.bazel b/build/bazelutil/staticcheckanalyzers/sa4004/BUILD.bazel new file mode 100644 index 000000000000..684cf396ce8d --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa4004/BUILD.bazel @@ -0,0 +1,13 @@ +load("@io_bazel_rules_go//go:def.bzl", "go_library") + +go_library( + name = "sa4004", + srcs = ["analyzer.go"], + importpath = "github.com/cockroachdb/cockroach/build/bazelutil/staticcheckanalyzers/sa4004", + visibility = ["//visibility:public"], + deps = [ + "//pkg/testutils/lint/passes/staticcheck", + "@co_honnef_go_tools//staticcheck", + "@org_golang_x_tools//go/analysis", + ], +) diff --git a/build/bazelutil/staticcheckanalyzers/sa4004/analyzer.go b/build/bazelutil/staticcheckanalyzers/sa4004/analyzer.go new file mode 100644 index 000000000000..ec53254a17a3 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa4004/analyzer.go @@ -0,0 +1,24 @@ +// Code generated by generate-staticcheck; DO NOT EDIT. + +//go:build bazel +// +build bazel + +package sa4004 + +import ( + util "github.com/cockroachdb/cockroach/pkg/testutils/lint/passes/staticcheck" + "golang.org/x/tools/go/analysis" + "honnef.co/go/tools/staticcheck" +) + +var Analyzer *analysis.Analyzer + +func init() { + for _, analyzer := range staticcheck.Analyzers { + if analyzer.Analyzer.Name == "SA4004" { + Analyzer = analyzer.Analyzer + break + } + } + util.MungeAnalyzer(Analyzer) +} diff --git a/build/bazelutil/staticcheckanalyzers/sa4005/BUILD.bazel b/build/bazelutil/staticcheckanalyzers/sa4005/BUILD.bazel new file mode 100644 index 000000000000..ea32c507c055 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa4005/BUILD.bazel @@ -0,0 +1,13 @@ +load("@io_bazel_rules_go//go:def.bzl", "go_library") + +go_library( + name = "sa4005", + srcs = ["analyzer.go"], + importpath = "github.com/cockroachdb/cockroach/build/bazelutil/staticcheckanalyzers/sa4005", + visibility = ["//visibility:public"], + deps = [ + "//pkg/testutils/lint/passes/staticcheck", + "@co_honnef_go_tools//staticcheck", + "@org_golang_x_tools//go/analysis", + ], +) diff --git a/build/bazelutil/staticcheckanalyzers/sa4005/analyzer.go b/build/bazelutil/staticcheckanalyzers/sa4005/analyzer.go new file mode 100644 index 000000000000..161554e3eb95 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa4005/analyzer.go @@ -0,0 +1,24 @@ +// Code generated by generate-staticcheck; DO NOT EDIT. + +//go:build bazel +// +build bazel + +package sa4005 + +import ( + util "github.com/cockroachdb/cockroach/pkg/testutils/lint/passes/staticcheck" + "golang.org/x/tools/go/analysis" + "honnef.co/go/tools/staticcheck" +) + +var Analyzer *analysis.Analyzer + +func init() { + for _, analyzer := range staticcheck.Analyzers { + if analyzer.Analyzer.Name == "SA4005" { + Analyzer = analyzer.Analyzer + break + } + } + util.MungeAnalyzer(Analyzer) +} diff --git a/build/bazelutil/staticcheckanalyzers/sa4006/BUILD.bazel b/build/bazelutil/staticcheckanalyzers/sa4006/BUILD.bazel new file mode 100644 index 000000000000..a2644ec7db92 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa4006/BUILD.bazel @@ -0,0 +1,13 @@ +load("@io_bazel_rules_go//go:def.bzl", "go_library") + +go_library( + name = "sa4006", + srcs = ["analyzer.go"], + importpath = "github.com/cockroachdb/cockroach/build/bazelutil/staticcheckanalyzers/sa4006", + visibility = ["//visibility:public"], + deps = [ + "//pkg/testutils/lint/passes/staticcheck", + "@co_honnef_go_tools//staticcheck", + "@org_golang_x_tools//go/analysis", + ], +) diff --git a/build/bazelutil/staticcheckanalyzers/sa4006/analyzer.go b/build/bazelutil/staticcheckanalyzers/sa4006/analyzer.go new file mode 100644 index 000000000000..1d1d731d7330 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa4006/analyzer.go @@ -0,0 +1,24 @@ +// Code generated by generate-staticcheck; DO NOT EDIT. + +//go:build bazel +// +build bazel + +package sa4006 + +import ( + util "github.com/cockroachdb/cockroach/pkg/testutils/lint/passes/staticcheck" + "golang.org/x/tools/go/analysis" + "honnef.co/go/tools/staticcheck" +) + +var Analyzer *analysis.Analyzer + +func init() { + for _, analyzer := range staticcheck.Analyzers { + if analyzer.Analyzer.Name == "SA4006" { + Analyzer = analyzer.Analyzer + break + } + } + util.MungeAnalyzer(Analyzer) +} diff --git a/build/bazelutil/staticcheckanalyzers/sa4008/BUILD.bazel b/build/bazelutil/staticcheckanalyzers/sa4008/BUILD.bazel new file mode 100644 index 000000000000..5d6b9f2a8dd0 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa4008/BUILD.bazel @@ -0,0 +1,13 @@ +load("@io_bazel_rules_go//go:def.bzl", "go_library") + +go_library( + name = "sa4008", + srcs = ["analyzer.go"], + importpath = "github.com/cockroachdb/cockroach/build/bazelutil/staticcheckanalyzers/sa4008", + visibility = ["//visibility:public"], + deps = [ + "//pkg/testutils/lint/passes/staticcheck", + "@co_honnef_go_tools//staticcheck", + "@org_golang_x_tools//go/analysis", + ], +) diff --git a/build/bazelutil/staticcheckanalyzers/sa4008/analyzer.go b/build/bazelutil/staticcheckanalyzers/sa4008/analyzer.go new file mode 100644 index 000000000000..e83512b92511 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa4008/analyzer.go @@ -0,0 +1,24 @@ +// Code generated by generate-staticcheck; DO NOT EDIT. + +//go:build bazel +// +build bazel + +package sa4008 + +import ( + util "github.com/cockroachdb/cockroach/pkg/testutils/lint/passes/staticcheck" + "golang.org/x/tools/go/analysis" + "honnef.co/go/tools/staticcheck" +) + +var Analyzer *analysis.Analyzer + +func init() { + for _, analyzer := range staticcheck.Analyzers { + if analyzer.Analyzer.Name == "SA4008" { + Analyzer = analyzer.Analyzer + break + } + } + util.MungeAnalyzer(Analyzer) +} diff --git a/build/bazelutil/staticcheckanalyzers/sa4009/BUILD.bazel b/build/bazelutil/staticcheckanalyzers/sa4009/BUILD.bazel new file mode 100644 index 000000000000..644a0b1bda72 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa4009/BUILD.bazel @@ -0,0 +1,13 @@ +load("@io_bazel_rules_go//go:def.bzl", "go_library") + +go_library( + name = "sa4009", + srcs = ["analyzer.go"], + importpath = "github.com/cockroachdb/cockroach/build/bazelutil/staticcheckanalyzers/sa4009", + visibility = ["//visibility:public"], + deps = [ + "//pkg/testutils/lint/passes/staticcheck", + "@co_honnef_go_tools//staticcheck", + "@org_golang_x_tools//go/analysis", + ], +) diff --git a/build/bazelutil/staticcheckanalyzers/sa4009/analyzer.go b/build/bazelutil/staticcheckanalyzers/sa4009/analyzer.go new file mode 100644 index 000000000000..2673353cd397 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa4009/analyzer.go @@ -0,0 +1,24 @@ +// Code generated by generate-staticcheck; DO NOT EDIT. + +//go:build bazel +// +build bazel + +package sa4009 + +import ( + util "github.com/cockroachdb/cockroach/pkg/testutils/lint/passes/staticcheck" + "golang.org/x/tools/go/analysis" + "honnef.co/go/tools/staticcheck" +) + +var Analyzer *analysis.Analyzer + +func init() { + for _, analyzer := range staticcheck.Analyzers { + if analyzer.Analyzer.Name == "SA4009" { + Analyzer = analyzer.Analyzer + break + } + } + util.MungeAnalyzer(Analyzer) +} diff --git a/build/bazelutil/staticcheckanalyzers/sa4010/BUILD.bazel b/build/bazelutil/staticcheckanalyzers/sa4010/BUILD.bazel new file mode 100644 index 000000000000..5fad734b6f17 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa4010/BUILD.bazel @@ -0,0 +1,13 @@ +load("@io_bazel_rules_go//go:def.bzl", "go_library") + +go_library( + name = "sa4010", + srcs = ["analyzer.go"], + importpath = "github.com/cockroachdb/cockroach/build/bazelutil/staticcheckanalyzers/sa4010", + visibility = ["//visibility:public"], + deps = [ + "//pkg/testutils/lint/passes/staticcheck", + "@co_honnef_go_tools//staticcheck", + "@org_golang_x_tools//go/analysis", + ], +) diff --git a/build/bazelutil/staticcheckanalyzers/sa4010/analyzer.go b/build/bazelutil/staticcheckanalyzers/sa4010/analyzer.go new file mode 100644 index 000000000000..0b86fe4c1b35 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa4010/analyzer.go @@ -0,0 +1,24 @@ +// Code generated by generate-staticcheck; DO NOT EDIT. + +//go:build bazel +// +build bazel + +package sa4010 + +import ( + util "github.com/cockroachdb/cockroach/pkg/testutils/lint/passes/staticcheck" + "golang.org/x/tools/go/analysis" + "honnef.co/go/tools/staticcheck" +) + +var Analyzer *analysis.Analyzer + +func init() { + for _, analyzer := range staticcheck.Analyzers { + if analyzer.Analyzer.Name == "SA4010" { + Analyzer = analyzer.Analyzer + break + } + } + util.MungeAnalyzer(Analyzer) +} diff --git a/build/bazelutil/staticcheckanalyzers/sa4011/BUILD.bazel b/build/bazelutil/staticcheckanalyzers/sa4011/BUILD.bazel new file mode 100644 index 000000000000..08ea9aae1d16 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa4011/BUILD.bazel @@ -0,0 +1,13 @@ +load("@io_bazel_rules_go//go:def.bzl", "go_library") + +go_library( + name = "sa4011", + srcs = ["analyzer.go"], + importpath = "github.com/cockroachdb/cockroach/build/bazelutil/staticcheckanalyzers/sa4011", + visibility = ["//visibility:public"], + deps = [ + "//pkg/testutils/lint/passes/staticcheck", + "@co_honnef_go_tools//staticcheck", + "@org_golang_x_tools//go/analysis", + ], +) diff --git a/build/bazelutil/staticcheckanalyzers/sa4011/analyzer.go b/build/bazelutil/staticcheckanalyzers/sa4011/analyzer.go new file mode 100644 index 000000000000..5680657b9868 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa4011/analyzer.go @@ -0,0 +1,24 @@ +// Code generated by generate-staticcheck; DO NOT EDIT. + +//go:build bazel +// +build bazel + +package sa4011 + +import ( + util "github.com/cockroachdb/cockroach/pkg/testutils/lint/passes/staticcheck" + "golang.org/x/tools/go/analysis" + "honnef.co/go/tools/staticcheck" +) + +var Analyzer *analysis.Analyzer + +func init() { + for _, analyzer := range staticcheck.Analyzers { + if analyzer.Analyzer.Name == "SA4011" { + Analyzer = analyzer.Analyzer + break + } + } + util.MungeAnalyzer(Analyzer) +} diff --git a/build/bazelutil/staticcheckanalyzers/sa4012/BUILD.bazel b/build/bazelutil/staticcheckanalyzers/sa4012/BUILD.bazel new file mode 100644 index 000000000000..2fa64101635f --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa4012/BUILD.bazel @@ -0,0 +1,13 @@ +load("@io_bazel_rules_go//go:def.bzl", "go_library") + +go_library( + name = "sa4012", + srcs = ["analyzer.go"], + importpath = "github.com/cockroachdb/cockroach/build/bazelutil/staticcheckanalyzers/sa4012", + visibility = ["//visibility:public"], + deps = [ + "//pkg/testutils/lint/passes/staticcheck", + "@co_honnef_go_tools//staticcheck", + "@org_golang_x_tools//go/analysis", + ], +) diff --git a/build/bazelutil/staticcheckanalyzers/sa4012/analyzer.go b/build/bazelutil/staticcheckanalyzers/sa4012/analyzer.go new file mode 100644 index 000000000000..d15203d63261 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa4012/analyzer.go @@ -0,0 +1,24 @@ +// Code generated by generate-staticcheck; DO NOT EDIT. + +//go:build bazel +// +build bazel + +package sa4012 + +import ( + util "github.com/cockroachdb/cockroach/pkg/testutils/lint/passes/staticcheck" + "golang.org/x/tools/go/analysis" + "honnef.co/go/tools/staticcheck" +) + +var Analyzer *analysis.Analyzer + +func init() { + for _, analyzer := range staticcheck.Analyzers { + if analyzer.Analyzer.Name == "SA4012" { + Analyzer = analyzer.Analyzer + break + } + } + util.MungeAnalyzer(Analyzer) +} diff --git a/build/bazelutil/staticcheckanalyzers/sa4013/BUILD.bazel b/build/bazelutil/staticcheckanalyzers/sa4013/BUILD.bazel new file mode 100644 index 000000000000..12cbe3119a38 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa4013/BUILD.bazel @@ -0,0 +1,13 @@ +load("@io_bazel_rules_go//go:def.bzl", "go_library") + +go_library( + name = "sa4013", + srcs = ["analyzer.go"], + importpath = "github.com/cockroachdb/cockroach/build/bazelutil/staticcheckanalyzers/sa4013", + visibility = ["//visibility:public"], + deps = [ + "//pkg/testutils/lint/passes/staticcheck", + "@co_honnef_go_tools//staticcheck", + "@org_golang_x_tools//go/analysis", + ], +) diff --git a/build/bazelutil/staticcheckanalyzers/sa4013/analyzer.go b/build/bazelutil/staticcheckanalyzers/sa4013/analyzer.go new file mode 100644 index 000000000000..814b5f01bc9a --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa4013/analyzer.go @@ -0,0 +1,24 @@ +// Code generated by generate-staticcheck; DO NOT EDIT. + +//go:build bazel +// +build bazel + +package sa4013 + +import ( + util "github.com/cockroachdb/cockroach/pkg/testutils/lint/passes/staticcheck" + "golang.org/x/tools/go/analysis" + "honnef.co/go/tools/staticcheck" +) + +var Analyzer *analysis.Analyzer + +func init() { + for _, analyzer := range staticcheck.Analyzers { + if analyzer.Analyzer.Name == "SA4013" { + Analyzer = analyzer.Analyzer + break + } + } + util.MungeAnalyzer(Analyzer) +} diff --git a/build/bazelutil/staticcheckanalyzers/sa4014/BUILD.bazel b/build/bazelutil/staticcheckanalyzers/sa4014/BUILD.bazel new file mode 100644 index 000000000000..dda44a6b23d1 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa4014/BUILD.bazel @@ -0,0 +1,13 @@ +load("@io_bazel_rules_go//go:def.bzl", "go_library") + +go_library( + name = "sa4014", + srcs = ["analyzer.go"], + importpath = "github.com/cockroachdb/cockroach/build/bazelutil/staticcheckanalyzers/sa4014", + visibility = ["//visibility:public"], + deps = [ + "//pkg/testutils/lint/passes/staticcheck", + "@co_honnef_go_tools//staticcheck", + "@org_golang_x_tools//go/analysis", + ], +) diff --git a/build/bazelutil/staticcheckanalyzers/sa4014/analyzer.go b/build/bazelutil/staticcheckanalyzers/sa4014/analyzer.go new file mode 100644 index 000000000000..9157ecb401d7 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa4014/analyzer.go @@ -0,0 +1,24 @@ +// Code generated by generate-staticcheck; DO NOT EDIT. + +//go:build bazel +// +build bazel + +package sa4014 + +import ( + util "github.com/cockroachdb/cockroach/pkg/testutils/lint/passes/staticcheck" + "golang.org/x/tools/go/analysis" + "honnef.co/go/tools/staticcheck" +) + +var Analyzer *analysis.Analyzer + +func init() { + for _, analyzer := range staticcheck.Analyzers { + if analyzer.Analyzer.Name == "SA4014" { + Analyzer = analyzer.Analyzer + break + } + } + util.MungeAnalyzer(Analyzer) +} diff --git a/build/bazelutil/staticcheckanalyzers/sa4015/BUILD.bazel b/build/bazelutil/staticcheckanalyzers/sa4015/BUILD.bazel new file mode 100644 index 000000000000..701a6d3f7ced --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa4015/BUILD.bazel @@ -0,0 +1,13 @@ +load("@io_bazel_rules_go//go:def.bzl", "go_library") + +go_library( + name = "sa4015", + srcs = ["analyzer.go"], + importpath = "github.com/cockroachdb/cockroach/build/bazelutil/staticcheckanalyzers/sa4015", + visibility = ["//visibility:public"], + deps = [ + "//pkg/testutils/lint/passes/staticcheck", + "@co_honnef_go_tools//staticcheck", + "@org_golang_x_tools//go/analysis", + ], +) diff --git a/build/bazelutil/staticcheckanalyzers/sa4015/analyzer.go b/build/bazelutil/staticcheckanalyzers/sa4015/analyzer.go new file mode 100644 index 000000000000..027b4ea93c3f --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa4015/analyzer.go @@ -0,0 +1,24 @@ +// Code generated by generate-staticcheck; DO NOT EDIT. + +//go:build bazel +// +build bazel + +package sa4015 + +import ( + util "github.com/cockroachdb/cockroach/pkg/testutils/lint/passes/staticcheck" + "golang.org/x/tools/go/analysis" + "honnef.co/go/tools/staticcheck" +) + +var Analyzer *analysis.Analyzer + +func init() { + for _, analyzer := range staticcheck.Analyzers { + if analyzer.Analyzer.Name == "SA4015" { + Analyzer = analyzer.Analyzer + break + } + } + util.MungeAnalyzer(Analyzer) +} diff --git a/build/bazelutil/staticcheckanalyzers/sa4016/BUILD.bazel b/build/bazelutil/staticcheckanalyzers/sa4016/BUILD.bazel new file mode 100644 index 000000000000..0eb95bba1f24 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa4016/BUILD.bazel @@ -0,0 +1,13 @@ +load("@io_bazel_rules_go//go:def.bzl", "go_library") + +go_library( + name = "sa4016", + srcs = ["analyzer.go"], + importpath = "github.com/cockroachdb/cockroach/build/bazelutil/staticcheckanalyzers/sa4016", + visibility = ["//visibility:public"], + deps = [ + "//pkg/testutils/lint/passes/staticcheck", + "@co_honnef_go_tools//staticcheck", + "@org_golang_x_tools//go/analysis", + ], +) diff --git a/build/bazelutil/staticcheckanalyzers/sa4016/analyzer.go b/build/bazelutil/staticcheckanalyzers/sa4016/analyzer.go new file mode 100644 index 000000000000..74837ff4e2ac --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa4016/analyzer.go @@ -0,0 +1,24 @@ +// Code generated by generate-staticcheck; DO NOT EDIT. + +//go:build bazel +// +build bazel + +package sa4016 + +import ( + util "github.com/cockroachdb/cockroach/pkg/testutils/lint/passes/staticcheck" + "golang.org/x/tools/go/analysis" + "honnef.co/go/tools/staticcheck" +) + +var Analyzer *analysis.Analyzer + +func init() { + for _, analyzer := range staticcheck.Analyzers { + if analyzer.Analyzer.Name == "SA4016" { + Analyzer = analyzer.Analyzer + break + } + } + util.MungeAnalyzer(Analyzer) +} diff --git a/build/bazelutil/staticcheckanalyzers/sa4017/BUILD.bazel b/build/bazelutil/staticcheckanalyzers/sa4017/BUILD.bazel new file mode 100644 index 000000000000..b5b6c1a7f6ce --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa4017/BUILD.bazel @@ -0,0 +1,13 @@ +load("@io_bazel_rules_go//go:def.bzl", "go_library") + +go_library( + name = "sa4017", + srcs = ["analyzer.go"], + importpath = "github.com/cockroachdb/cockroach/build/bazelutil/staticcheckanalyzers/sa4017", + visibility = ["//visibility:public"], + deps = [ + "//pkg/testutils/lint/passes/staticcheck", + "@co_honnef_go_tools//staticcheck", + "@org_golang_x_tools//go/analysis", + ], +) diff --git a/build/bazelutil/staticcheckanalyzers/sa4017/analyzer.go b/build/bazelutil/staticcheckanalyzers/sa4017/analyzer.go new file mode 100644 index 000000000000..d58c6d9de808 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa4017/analyzer.go @@ -0,0 +1,24 @@ +// Code generated by generate-staticcheck; DO NOT EDIT. + +//go:build bazel +// +build bazel + +package sa4017 + +import ( + util "github.com/cockroachdb/cockroach/pkg/testutils/lint/passes/staticcheck" + "golang.org/x/tools/go/analysis" + "honnef.co/go/tools/staticcheck" +) + +var Analyzer *analysis.Analyzer + +func init() { + for _, analyzer := range staticcheck.Analyzers { + if analyzer.Analyzer.Name == "SA4017" { + Analyzer = analyzer.Analyzer + break + } + } + util.MungeAnalyzer(Analyzer) +} diff --git a/build/bazelutil/staticcheckanalyzers/sa4018/BUILD.bazel b/build/bazelutil/staticcheckanalyzers/sa4018/BUILD.bazel new file mode 100644 index 000000000000..b01a9dfbc5cc --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa4018/BUILD.bazel @@ -0,0 +1,13 @@ +load("@io_bazel_rules_go//go:def.bzl", "go_library") + +go_library( + name = "sa4018", + srcs = ["analyzer.go"], + importpath = "github.com/cockroachdb/cockroach/build/bazelutil/staticcheckanalyzers/sa4018", + visibility = ["//visibility:public"], + deps = [ + "//pkg/testutils/lint/passes/staticcheck", + "@co_honnef_go_tools//staticcheck", + "@org_golang_x_tools//go/analysis", + ], +) diff --git a/build/bazelutil/staticcheckanalyzers/sa4018/analyzer.go b/build/bazelutil/staticcheckanalyzers/sa4018/analyzer.go new file mode 100644 index 000000000000..30d2d34669ed --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa4018/analyzer.go @@ -0,0 +1,24 @@ +// Code generated by generate-staticcheck; DO NOT EDIT. + +//go:build bazel +// +build bazel + +package sa4018 + +import ( + util "github.com/cockroachdb/cockroach/pkg/testutils/lint/passes/staticcheck" + "golang.org/x/tools/go/analysis" + "honnef.co/go/tools/staticcheck" +) + +var Analyzer *analysis.Analyzer + +func init() { + for _, analyzer := range staticcheck.Analyzers { + if analyzer.Analyzer.Name == "SA4018" { + Analyzer = analyzer.Analyzer + break + } + } + util.MungeAnalyzer(Analyzer) +} diff --git a/build/bazelutil/staticcheckanalyzers/sa4019/BUILD.bazel b/build/bazelutil/staticcheckanalyzers/sa4019/BUILD.bazel new file mode 100644 index 000000000000..6b9a3e775e61 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa4019/BUILD.bazel @@ -0,0 +1,13 @@ +load("@io_bazel_rules_go//go:def.bzl", "go_library") + +go_library( + name = "sa4019", + srcs = ["analyzer.go"], + importpath = "github.com/cockroachdb/cockroach/build/bazelutil/staticcheckanalyzers/sa4019", + visibility = ["//visibility:public"], + deps = [ + "//pkg/testutils/lint/passes/staticcheck", + "@co_honnef_go_tools//staticcheck", + "@org_golang_x_tools//go/analysis", + ], +) diff --git a/build/bazelutil/staticcheckanalyzers/sa4019/analyzer.go b/build/bazelutil/staticcheckanalyzers/sa4019/analyzer.go new file mode 100644 index 000000000000..adf338470cfe --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa4019/analyzer.go @@ -0,0 +1,24 @@ +// Code generated by generate-staticcheck; DO NOT EDIT. + +//go:build bazel +// +build bazel + +package sa4019 + +import ( + util "github.com/cockroachdb/cockroach/pkg/testutils/lint/passes/staticcheck" + "golang.org/x/tools/go/analysis" + "honnef.co/go/tools/staticcheck" +) + +var Analyzer *analysis.Analyzer + +func init() { + for _, analyzer := range staticcheck.Analyzers { + if analyzer.Analyzer.Name == "SA4019" { + Analyzer = analyzer.Analyzer + break + } + } + util.MungeAnalyzer(Analyzer) +} diff --git a/build/bazelutil/staticcheckanalyzers/sa4020/BUILD.bazel b/build/bazelutil/staticcheckanalyzers/sa4020/BUILD.bazel new file mode 100644 index 000000000000..08676aa28a83 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa4020/BUILD.bazel @@ -0,0 +1,13 @@ +load("@io_bazel_rules_go//go:def.bzl", "go_library") + +go_library( + name = "sa4020", + srcs = ["analyzer.go"], + importpath = "github.com/cockroachdb/cockroach/build/bazelutil/staticcheckanalyzers/sa4020", + visibility = ["//visibility:public"], + deps = [ + "//pkg/testutils/lint/passes/staticcheck", + "@co_honnef_go_tools//staticcheck", + "@org_golang_x_tools//go/analysis", + ], +) diff --git a/build/bazelutil/staticcheckanalyzers/sa4020/analyzer.go b/build/bazelutil/staticcheckanalyzers/sa4020/analyzer.go new file mode 100644 index 000000000000..71e03f18d51e --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa4020/analyzer.go @@ -0,0 +1,24 @@ +// Code generated by generate-staticcheck; DO NOT EDIT. + +//go:build bazel +// +build bazel + +package sa4020 + +import ( + util "github.com/cockroachdb/cockroach/pkg/testutils/lint/passes/staticcheck" + "golang.org/x/tools/go/analysis" + "honnef.co/go/tools/staticcheck" +) + +var Analyzer *analysis.Analyzer + +func init() { + for _, analyzer := range staticcheck.Analyzers { + if analyzer.Analyzer.Name == "SA4020" { + Analyzer = analyzer.Analyzer + break + } + } + util.MungeAnalyzer(Analyzer) +} diff --git a/build/bazelutil/staticcheckanalyzers/sa4021/BUILD.bazel b/build/bazelutil/staticcheckanalyzers/sa4021/BUILD.bazel new file mode 100644 index 000000000000..eadd8ad38081 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa4021/BUILD.bazel @@ -0,0 +1,13 @@ +load("@io_bazel_rules_go//go:def.bzl", "go_library") + +go_library( + name = "sa4021", + srcs = ["analyzer.go"], + importpath = "github.com/cockroachdb/cockroach/build/bazelutil/staticcheckanalyzers/sa4021", + visibility = ["//visibility:public"], + deps = [ + "//pkg/testutils/lint/passes/staticcheck", + "@co_honnef_go_tools//staticcheck", + "@org_golang_x_tools//go/analysis", + ], +) diff --git a/build/bazelutil/staticcheckanalyzers/sa4021/analyzer.go b/build/bazelutil/staticcheckanalyzers/sa4021/analyzer.go new file mode 100644 index 000000000000..cb243bedb81c --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa4021/analyzer.go @@ -0,0 +1,24 @@ +// Code generated by generate-staticcheck; DO NOT EDIT. + +//go:build bazel +// +build bazel + +package sa4021 + +import ( + util "github.com/cockroachdb/cockroach/pkg/testutils/lint/passes/staticcheck" + "golang.org/x/tools/go/analysis" + "honnef.co/go/tools/staticcheck" +) + +var Analyzer *analysis.Analyzer + +func init() { + for _, analyzer := range staticcheck.Analyzers { + if analyzer.Analyzer.Name == "SA4021" { + Analyzer = analyzer.Analyzer + break + } + } + util.MungeAnalyzer(Analyzer) +} diff --git a/build/bazelutil/staticcheckanalyzers/sa4022/BUILD.bazel b/build/bazelutil/staticcheckanalyzers/sa4022/BUILD.bazel new file mode 100644 index 000000000000..4191889382c4 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa4022/BUILD.bazel @@ -0,0 +1,13 @@ +load("@io_bazel_rules_go//go:def.bzl", "go_library") + +go_library( + name = "sa4022", + srcs = ["analyzer.go"], + importpath = "github.com/cockroachdb/cockroach/build/bazelutil/staticcheckanalyzers/sa4022", + visibility = ["//visibility:public"], + deps = [ + "//pkg/testutils/lint/passes/staticcheck", + "@co_honnef_go_tools//staticcheck", + "@org_golang_x_tools//go/analysis", + ], +) diff --git a/build/bazelutil/staticcheckanalyzers/sa4022/analyzer.go b/build/bazelutil/staticcheckanalyzers/sa4022/analyzer.go new file mode 100644 index 000000000000..8ceda68bfd7e --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa4022/analyzer.go @@ -0,0 +1,24 @@ +// Code generated by generate-staticcheck; DO NOT EDIT. + +//go:build bazel +// +build bazel + +package sa4022 + +import ( + util "github.com/cockroachdb/cockroach/pkg/testutils/lint/passes/staticcheck" + "golang.org/x/tools/go/analysis" + "honnef.co/go/tools/staticcheck" +) + +var Analyzer *analysis.Analyzer + +func init() { + for _, analyzer := range staticcheck.Analyzers { + if analyzer.Analyzer.Name == "SA4022" { + Analyzer = analyzer.Analyzer + break + } + } + util.MungeAnalyzer(Analyzer) +} diff --git a/build/bazelutil/staticcheckanalyzers/sa4023/BUILD.bazel b/build/bazelutil/staticcheckanalyzers/sa4023/BUILD.bazel new file mode 100644 index 000000000000..5147d9be863d --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa4023/BUILD.bazel @@ -0,0 +1,13 @@ +load("@io_bazel_rules_go//go:def.bzl", "go_library") + +go_library( + name = "sa4023", + srcs = ["analyzer.go"], + importpath = "github.com/cockroachdb/cockroach/build/bazelutil/staticcheckanalyzers/sa4023", + visibility = ["//visibility:public"], + deps = [ + "//pkg/testutils/lint/passes/staticcheck", + "@co_honnef_go_tools//staticcheck", + "@org_golang_x_tools//go/analysis", + ], +) diff --git a/build/bazelutil/staticcheckanalyzers/sa4023/analyzer.go b/build/bazelutil/staticcheckanalyzers/sa4023/analyzer.go new file mode 100644 index 000000000000..c0d08c712cf4 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa4023/analyzer.go @@ -0,0 +1,24 @@ +// Code generated by generate-staticcheck; DO NOT EDIT. + +//go:build bazel +// +build bazel + +package sa4023 + +import ( + util "github.com/cockroachdb/cockroach/pkg/testutils/lint/passes/staticcheck" + "golang.org/x/tools/go/analysis" + "honnef.co/go/tools/staticcheck" +) + +var Analyzer *analysis.Analyzer + +func init() { + for _, analyzer := range staticcheck.Analyzers { + if analyzer.Analyzer.Name == "SA4023" { + Analyzer = analyzer.Analyzer + break + } + } + util.MungeAnalyzer(Analyzer) +} diff --git a/build/bazelutil/staticcheckanalyzers/sa4024/BUILD.bazel b/build/bazelutil/staticcheckanalyzers/sa4024/BUILD.bazel new file mode 100644 index 000000000000..d2b9232848db --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa4024/BUILD.bazel @@ -0,0 +1,13 @@ +load("@io_bazel_rules_go//go:def.bzl", "go_library") + +go_library( + name = "sa4024", + srcs = ["analyzer.go"], + importpath = "github.com/cockroachdb/cockroach/build/bazelutil/staticcheckanalyzers/sa4024", + visibility = ["//visibility:public"], + deps = [ + "//pkg/testutils/lint/passes/staticcheck", + "@co_honnef_go_tools//staticcheck", + "@org_golang_x_tools//go/analysis", + ], +) diff --git a/build/bazelutil/staticcheckanalyzers/sa4024/analyzer.go b/build/bazelutil/staticcheckanalyzers/sa4024/analyzer.go new file mode 100644 index 000000000000..441c84857bb9 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa4024/analyzer.go @@ -0,0 +1,24 @@ +// Code generated by generate-staticcheck; DO NOT EDIT. + +//go:build bazel +// +build bazel + +package sa4024 + +import ( + util "github.com/cockroachdb/cockroach/pkg/testutils/lint/passes/staticcheck" + "golang.org/x/tools/go/analysis" + "honnef.co/go/tools/staticcheck" +) + +var