chore(deps): update dependency golangci-lint to v2.12.2#884
chore(deps): update dependency golangci-lint to v2.12.2#884red-hat-konflux[bot] wants to merge 1 commit into
Conversation
Codecov Report✅ All modified and coverable lines are covered by tests.
Additional details and impacted files@@ Coverage Diff @@
## main #884 +/- ##
===========================================
- Coverage 68.46% 30.42% -38.05%
===========================================
Files 26 26
Lines 2794 2794
===========================================
- Hits 1913 850 -1063
- Misses 704 1779 +1075
+ Partials 177 165 -12
Flags with carried forward coverage won't be shown. Click here to find out more. 🚀 New features to boost your workflow:
|
3e958b4 to
6d3f736
Compare
6d3f736 to
0dbc4f4
Compare
0dbc4f4 to
34a536d
Compare
AI Dependency Impact AnalysisPrevious analysisRisk Level: MEDIUMSummary of Dependency ChangesThis PR updates golangci-lint from v2.8.0 to v2.12.2, including several minor version increments. The updates introduce new linters ( Affected CodeSince golangci-lint is a static analysis tool, we don't directly import it into our Go code. Instead, it's used in our CI/CD pipeline to analyze our code for potential issues. The update could indirectly affect our code by introducing new linting rules or changing the behavior of existing rules, leading to new findings. Breaking Change AssessmentAs a minor version bump, significant breaking changes are not expected. However, the update to Security AssessmentNo security advisories or govulncheck data are present. Recommended ActionReview specific areas: Review the Risk Level: MEDIUMSummary of Dependency ChangesThis PR updates golangci-lint from v2.8.0 to v2.12.2. The updates include new linters, new features and changes to existing linters, and bug fixes. Notably, the Affected CodeOur codebase does not directly import Breaking Change AssessmentWhile this is a minor version bump, the included changes to linters such as Security AssessmentNo security advisories or govulncheck results were provided. Recommended ActionReview specific areas: Review the golangci-lint configuration ( |
There was a problem hiding this comment.
Risk Level: MEDIUM
Summary of Dependency Changes
This PR updates golangci-lint from v2.8.0 to v2.12.2, including several minor version increments. The updates introduce new linters (clickhouselint) and new features or changes to existing linters like dupl, funcorder, goconst, gomodguard_v2, gosec, govet, makezero, paralleltest, sloglint, and wsl_v5. The updates also include several bug fixes for various linters.
Affected Code
Since golangci-lint is a static analysis tool, we don't directly import it into our Go code. Instead, it's used in our CI/CD pipeline to analyze our code for potential issues. The update could indirectly affect our code by introducing new linting rules or changing the behavior of existing rules, leading to new findings.
Breaking Change Assessment
As a minor version bump, significant breaking changes are not expected. However, the update to gomodguard_v2 from 1.4.1 to 2.1.0 is mentioned as a major version update with new configuration. The update to revive from 1.14.0 to 1.15.0 also notes a breaking change regarding package-naming. These changes in linters configurations could affect the outcome of the linting process, potentially flagging code that was previously considered valid.
Security Assessment
No security advisories or govulncheck data are present.
Recommended Action
Review specific areas: Review the .golangci.yml configuration file for gomodguard_v2 and revive to check for any needed configuration changes. Also, run golangci-lint locally to verify that no new linting errors are introduced by the update and that existing ones are still correctly identified.
Signed-off-by: red-hat-konflux <126015336+red-hat-konflux[bot]@users.noreply.github.com>
34a536d to
4f2bea4
Compare
There was a problem hiding this comment.
Risk Level: MEDIUM
Summary of Dependency Changes
This PR updates golangci-lint from v2.8.0 to v2.12.2. The updates include new linters, new features and changes to existing linters, and bug fixes. Notably, the gomodguard_v2 linter has a major version bump, and several linters have new options and checks that could lead to new findings.