Analyzer *analysis.Analyzer + +func init() { + for _, analyzer := range staticcheck.Analyzers { + if analyzer.Analyzer.Name == "SA4024" { + Analyzer = analyzer.Analyzer + break + } + } + util.MungeAnalyzer(Analyzer) +} diff --git a/build/bazelutil/staticcheckanalyzers/sa4025/BUILD.bazel b/build/bazelutil/staticcheckanalyzers/sa4025/BUILD.bazel new file mode 100644 index 000000000000..0313b03a0e1f --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa4025/BUILD.bazel @@ -0,0 +1,13 @@ +load("@io_bazel_rules_go//go:def.bzl", "go_library") + +go_library( + name = "sa4025", + srcs = ["analyzer.go"], + importpath = "github.com/cockroachdb/cockroach/build/bazelutil/staticcheckanalyzers/sa4025", + visibility = ["//visibility:public"], + deps = [ + "//pkg/testutils/lint/passes/staticcheck", + "@co_honnef_go_tools//staticcheck", + "@org_golang_x_tools//go/analysis", + ], +) diff --git a/build/bazelutil/staticcheckanalyzers/sa4025/analyzer.go b/build/bazelutil/staticcheckanalyzers/sa4025/analyzer.go new file mode 100644 index 000000000000..00cbe6e72a2c --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa4025/analyzer.go @@ -0,0 +1,24 @@ +// Code generated by generate-staticcheck; DO NOT EDIT. + +//go:build bazel +// +build bazel + +package sa4025 + +import ( + util "github.com/cockroachdb/cockroach/pkg/testutils/lint/passes/staticcheck" + "golang.org/x/tools/go/analysis" + "honnef.co/go/tools/staticcheck" +) + +var Analyzer *analysis.Analyzer + +func init() { + for _, analyzer := range staticcheck.Analyzers { + if analyzer.Analyzer.Name == "SA4025" { + Analyzer = analyzer.Analyzer + break + } + } + util.MungeAnalyzer(Analyzer) +} diff --git a/build/bazelutil/staticcheckanalyzers/sa4026/BUILD.bazel b/build/bazelutil/staticcheckanalyzers/sa4026/BUILD.bazel new file mode 100644 index 000000000000..5a1128723273 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa4026/BUILD.bazel @@ -0,0 +1,13 @@ +load("@io_bazel_rules_go//go:def.bzl", "go_library") + +go_library( + name = "sa4026", + srcs = ["analyzer.go"], + importpath = "github.com/cockroachdb/cockroach/build/bazelutil/staticcheckanalyzers/sa4026", + visibility = ["//visibility:public"], + deps = [ + "//pkg/testutils/lint/passes/staticcheck", + "@co_honnef_go_tools//staticcheck", + "@org_golang_x_tools//go/analysis", + ], +) diff --git a/build/bazelutil/staticcheckanalyzers/sa4026/analyzer.go b/build/bazelutil/staticcheckanalyzers/sa4026/analyzer.go new file mode 100644 index 000000000000..59532b1f7fcc --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa4026/analyzer.go @@ -0,0 +1,24 @@ +// Code generated by generate-staticcheck; DO NOT EDIT. + +//go:build bazel +// +build bazel + +package sa4026 + +import ( + util "github.com/cockroachdb/cockroach/pkg/testutils/lint/passes/staticcheck" + "golang.org/x/tools/go/analysis" + "honnef.co/go/tools/staticcheck" +) + +var Analyzer *analysis.Analyzer + +func init() { + for _, analyzer := range staticcheck.Analyzers { + if analyzer.Analyzer.Name == "SA4026" { + Analyzer = analyzer.Analyzer + break + } + } + util.MungeAnalyzer(Analyzer) +} diff --git a/build/bazelutil/staticcheckanalyzers/sa4027/BUILD.bazel b/build/bazelutil/staticcheckanalyzers/sa4027/BUILD.bazel new file mode 100644 index 000000000000..c75477192724 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa4027/BUILD.bazel @@ -0,0 +1,13 @@ +load("@io_bazel_rules_go//go:def.bzl", "go_library") + +go_library( + name = "sa4027", + srcs = ["analyzer.go"], + importpath = "github.com/cockroachdb/cockroach/build/bazelutil/staticcheckanalyzers/sa4027", + visibility = ["//visibility:public"], + deps = [ + "//pkg/testutils/lint/passes/staticcheck", + "@co_honnef_go_tools//staticcheck", + "@org_golang_x_tools//go/analysis", + ], +) diff --git a/build/bazelutil/staticcheckanalyzers/sa4027/analyzer.go b/build/bazelutil/staticcheckanalyzers/sa4027/analyzer.go new file mode 100644 index 000000000000..f7228c98dcbf --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa4027/analyzer.go @@ -0,0 +1,24 @@ +// Code generated by generate-staticcheck; DO NOT EDIT. + +//go:build bazel +// +build bazel + +package sa4027 + +import ( + util "github.com/cockroachdb/cockroach/pkg/testutils/lint/passes/staticcheck" + "golang.org/x/tools/go/analysis" + "honnef.co/go/tools/staticcheck" +) + +var Analyzer *analysis.Analyzer + +func init() { + for _, analyzer := range staticcheck.Analyzers { + if analyzer.Analyzer.Name == "SA4027" { + Analyzer = analyzer.Analyzer + break + } + } + util.MungeAnalyzer(Analyzer) +} diff --git a/build/bazelutil/staticcheckanalyzers/sa5000/BUILD.bazel b/build/bazelutil/staticcheckanalyzers/sa5000/BUILD.bazel new file mode 100644 index 000000000000..9bd11d66c03e --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa5000/BUILD.bazel @@ -0,0 +1,13 @@ +load("@io_bazel_rules_go//go:def.bzl", "go_library") + +go_library( + name = "sa5000", + srcs = ["analyzer.go"], + importpath = "github.com/cockroachdb/cockroach/build/bazelutil/staticcheckanalyzers/sa5000", + visibility = ["//visibility:public"], + deps = [ + "//pkg/testutils/lint/passes/staticcheck", + "@co_honnef_go_tools//staticcheck", + "@org_golang_x_tools//go/analysis", + ], +) diff --git a/build/bazelutil/staticcheckanalyzers/sa5000/analyzer.go b/build/bazelutil/staticcheckanalyzers/sa5000/analyzer.go new file mode 100644 index 000000000000..a4ab71fc5e6c --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa5000/analyzer.go @@ -0,0 +1,24 @@ +// Code generated by generate-staticcheck; DO NOT EDIT. + +//go:build bazel +// +build bazel + +package sa5000 + +import ( + util "github.com/cockroachdb/cockroach/pkg/testutils/lint/passes/staticcheck" + "golang.org/x/tools/go/analysis" + "honnef.co/go/tools/staticcheck" +) + +var Analyzer *analysis.Analyzer + +func init() { + for _, analyzer := range staticcheck.Analyzers { + if analyzer.Analyzer.Name == "SA5000" { + Analyzer = analyzer.Analyzer + break + } + } + util.MungeAnalyzer(Analyzer) +} diff --git a/build/bazelutil/staticcheckanalyzers/sa5001/BUILD.bazel b/build/bazelutil/staticcheckanalyzers/sa5001/BUILD.bazel new file mode 100644 index 000000000000..ce3e4b979fc8 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa5001/BUILD.bazel @@ -0,0 +1,13 @@ +load("@io_bazel_rules_go//go:def.bzl", "go_library") + +go_library( + name = "sa5001", + srcs = ["analyzer.go"], + importpath = "github.com/cockroachdb/cockroach/build/bazelutil/staticcheckanalyzers/sa5001", + visibility = ["//visibility:public"], + deps = [ + "//pkg/testutils/lint/passes/staticcheck", + "@co_honnef_go_tools//staticcheck", + "@org_golang_x_tools//go/analysis", + ], +) diff --git a/build/bazelutil/staticcheckanalyzers/sa5001/analyzer.go b/build/bazelutil/staticcheckanalyzers/sa5001/analyzer.go new file mode 100644 index 000000000000..aa63064b122b --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa5001/analyzer.go @@ -0,0 +1,24 @@ +// Code generated by generate-staticcheck; DO NOT EDIT. + +//go:build bazel +// +build bazel + +package sa5001 + +import ( + util "github.com/cockroachdb/cockroach/pkg/testutils/lint/passes/staticcheck" + "golang.org/x/tools/go/analysis" + "honnef.co/go/tools/staticcheck" +) + +var Analyzer *analysis.Analyzer + +func init() { + for _, analyzer := range staticcheck.Analyzers { + if analyzer.Analyzer.Name == "SA5001" { + Analyzer = analyzer.Analyzer + break + } + } + util.MungeAnalyzer(Analyzer) +} diff --git a/build/bazelutil/staticcheckanalyzers/sa5002/BUILD.bazel b/build/bazelutil/staticcheckanalyzers/sa5002/BUILD.bazel new file mode 100644 index 000000000000..b06e3a2878d9 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa5002/BUILD.bazel @@ -0,0 +1,13 @@ +load("@io_bazel_rules_go//go:def.bzl", "go_library") + +go_library( + name = "sa5002", + srcs = ["analyzer.go"], + importpath = "github.com/cockroachdb/cockroach/build/bazelutil/staticcheckanalyzers/sa5002", + visibility = ["//visibility:public"], + deps = [ + "//pkg/testutils/lint/passes/staticcheck", + "@co_honnef_go_tools//staticcheck", + "@org_golang_x_tools//go/analysis", + ], +) diff --git a/build/bazelutil/staticcheckanalyzers/sa5002/analyzer.go b/build/bazelutil/staticcheckanalyzers/sa5002/analyzer.go new file mode 100644 index 000000000000..7f0ff01454cf --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa5002/analyzer.go @@ -0,0 +1,24 @@ +// Code generated by generate-staticcheck; DO NOT EDIT. + +//go:build bazel +// +build bazel + +package sa5002 + +import ( + util "github.com/cockroachdb/cockroach/pkg/testutils/lint/passes/staticcheck" + "golang.org/x/tools/go/analysis" + "honnef.co/go/tools/staticcheck" +) + +var Analyzer *analysis.Analyzer + +func init() { + for _, analyzer := range staticcheck.Analyzers { + if analyzer.Analyzer.Name == "SA5002" { + Analyzer = analyzer.Analyzer + break + } + } + util.MungeAnalyzer(Analyzer) +} diff --git a/build/bazelutil/staticcheckanalyzers/sa5003/BUILD.bazel b/build/bazelutil/staticcheckanalyzers/sa5003/BUILD.bazel new file mode 100644 index 000000000000..7711fa64ce54 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa5003/BUILD.bazel @@ -0,0 +1,13 @@ +load("@io_bazel_rules_go//go:def.bzl", "go_library") + +go_library( + name = "sa5003", + srcs = ["analyzer.go"], + importpath = "github.com/cockroachdb/cockroach/build/bazelutil/staticcheckanalyzers/sa5003", + visibility = ["//visibility:public"], + deps = [ + "//pkg/testutils/lint/passes/staticcheck", + "@co_honnef_go_tools//staticcheck", + "@org_golang_x_tools//go/analysis", + ], +) diff --git a/build/bazelutil/staticcheckanalyzers/sa5003/analyzer.go b/build/bazelutil/staticcheckanalyzers/sa5003/analyzer.go new file mode 100644 index 000000000000..bed4a625cfcb --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa5003/analyzer.go @@ -0,0 +1,24 @@ +// Code generated by generate-staticcheck; DO NOT EDIT. + +//go:build bazel +// +build bazel + +package sa5003 + +import ( + util "github.com/cockroachdb/cockroach/pkg/testutils/lint/passes/staticcheck" + "golang.org/x/tools/go/analysis" + "honnef.co/go/tools/staticcheck" +) + +var Analyzer *analysis.Analyzer + +func init() { + for _, analyzer := range staticcheck.Analyzers { + if analyzer.Analyzer.Name == "SA5003" { + Analyzer = analyzer.Analyzer + break + } + } + util.MungeAnalyzer(Analyzer) +} diff --git a/build/bazelutil/staticcheckanalyzers/sa5004/BUILD.bazel b/build/bazelutil/staticcheckanalyzers/sa5004/BUILD.bazel new file mode 100644 index 000000000000..00035e5b6793 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa5004/BUILD.bazel @@ -0,0 +1,13 @@ +load("@io_bazel_rules_go//go:def.bzl", "go_library") + +go_library( + name = "sa5004", + srcs = ["analyzer.go"], + importpath = "github.com/cockroachdb/cockroach/build/bazelutil/staticcheckanalyzers/sa5004", + visibility = ["//visibility:public"], + deps = [ + "//pkg/testutils/lint/passes/staticcheck", + "@co_honnef_go_tools//staticcheck", + "@org_golang_x_tools//go/analysis", + ], +) diff --git a/build/bazelutil/staticcheckanalyzers/sa5004/analyzer.go b/build/bazelutil/staticcheckanalyzers/sa5004/analyzer.go new file mode 100644 index 000000000000..20b7b80074de --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa5004/analyzer.go @@ -0,0 +1,24 @@ +// Code generated by generate-staticcheck; DO NOT EDIT. + +//go:build bazel +// +build bazel + +package sa5004 + +import ( + util "github.com/cockroachdb/cockroach/pkg/testutils/lint/passes/staticcheck" + "golang.org/x/tools/go/analysis" + "honnef.co/go/tools/staticcheck" +) + +var Analyzer *analysis.Analyzer + +func init() { + for _, analyzer := range staticcheck.Analyzers { + if analyzer.Analyzer.Name == "SA5004" { + Analyzer = analyzer.Analyzer + break + } + } + util.MungeAnalyzer(Analyzer) +} diff --git a/build/bazelutil/staticcheckanalyzers/sa5005/BUILD.bazel b/build/bazelutil/staticcheckanalyzers/sa5005/BUILD.bazel new file mode 100644 index 000000000000..07b6f9f147cb --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa5005/BUILD.bazel @@ -0,0 +1,13 @@ +load("@io_bazel_rules_go//go:def.bzl", "go_library") + +go_library( + name = "sa5005", + srcs = ["analyzer.go"], + importpath = "github.com/cockroachdb/cockroach/build/bazelutil/staticcheckanalyzers/sa5005", + visibility = ["//visibility:public"], + deps = [ + "//pkg/testutils/lint/passes/staticcheck", + "@co_honnef_go_tools//staticcheck", + "@org_golang_x_tools//go/analysis", + ], +) diff --git a/build/bazelutil/staticcheckanalyzers/sa5005/analyzer.go b/build/bazelutil/staticcheckanalyzers/sa5005/analyzer.go new file mode 100644 index 000000000000..97ec6ac00393 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa5005/analyzer.go @@ -0,0 +1,24 @@ +// Code generated by generate-staticcheck; DO NOT EDIT. + +//go:build bazel +// +build bazel + +package sa5005 + +import ( + util "github.com/cockroachdb/cockroach/pkg/testutils/lint/passes/staticcheck" + "golang.org/x/tools/go/analysis" + "honnef.co/go/tools/staticcheck" +) + +var Analyzer *analysis.Analyzer + +func init() { + for _, analyzer := range staticcheck.Analyzers { + if analyzer.Analyzer.Name == "SA5005" { + Analyzer = analyzer.Analyzer + break + } + } + util.MungeAnalyzer(Analyzer) +} diff --git a/build/bazelutil/staticcheckanalyzers/sa5007/BUILD.bazel b/build/bazelutil/staticcheckanalyzers/sa5007/BUILD.bazel new file mode 100644 index 000000000000..4cd2ce90c7da --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa5007/BUILD.bazel @@ -0,0 +1,13 @@ +load("@io_bazel_rules_go//go:def.bzl", "go_library") + +go_library( + name = "sa5007", + srcs = ["analyzer.go"], + importpath = "github.com/cockroachdb/cockroach/build/bazelutil/staticcheckanalyzers/sa5007", + visibility = ["//visibility:public"], + deps = [ + "//pkg/testutils/lint/passes/staticcheck", + "@co_honnef_go_tools//staticcheck", + "@org_golang_x_tools//go/analysis", + ], +) diff --git a/build/bazelutil/staticcheckanalyzers/sa5007/analyzer.go b/build/bazelutil/staticcheckanalyzers/sa5007/analyzer.go new file mode 100644 index 000000000000..1d7adcd2508b --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa5007/analyzer.go @@ -0,0 +1,24 @@ +// Code generated by generate-staticcheck; DO NOT EDIT. + +//go:build bazel +// +build bazel + +package sa5007 + +import ( + util "github.com/cockroachdb/cockroach/pkg/testutils/lint/passes/staticcheck" + "golang.org/x/tools/go/analysis" + "honnef.co/go/tools/staticcheck" +) + +var Analyzer *analysis.Analyzer + +func init() { + for _, analyzer := range staticcheck.Analyzers { + if analyzer.Analyzer.Name == "SA5007" { + Analyzer = analyzer.Analyzer + break + } + } + util.MungeAnalyzer(Analyzer) +} diff --git a/build/bazelutil/staticcheckanalyzers/sa5008/BUILD.bazel b/build/bazelutil/staticcheckanalyzers/sa5008/BUILD.bazel new file mode 100644 index 000000000000..fb2f439951fd --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa5008/BUILD.bazel @@ -0,0 +1,13 @@ +load("@io_bazel_rules_go//go:def.bzl", "go_library") + +go_library( + name = "sa5008", + srcs = ["analyzer.go"], + importpath = "github.com/cockroachdb/cockroach/build/bazelutil/staticcheckanalyzers/sa5008", + visibility = ["//visibility:public"], + deps = [ + "//pkg/testutils/lint/passes/staticcheck", + "@co_honnef_go_tools//staticcheck", + "@org_golang_x_tools//go/analysis", + ], +) diff --git a/build/bazelutil/staticcheckanalyzers/sa5008/analyzer.go b/build/bazelutil/staticcheckanalyzers/sa5008/analyzer.go new file mode 100644 index 000000000000..f8e8af46cfda --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa5008/analyzer.go @@ -0,0 +1,24 @@ +// Code generated by generate-staticcheck; DO NOT EDIT. + +//go:build bazel +// +build bazel + +package sa5008 + +import ( + util "github.com/cockroachdb/cockroach/pkg/testutils/lint/passes/staticcheck" + "golang.org/x/tools/go/analysis" + "honnef.co/go/tools/staticcheck" +) + +var Analyzer *analysis.Analyzer + +func init() { + for _, analyzer := range staticcheck.Analyzers { + if analyzer.Analyzer.Name == "SA5008" { + Analyzer = analyzer.Analyzer + break + } + } + util.MungeAnalyzer(Analyzer) +} diff --git a/build/bazelutil/staticcheckanalyzers/sa5009/BUILD.bazel b/build/bazelutil/staticcheckanalyzers/sa5009/BUILD.bazel new file mode 100644 index 000000000000..34535fe68c34 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa5009/BUILD.bazel @@ -0,0 +1,13 @@ +load("@io_bazel_rules_go//go:def.bzl", "go_library") + +go_library( + name = "sa5009", + srcs = ["analyzer.go"], + importpath = "github.com/cockroachdb/cockroach/build/bazelutil/staticcheckanalyzers/sa5009", + visibility = ["//visibility:public"], + deps = [ + "//pkg/testutils/lint/passes/staticcheck", + "@co_honnef_go_tools//staticcheck", + "@org_golang_x_tools//go/analysis", + ], +) diff --git a/build/bazelutil/staticcheckanalyzers/sa5009/analyzer.go b/build/bazelutil/staticcheckanalyzers/sa5009/analyzer.go new file mode 100644 index 000000000000..3bc0b95c36fc --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa5009/analyzer.go @@ -0,0 +1,24 @@ +// Code generated by generate-staticcheck; DO NOT EDIT. + +//go:build bazel +// +build bazel + +package sa5009 + +import ( + util "github.com/cockroachdb/cockroach/pkg/testutils/lint/passes/staticcheck" + "golang.org/x/tools/go/analysis" + "honnef.co/go/tools/staticcheck" +) + +var Analyzer *analysis.Analyzer + +func init() { + for _, analyzer := range staticcheck.Analyzers { + if analyzer.Analyzer.Name == "SA5009" { + Analyzer = analyzer.Analyzer + break + } + } + util.MungeAnalyzer(Analyzer) +} diff --git a/build/bazelutil/staticcheckanalyzers/sa5010/BUILD.bazel b/build/bazelutil/staticcheckanalyzers/sa5010/BUILD.bazel new file mode 100644 index 000000000000..8f488c21e6f1 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa5010/BUILD.bazel @@ -0,0 +1,13 @@ +load("@io_bazel_rules_go//go:def.bzl", "go_library") + +go_library( + name = "sa5010", + srcs = ["analyzer.go"], + importpath = "github.com/cockroachdb/cockroach/build/bazelutil/staticcheckanalyzers/sa5010", + visibility = ["//visibility:public"], + deps = [ + "//pkg/testutils/lint/passes/staticcheck", + "@co_honnef_go_tools//staticcheck", + "@org_golang_x_tools//go/analysis", + ], +) diff --git a/build/bazelutil/staticcheckanalyzers/sa5010/analyzer.go b/build/bazelutil/staticcheckanalyzers/sa5010/analyzer.go new file mode 100644 index 000000000000..820333f15957 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa5010/analyzer.go @@ -0,0 +1,24 @@ +// Code generated by generate-staticcheck; DO NOT EDIT. + +//go:build bazel +// +build bazel + +package sa5010 + +import ( + util "github.com/cockroachdb/cockroach/pkg/testutils/lint/passes/staticcheck" + "golang.org/x/tools/go/analysis" + "honnef.co/go/tools/staticcheck" +) + +var Analyzer *analysis.Analyzer + +func init() { + for _, analyzer := range staticcheck.Analyzers { + if analyzer.Analyzer.Name == "SA5010" { + Analyzer = analyzer.Analyzer + break + } + } + util.MungeAnalyzer(Analyzer) +} diff --git a/build/bazelutil/staticcheckanalyzers/sa5011/BUILD.bazel b/build/bazelutil/staticcheckanalyzers/sa5011/BUILD.bazel new file mode 100644 index 000000000000..43d6d06916b4 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa5011/BUILD.bazel @@ -0,0 +1,13 @@ +load("@io_bazel_rules_go//go:def.bzl", "go_library") + +go_library( + name = "sa5011", + srcs = ["analyzer.go"], + importpath = "github.com/cockroachdb/cockroach/build/bazelutil/staticcheckanalyzers/sa5011", + visibility = ["//visibility:public"], + deps = [ + "//pkg/testutils/lint/passes/staticcheck", + "@co_honnef_go_tools//staticcheck", + "@org_golang_x_tools//go/analysis", + ], +) diff --git a/build/bazelutil/staticcheckanalyzers/sa5011/analyzer.go b/build/bazelutil/staticcheckanalyzers/sa5011/analyzer.go new file mode 100644 index 000000000000..ca780c70a364 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa5011/analyzer.go @@ -0,0 +1,24 @@ +// Code generated by generate-staticcheck; DO NOT EDIT. + +//go:build bazel +// +build bazel + +package sa5011 + +import ( + util "github.com/cockroachdb/cockroach/pkg/testutils/lint/passes/staticcheck" + "golang.org/x/tools/go/analysis" + "honnef.co/go/tools/staticcheck" +) + +var Analyzer *analysis.Analyzer + +func init() { + for _, analyzer := range staticcheck.Analyzers { + if analyzer.Analyzer.Name == "SA5011" { + Analyzer = analyzer.Analyzer + break + } + } + util.MungeAnalyzer(Analyzer) +} diff --git a/build/bazelutil/staticcheckanalyzers/sa5012/BUILD.bazel b/build/bazelutil/staticcheckanalyzers/sa5012/BUILD.bazel new file mode 100644 index 000000000000..a0a2176b64d8 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa5012/BUILD.bazel @@ -0,0 +1,13 @@ +load("@io_bazel_rules_go//go:def.bzl", "go_library") + +go_library( + name = "sa5012", + srcs = ["analyzer.go"], + importpath = "github.com/cockroachdb/cockroach/build/bazelutil/staticcheckanalyzers/sa5012", + visibility = ["//visibility:public"], + deps = [ + "//pkg/testutils/lint/passes/staticcheck", + "@co_honnef_go_tools//staticcheck", + "@org_golang_x_tools//go/analysis", + ], +) diff --git a/build/bazelutil/staticcheckanalyzers/sa5012/analyzer.go b/build/bazelutil/staticcheckanalyzers/sa5012/analyzer.go new file mode 100644 index 000000000000..c78d520c3696 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa5012/analyzer.go @@ -0,0 +1,24 @@ +// Code generated by generate-staticcheck; DO NOT EDIT. + +//go:build bazel +// +build bazel + +package sa5012 + +import ( + util "github.com/cockroachdb/cockroach/pkg/testutils/lint/passes/staticcheck" + "golang.org/x/tools/go/analysis" + "honnef.co/go/tools/staticcheck" +) + +var Analyzer *analysis.Analyzer + +func init() { + for _, analyzer := range staticcheck.Analyzers { + if analyzer.Analyzer.Name == "SA5012" { + Analyzer = analyzer.Analyzer + break + } + } + util.MungeAnalyzer(Analyzer) +} diff --git a/build/bazelutil/staticcheckanalyzers/sa6000/BUILD.bazel b/build/bazelutil/staticcheckanalyzers/sa6000/BUILD.bazel new file mode 100644 index 000000000000..6b3ecfd8a0b2 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa6000/BUILD.bazel @@ -0,0 +1,13 @@ +load("@io_bazel_rules_go//go:def.bzl", "go_library") + +go_library( + name = "sa6000", + srcs = ["analyzer.go"], + importpath = "github.com/cockroachdb/cockroach/build/bazelutil/staticcheckanalyzers/sa6000", + visibility = ["//visibility:public"], + deps = [ + "//pkg/testutils/lint/passes/staticcheck", + "@co_honnef_go_tools//staticcheck", + "@org_golang_x_tools//go/analysis", + ], +) diff --git a/build/bazelutil/staticcheckanalyzers/sa6000/analyzer.go b/build/bazelutil/staticcheckanalyzers/sa6000/analyzer.go new file mode 100644 index 000000000000..4a9ecf23a703 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa6000/analyzer.go @@ -0,0 +1,24 @@ +// Code generated by generate-staticcheck; DO NOT EDIT. + +//go:build bazel +// +build bazel + +package sa6000 + +import ( + util "github.com/cockroachdb/cockroach/pkg/testutils/lint/passes/staticcheck" + "golang.org/x/tools/go/analysis" + "honnef.co/go/tools/staticcheck" +) + +var Analyzer *analysis.Analyzer + +func init() { + for _, analyzer := range staticcheck.Analyzers { + if analyzer.Analyzer.Name == "SA6000" { + Analyzer = analyzer.Analyzer + break + } + } + util.MungeAnalyzer(Analyzer) +} diff --git a/build/bazelutil/staticcheckanalyzers/sa6001/BUILD.bazel b/build/bazelutil/staticcheckanalyzers/sa6001/BUILD.bazel new file mode 100644 index 000000000000..639176223763 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa6001/BUILD.bazel @@ -0,0 +1,13 @@ +load("@io_bazel_rules_go//go:def.bzl", "go_library") + +go_library( + name = "sa6001", + srcs = ["analyzer.go"], + importpath = "github.com/cockroachdb/cockroach/build/bazelutil/staticcheckanalyzers/sa6001", + visibility = ["//visibility:public"], + deps = [ + "//pkg/testutils/lint/passes/staticcheck", + "@co_honnef_go_tools//staticcheck", + "@org_golang_x_tools//go/analysis", + ], +) diff --git a/build/bazelutil/staticcheckanalyzers/sa6001/analyzer.go b/build/bazelutil/staticcheckanalyzers/sa6001/analyzer.go new file mode 100644 index 000000000000..d0cfc7798348 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa6001/analyzer.go @@ -0,0 +1,24 @@ +// Code generated by generate-staticcheck; DO NOT EDIT. + +//go:build bazel +// +build bazel + +package sa6001 + +import ( + util "github.com/cockroachdb/cockroach/pkg/testutils/lint/passes/staticcheck" + "golang.org/x/tools/go/analysis" + "honnef.co/go/tools/staticcheck" +) + +var Analyzer *analysis.Analyzer + +func init() { + for _, analyzer := range staticcheck.Analyzers { + if analyzer.Analyzer.Name == "SA6001" { + Analyzer = analyzer.Analyzer + break + } + } + util.MungeAnalyzer(Analyzer) +} diff --git a/build/bazelutil/staticcheckanalyzers/sa6002/BUILD.bazel b/build/bazelutil/staticcheckanalyzers/sa6002/BUILD.bazel new file mode 100644 index 000000000000..2eb9dc1b6dba --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa6002/BUILD.bazel @@ -0,0 +1,13 @@ +load("@io_bazel_rules_go//go:def.bzl", "go_library") + +go_library( + name = "sa6002", + srcs = ["analyzer.go"], + importpath = "github.com/cockroachdb/cockroach/build/bazelutil/staticcheckanalyzers/sa6002", + visibility = ["//visibility:public"], + deps = [ + "//pkg/testutils/lint/passes/staticcheck", + "@co_honnef_go_tools//staticcheck", + "@org_golang_x_tools//go/analysis", + ], +) diff --git a/build/bazelutil/staticcheckanalyzers/sa6002/analyzer.go b/build/bazelutil/staticcheckanalyzers/sa6002/analyzer.go new file mode 100644 index 000000000000..051a222c03f5 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa6002/analyzer.go @@ -0,0 +1,24 @@ +// Code generated by generate-staticcheck; DO NOT EDIT. + +//go:build bazel +// +build bazel + +package sa6002 + +import ( + util "github.com/cockroachdb/cockroach/pkg/testutils/lint/passes/staticcheck" + "golang.org/x/tools/go/analysis" + "honnef.co/go/tools/staticcheck" +) + +var Analyzer *analysis.Analyzer + +func init() { + for _, analyzer := range staticcheck.Analyzers { + if analyzer.Analyzer.Name == "SA6002" { + Analyzer = analyzer.Analyzer + break + } + } + util.MungeAnalyzer(Analyzer) +} diff --git a/build/bazelutil/staticcheckanalyzers/sa6003/BUILD.bazel b/build/bazelutil/staticcheckanalyzers/sa6003/BUILD.bazel new file mode 100644 index 000000000000..205909c37885 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa6003/BUILD.bazel @@ -0,0 +1,13 @@ +load("@io_bazel_rules_go//go:def.bzl", "go_library") + +go_library( + name = "sa6003", + srcs = ["analyzer.go"], + importpath = "github.com/cockroachdb/cockroach/build/bazelutil/staticcheckanalyzers/sa6003", + visibility = ["//visibility:public"], + deps = [ + "//pkg/testutils/lint/passes/staticcheck", + "@co_honnef_go_tools//staticcheck", + "@org_golang_x_tools//go/analysis", + ], +) diff --git a/build/bazelutil/staticcheckanalyzers/sa6003/analyzer.go b/build/bazelutil/staticcheckanalyzers/sa6003/analyzer.go new file mode 100644 index 000000000000..aec9a5c23582 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa6003/analyzer.go @@ -0,0 +1,24 @@ +// Code generated by generate-staticcheck; DO NOT EDIT. + +//go:build bazel +// +build bazel + +package sa6003 + +import ( + util "github.com/cockroachdb/cockroach/pkg/testutils/lint/passes/staticcheck" + "golang.org/x/tools/go/analysis" + "honnef.co/go/tools/staticcheck" +) + +var Analyzer *analysis.Analyzer + +func init() { + for _, analyzer := range staticcheck.Analyzers { + if analyzer.Analyzer.Name == "SA6003" { + Analyzer = analyzer.Analyzer + break + } + } + util.MungeAnalyzer(Analyzer) +} diff --git a/build/bazelutil/staticcheckanalyzers/sa6005/BUILD.bazel b/build/bazelutil/staticcheckanalyzers/sa6005/BUILD.bazel new file mode 100644 index 000000000000..f787eb3c5a14 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa6005/BUILD.bazel @@ -0,0 +1,13 @@ +load("@io_bazel_rules_go//go:def.bzl", "go_library") + +go_library( + name = "sa6005", + srcs = ["analyzer.go"], + importpath = "github.com/cockroachdb/cockroach/build/bazelutil/staticcheckanalyzers/sa6005", + visibility = ["//visibility:public"], + deps = [ + "//pkg/testutils/lint/passes/staticcheck", + "@co_honnef_go_tools//staticcheck", + "@org_golang_x_tools//go/analysis", + ], +) diff --git a/build/bazelutil/staticcheckanalyzers/sa6005/analyzer.go b/build/bazelutil/staticcheckanalyzers/sa6005/analyzer.go new file mode 100644 index 000000000000..a2d926d07c03 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa6005/analyzer.go @@ -0,0 +1,24 @@ +// Code generated by generate-staticcheck; DO NOT EDIT. + +//go:build bazel +// +build bazel + +package sa6005 + +import ( + util "github.com/cockroachdb/cockroach/pkg/testutils/lint/passes/staticcheck" + "golang.org/x/tools/go/analysis" + "honnef.co/go/tools/staticcheck" +) + +var Analyzer *analysis.Analyzer + +func init() { + for _, analyzer := range staticcheck.Analyzers { + if analyzer.Analyzer.Name == "SA6005" { + Analyzer = analyzer.Analyzer + break + } + } + util.MungeAnalyzer(Analyzer) +} diff --git a/build/bazelutil/staticcheckanalyzers/sa9001/BUILD.bazel b/build/bazelutil/staticcheckanalyzers/sa9001/BUILD.bazel new file mode 100644 index 000000000000..fe11aa9c904c --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa9001/BUILD.bazel @@ -0,0 +1,13 @@ +load("@io_bazel_rules_go//go:def.bzl", "go_library") + +go_library( + name = "sa9001", + srcs = ["analyzer.go"], + importpath = "github.com/cockroachdb/cockroach/build/bazelutil/staticcheckanalyzers/sa9001", + visibility = ["//visibility:public"], + deps = [ + "//pkg/testutils/lint/passes/staticcheck", + "@co_honnef_go_tools//staticcheck", + "@org_golang_x_tools//go/analysis", + ], +) diff --git a/build/bazelutil/staticcheckanalyzers/sa9001/analyzer.go b/build/bazelutil/staticcheckanalyzers/sa9001/analyzer.go new file mode 100644 index 000000000000..b37c41676a0a --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa9001/analyzer.go @@ -0,0 +1,24 @@ +// Code generated by generate-staticcheck; DO NOT EDIT. + +//go:build bazel +// +build bazel + +package sa9001 + +import ( + util "github.com/cockroachdb/cockroach/pkg/testutils/lint/passes/staticcheck" + "golang.org/x/tools/go/analysis" + "honnef.co/go/tools/staticcheck" +) + +var Analyzer *analysis.Analyzer + +func init() { + for _, analyzer := range staticcheck.Analyzers { + if analyzer.Analyzer.Name == "SA9001" { + Analyzer = analyzer.Analyzer + break + } + } + util.MungeAnalyzer(Analyzer) +} diff --git a/build/bazelutil/staticcheckanalyzers/sa9002/BUILD.bazel b/build/bazelutil/staticcheckanalyzers/sa9002/BUILD.bazel new file mode 100644 index 000000000000..a53e4656472f --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa9002/BUILD.bazel @@ -0,0 +1,13 @@ +load("@io_bazel_rules_go//go:def.bzl", "go_library") + +go_library( + name = "sa9002", + srcs = ["analyzer.go"], + importpath = "github.com/cockroachdb/cockroach/build/bazelutil/staticcheckanalyzers/sa9002", + visibility = ["//visibility:public"], + deps = [ + "//pkg/testutils/lint/passes/staticcheck", + "@co_honnef_go_tools//staticcheck", + "@org_golang_x_tools//go/analysis", + ], +) diff --git a/build/bazelutil/staticcheckanalyzers/sa9002/analyzer.go b/build/bazelutil/staticcheckanalyzers/sa9002/analyzer.go new file mode 100644 index 000000000000..e8e47a2459ca --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa9002/analyzer.go @@ -0,0 +1,24 @@ +// Code generated by generate-staticcheck; DO NOT EDIT. + +//go:build bazel +// +build bazel + +package sa9002 + +import ( + util "github.com/cockroachdb/cockroach/pkg/testutils/lint/passes/staticcheck" + "golang.org/x/tools/go/analysis" + "honnef.co/go/tools/staticcheck" +) + +var Analyzer *analysis.Analyzer + +func init() { + for _, analyzer := range staticcheck.Analyzers { + if analyzer.Analyzer.Name == "SA9002" { + Analyzer = analyzer.Analyzer + break + } + } + util.MungeAnalyzer(Analyzer) +} diff --git a/build/bazelutil/staticcheckanalyzers/sa9003/BUILD.bazel b/build/bazelutil/staticcheckanalyzers/sa9003/BUILD.bazel new file mode 100644 index 000000000000..115522d025e8 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa9003/BUILD.bazel @@ -0,0 +1,13 @@ +load("@io_bazel_rules_go//go:def.bzl", "go_library") + +go_library( + name = "sa9003", + srcs = ["analyzer.go"], + importpath = "github.com/cockroachdb/cockroach/build/bazelutil/staticcheckanalyzers/sa9003", + visibility = ["//visibility:public"], + deps = [ + "//pkg/testutils/lint/passes/staticcheck", + "@co_honnef_go_tools//staticcheck", + "@org_golang_x_tools//go/analysis", + ], +) diff --git a/build/bazelutil/staticcheckanalyzers/sa9003/analyzer.go b/build/bazelutil/staticcheckanalyzers/sa9003/analyzer.go new file mode 100644 index 000000000000..fefe90bcfe50 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa9003/analyzer.go @@ -0,0 +1,24 @@ +// Code generated by generate-staticcheck; DO NOT EDIT. + +//go:build bazel +// +build bazel + +package sa9003 + +import ( + util "github.com/cockroachdb/cockroach/pkg/testutils/lint/passes/staticcheck" + "golang.org/x/tools/go/analysis" + "honnef.co/go/tools/staticcheck" +) + +var Analyzer *analysis.Analyzer + +func init() { + for _, analyzer := range staticcheck.Analyzers { + if analyzer.Analyzer.Name == "SA9003" { + Analyzer = analyzer.Analyzer + break + } + } + util.MungeAnalyzer(Analyzer) +} diff --git a/build/bazelutil/staticcheckanalyzers/sa9004/BUILD.bazel b/build/bazelutil/staticcheckanalyzers/sa9004/BUILD.bazel new file mode 100644 index 000000000000..8f5f06130b64 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa9004/BUILD.bazel @@ -0,0 +1,13 @@ +load("@io_bazel_rules_go//go:def.bzl", "go_library") + +go_library( + name = "sa9004", + srcs = ["analyzer.go"], + importpath = "github.com/cockroachdb/cockroach/build/bazelutil/staticcheckanalyzers/sa9004", + visibility = ["//visibility:public"], + deps = [ + "//pkg/testutils/lint/passes/staticcheck", + "@co_honnef_go_tools//staticcheck", + "@org_golang_x_tools//go/analysis", + ], +) diff --git a/build/bazelutil/staticcheckanalyzers/sa9004/analyzer.go b/build/bazelutil/staticcheckanalyzers/sa9004/analyzer.go new file mode 100644 index 000000000000..cbc10f953f2d --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa9004/analyzer.go @@ -0,0 +1,24 @@ +// Code generated by generate-staticcheck; DO NOT EDIT. + +//go:build bazel +// +build bazel + +package sa9004 + +import ( + util "github.com/cockroachdb/cockroach/pkg/testutils/lint/passes/staticcheck" + "golang.org/x/tools/go/analysis" + "honnef.co/go/tools/staticcheck" +) + +var Analyzer *analysis.Analyzer + +func init() { + for _, analyzer := range staticcheck.Analyzers { + if analyzer.Analyzer.Name == "SA9004" { + Analyzer = analyzer.Analyzer + break + } + } + util.MungeAnalyzer(Analyzer) +} diff --git a/build/bazelutil/staticcheckanalyzers/sa9005/BUILD.bazel b/build/bazelutil/staticcheckanalyzers/sa9005/BUILD.bazel new file mode 100644 index 000000000000..769e66abca0c --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa9005/BUILD.bazel @@ -0,0 +1,13 @@ +load("@io_bazel_rules_go//go:def.bzl", "go_library") + +go_library( + name = "sa9005", + srcs = ["analyzer.go"], + importpath = "github.com/cockroachdb/cockroach/build/bazelutil/staticcheckanalyzers/sa9005", + visibility = ["//visibility:public"], + deps = [ + "//pkg/testutils/lint/passes/staticcheck", + "@co_honnef_go_tools//staticcheck", + "@org_golang_x_tools//go/analysis", + ], +) diff --git a/build/bazelutil/staticcheckanalyzers/sa9005/analyzer.go b/build/bazelutil/staticcheckanalyzers/sa9005/analyzer.go new file mode 100644 index 000000000000..ff4415e4e09a --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa9005/analyzer.go @@ -0,0 +1,24 @@ +// Code generated by generate-staticcheck; DO NOT EDIT. + +//go:build bazel +// +build bazel + +package sa9005 + +import ( + util "github.com/cockroachdb/cockroach/pkg/testutils/lint/passes/staticcheck" + "golang.org/x/tools/go/analysis" + "honnef.co/go/tools/staticcheck" +) + +var Analyzer *analysis.Analyzer + +func init() { + for _, analyzer := range staticcheck.Analyzers { + if analyzer.Analyzer.Name == "SA9005" { + Analyzer = analyzer.Analyzer + break + } + } + util.MungeAnalyzer(Analyzer) +} diff --git a/build/bazelutil/staticcheckanalyzers/sa9006/BUILD.bazel b/build/bazelutil/staticcheckanalyzers/sa9006/BUILD.bazel new file mode 100644 index 000000000000..46961b271f43 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa9006/BUILD.bazel @@ -0,0 +1,13 @@ +load("@io_bazel_rules_go//go:def.bzl", "go_library") + +go_library( + name = "sa9006", + srcs = ["analyzer.go"], + importpath = "github.com/cockroachdb/cockroach/build/bazelutil/staticcheckanalyzers/sa9006", + visibility = ["//visibility:public"], + deps = [ + "//pkg/testutils/lint/passes/staticcheck", + "@co_honnef_go_tools//staticcheck", + "@org_golang_x_tools//go/analysis", + ], +) diff --git a/build/bazelutil/staticcheckanalyzers/sa9006/analyzer.go b/build/bazelutil/staticcheckanalyzers/sa9006/analyzer.go new file mode 100644 index 000000000000..9fb3e7fc64a6 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa9006/analyzer.go @@ -0,0 +1,24 @@ +// Code generated by generate-staticcheck; DO NOT EDIT. + +//go:build bazel +// +build bazel + +package sa9006 + +import ( + util "github.com/cockroachdb/cockroach/pkg/testutils/lint/passes/staticcheck" + "golang.org/x/tools/go/analysis" + "honnef.co/go/tools/staticcheck" +) + +var Analyzer *analysis.Analyzer + +func init() { + for _, analyzer := range staticcheck.Analyzers { + if analyzer.Analyzer.Name == "SA9006" { + Analyzer = analyzer.Analyzer + break + } + } + util.MungeAnalyzer(Analyzer) +} diff --git a/pkg/cmd/dev/build.go b/pkg/cmd/dev/build.go index 1c8ceb94c247..74085b8bae07 100644 --- a/pkg/cmd/dev/build.go +++ b/pkg/cmd/dev/build.go @@ -84,6 +84,7 @@ var buildTargetMapping = map[string]string{ "roachprod-stress": "//pkg/cmd/roachprod-stress:roachprod-stress", "roachtest": "//pkg/cmd/roachtest:roachtest", "short": "//pkg/cmd/cockroach-short:cockroach-short", + "staticcheck": "@co_honnef_go_tools//cmd/staticcheck:staticcheck", "stress": stressTarget, "workload": "//pkg/cmd/workload:workload", } diff --git a/pkg/cmd/generate-staticcheck/BUILD.bazel b/pkg/cmd/generate-staticcheck/BUILD.bazel new file mode 100644 index 000000000000..785269b5ad27 --- /dev/null +++ b/pkg/cmd/generate-staticcheck/BUILD.bazel @@ -0,0 +1,19 @@ +load("@io_bazel_rules_go//go:def.bzl", "go_binary", "go_library") + +go_library( + name = "generate-staticcheck_lib", + srcs = ["main.go"], + importpath = "github.com/cockroachdb/cockroach/pkg/cmd/generate-staticcheck", + visibility = ["//visibility:private"], + deps = [ + "@co_honnef_go_tools//analysis/lint", + "@co_honnef_go_tools//simple", + "@co_honnef_go_tools//staticcheck", + ], +) + +go_binary( + name = "generate-staticcheck", + embed = [":generate-staticcheck_lib"], + visibility = ["//visibility:public"], +) diff --git a/pkg/cmd/generate-staticcheck/main.go b/pkg/cmd/generate-staticcheck/main.go new file mode 100644 index 000000000000..f8685fc34e05 --- /dev/null +++ b/pkg/cmd/generate-staticcheck/main.go @@ -0,0 +1,129 @@ +// Copyright 2021 The Cockroach Authors. +// +// Use of this software is governed by the Business Source License +// included in the file licenses/BSL.txt. +// +// As of the Change Date specified in that file, in accordance with +// the Business Source License, use of this software will be governed +// by the Apache License, Version 2.0, included in the file +// licenses/APL.txt. +package main + +import ( + "io/ioutil" + "os" + "path/filepath" + "sort" + "strings" + "text/template" + + "honnef.co/go/tools/analysis/lint" + "honnef.co/go/tools/simple" + "honnef.co/go/tools/staticcheck" +) + +const ( + readmeContent = `All of the code in this directory is generated by generate-staticcheck for use in Bazel. +` + buildBazelContent = `exports_files(["def.bzl"])` + analysisFileTemplate = `// Code generated by generate-staticcheck; DO NOT EDIT. + +//go:build bazel +// +build bazel + +package {{ .Package }} + +import ( + util "github.com/cockroachdb/cockroach/pkg/testutils/lint/passes/staticcheck" + "golang.org/x/tools/go/analysis" + "honnef.co/go/tools/{{ .CheckType }}" +) + +var Analyzer *analysis.Analyzer + +func init() { + for _, analyzer := range {{ .CheckType }}.Analyzers { + if analyzer.Analyzer.Name == "{{ .Check }}" { + Analyzer = analyzer.Analyzer + break + } + } + util.MungeAnalyzer(Analyzer) +} +` + defBzlFileTemplate = `# Code generated by generate-staticcheck; DO NOT EDIT. + +STATICCHECK_CHECKS = [ +{{range $i,$a := .AllAnalyzers}} "{{.}}", +{{end}}] +` +) + +func main() { + fileTpl := template.Must(template.New("source").Parse(analysisFileTemplate)) + rootDir := "build/bazelutil/staticcheckanalyzers" + err := os.RemoveAll(rootDir) + if err != nil { + panic(err) + } + err = os.MkdirAll(rootDir, 0755) + if err != nil { + panic(err) + } + err = ioutil.WriteFile(filepath.Join(rootDir, "README.md"), []byte(readmeContent), 0644) + if err != nil { + panic(err) + } + err = ioutil.WriteFile(filepath.Join(rootDir, "BUILD.bazel"), []byte(buildBazelContent), 0644) + if err != nil { + panic(err) + } + // All of these analyzers will be written to def.bzl. + var allAnalyzers []string + for _, check := range []struct { + Analyzers []*lint.Analyzer + CheckType string + }{ + // TODO: stylecheck? #73568 + // TODO: Consider adding quickfix checks. + {Analyzers: staticcheck.Analyzers, CheckType: "staticcheck"}, + {Analyzers: simple.Analyzers, CheckType: "simple"}, + } { + for _, v := range check.Analyzers { + analyzer := v.Analyzer + pkgname := strings.ToLower(analyzer.Name) + dirname := filepath.Join(rootDir, pkgname) + err := os.MkdirAll(dirname, 0755) + if err != nil { + panic(err) + } + outFile, err := os.Create(filepath.Join(dirname, "analyzer.go")) + if err != nil { + panic(err) + } + err = fileTpl.Execute(outFile, struct { + Package string + Check string + CheckType string + }{Package: pkgname, Check: analyzer.Name, CheckType: check.CheckType}) + if err != nil { + panic(err) + } + err = outFile.Close() + if err != nil { + panic(err) + } + allAnalyzers = append(allAnalyzers, "//"+dirname) + } + } + sort.Strings(allAnalyzers) + fileTpl = template.Must(template.New("defbzl").Parse(defBzlFileTemplate)) + defBzlFile, err := os.Create(filepath.Join(rootDir, "def.bzl")) + if err != nil { + panic(err) + } + err = fileTpl.Execute(defBzlFile, struct{ AllAnalyzers []string }{AllAnalyzers: allAnalyzers}) + if err != nil { + panic(err) + } +} diff --git a/pkg/testutils/lint/lint_test.go b/pkg/testutils/lint/lint_test.go index f20e46b77e1d..0d840b365f02 100644 --- a/pkg/testutils/lint/lint_test.go +++ b/pkg/testutils/lint/lint_test.go @@ -1674,7 +1674,9 @@ func TestLint(t *testing.T) { t.Run("TestStaticCheck", func(t *testing.T) { // staticcheck uses 2.4GB of ram (as of 2019-05-10), so don't parallelize it. skip.UnderShort(t) - skip.UnderBazelWithIssue(t, 68496, "A TON of build errors") + if bazel.BuiltWithBazel() { + skip.IgnoreLint(t, "the staticcheck tests are run during the bazel build") + } cmd, stderr, filter, err := dirCmd( crdb.Dir, diff --git a/pkg/testutils/lint/passes/staticcheck/BUILD.bazel b/pkg/testutils/lint/passes/staticcheck/BUILD.bazel new file mode 100644 index 000000000000..6b57842cb1c7 --- /dev/null +++ b/pkg/testutils/lint/passes/staticcheck/BUILD.bazel @@ -0,0 +1,14 @@ +load("@io_bazel_rules_go//go:def.bzl", "go_library") + +go_library( + name = "staticcheck", + srcs = ["staticcheck.go"], + importpath = "github.com/cockroachdb/cockroach/pkg/testutils/lint/passes/staticcheck", + visibility = ["//visibility:public"], + deps = [ + "@co_honnef_go_tools//analysis/facts", + "@co_honnef_go_tools//analysis/lint", + "@co_honnef_go_tools//analysis/report", + "@org_golang_x_tools//go/analysis", + ], +) diff --git a/pkg/testutils/lint/passes/staticcheck/staticcheck.go b/pkg/testutils/lint/passes/staticcheck/staticcheck.go new file mode 100644 index 000000000000..3cdc69412e72 --- /dev/null +++ b/pkg/testutils/lint/passes/staticcheck/staticcheck.go @@ -0,0 +1,73 @@ +// Copyright 2020 The Cockroach Authors. +// +// Use of this software is governed by the Business Source License +// included in the file licenses/BSL.txt. +// +// As of the Change Date specified in that file, in accordance with +// the Business Source License, use of this software will be governed +// by the Apache License, Version 2.0, included in the file +// licenses/APL.txt. + +// Package staticcheck provides utilities for consuming `staticcheck` checks in +// `nogo`. +package staticcheck + +import ( + "strings" + + "golang.org/x/tools/go/analysis" + "honnef.co/go/tools/analysis/facts" + "honnef.co/go/tools/analysis/lint" + "honnef.co/go/tools/analysis/report" +) + +// MungeAnalyzer updates an Analyzer from `staticcheck` to make it work w/ nogo. +// The staticcheck analyzers don't look at "lint:ignore" directives, so if you +// integrate them into `nogo` unchanged, you'll get spurious build failures for +// issues that are actually explicitly ignored. So for each staticcheck analyzer +// we add `facts.Directives` to the list of dependencies, then cross-check +// each reported diagnostic to make sure it's not ignored before allowing it +// through. +func MungeAnalyzer(analyzer *analysis.Analyzer) { + // Add facts.directives to the list of dependencies for this analyzer. + analyzer.Requires = analyzer.Requires[0:len(analyzer.Requires):len(analyzer.Requires)] + analyzer.Requires = append(analyzer.Requires, facts.Directives) + oldRun := analyzer.Run + analyzer.Run = func(p *analysis.Pass) (interface{}, error) { + pass := *p + oldReport := p.Report + pass.Report = func(diag analysis.Diagnostic) { + dirs := pass.ResultOf[facts.Directives].([]lint.Directive) + for _, dir := range dirs { + cmd := dir.Command + args := dir.Arguments + switch cmd { + case "ignore": + ignorePos := report.DisplayPosition(pass.Fset, dir.Node.Pos()) + nodePos := report.DisplayPosition(pass.Fset, diag.Pos) + if ignorePos.Filename != nodePos.Filename || ignorePos.Line != nodePos.Line { + continue + } + for _, check := range strings.Split(args[0], ",") { + if check == analyzer.Name { + // Skip reporting the diagnostic. + return + } + } + case "file-ignore": + ignorePos := report.DisplayPosition(pass.Fset, dir.Node.Pos()) + nodePos := report.DisplayPosition(pass.Fset, diag.Pos) + if ignorePos.Filename == nodePos.Filename { + // Skip reporting the diagnostic. + return + } + default: + // Unknown directive, ignore + continue + } + } + oldReport(diag) + } + return oldRun(&pass) + } +} diff --git a/pkg/util/log/stderr_redirect_windows.go b/pkg/util/log/stderr_redirect_windows.go index 9861d56addcf..526e555106e4 100644 --- a/pkg/util/log/stderr_redirect_windows.go +++ b/pkg/util/log/stderr_redirect_windows.go @@ -19,10 +19,7 @@ import ( // dupFD is used to initialize OrigStderr (see stderr_redirect.go). func dupFD(fd uintptr) (uintptr, error) { // Adapted from https://github.com/golang/go/blob/go1.8/src/syscall/exec_windows.go#L303. - p, err := windows.GetCurrentProcess() - if err != nil { - return 0, err - } + p := windows.CurrentProcess() var h windows.Handle return uintptr(h), windows.DuplicateHandle(p, windows.Handle(fd), p, &h, 0, true, windows.DUPLICATE_SAME_ACCESS) }