Affected Code
Our codebase does not directly import golangci-lint as a library. It is used as a CLI tool in our CI/CD pipeline to enforce code quality standards. The configuration file (.golangci.yml) determines which linters are enabled and their settings.
Breaking Change Assessment
While this is a minor version bump, the included changes to linters such as gomodguard_v2 and revive could introduce new findings based on our existing configuration, which would effectively be a breaking change to our existing workflow. In addition, the large jump in minor versions means there is a higher likelihood of subtle changes to linter behavior that might require adjustments to our code or configuration.
Security Assessment
No security advisories or govulncheck results were provided.
Recommended Action
Review specific areas: Review the golangci-lint configuration (.golangci.yml) and CI output to check for new linter findings. Pay specific attention to issues reported by the updated linters (gomodguard_v2, revive, gosec, and wsl_v5).
CI Feedback 🧐A test triggered by this PR failed. Here is an AI-generated analysis of the failure:
|
|
Requires Go 1.25: go: github.com/golangci/golangci-lint/v2/cmd/golangci-lint@v2.12.2: github.com/golangci/golangci-lint/v2@v2.12.2 requires go >= 1.25.0 (running go 1.24.6; GOTOOLCHAIN=local) |
Renovate Ignore NotificationBecause you closed this PR without merging, Renovate will ignore this update ( If you accidentally closed this PR, or if you changed your mind: rename this PR to get a fresh replacement PR. |
This PR contains the following updates:
v2.8.0→v2.12.2Warning
Some dependencies could not be looked up. Check the warning logs for more information.
Release Notes
golangci/golangci-lint (golangci-lint)
v2.12.2Compare Source
Released on 2026-05-06
gomodguard_v2: fix blocked configurationgomodguard_v2: from 2.1.0 to 2.1.3iface: from 1.4.1 to 1.4.2v2.12.1Compare Source
Released on 2026-05-01
gomodguard_v2: fix panic with migration suggestioninstall.shscript (if you are still using an URL based on the branchmaster, please update to usehttps://golangci-lint.run/install.sh)v2.12.0Compare Source
Released on 2026-05-01
clickhouselintlinter https://github.com/ClickHouse/clickhouse-go-linterdupl: fromf665c8dtoc99c5cf(extended detection)funcorder: from 0.5.0 to 0.6.0 (new option:function)goconst: add an option to ignore strings from testsgoconst: from 1.8.2 to 1.10.0 (extended detection)gomodguard_v2: from 1.4.1 to 2.1.0 (major version with new configuration)gosec: from619ce21to 2.26.1 (new checks:G124,G708,G709,G710)govet: addinlineanalyzermakezero: from 2.1.0 to 2.2.1 (support slice type aliases)paralleltest: exposecheckcleanupoptionsloglint: from 0.11.1 to 0.12.0 (new options:allowed-keys,custom-funcs)wsl_v5: from 5.6.0 to 5.8.0 (new option:cuddle-max-statements; new checks:after-decl,after-defer,after-expr,after-go,cuddle-group)forbidigo: from 2.3.0 to 2.3.1godot: from 1.5.4 to 1.5.6govet-modernize: from 0.43.0 to 0.44.0ireturn: from 0.4.0 to 0.4.1rowserrcheck: from 1.1.1 toc5f79b8customcommandv2.11.4Compare Source
Released on 2026-03-22
govet-modernize: from 0.42.0 to 0.43.0noctx: from 0.5.0 to 0.5.1sqlclosecheck: from 0.5.1 to 0.6.0v2.11.3Compare Source
Released on 2026-03-10
gosec: from v2.24.7 to619ce21v2.11.2Compare Source
Released on 2026-03-07
fmt: fix error when using thefmtcommand with explicit paths.v2.11.1Compare Source
Released on 2026-03-06
Due to an error related to AUR, some artifacts of the v2.11.0 release have not been published.
This release contains the same things as v2.11.0.
v2.11.0Compare Source
Released on 2026-03-06
errcheck: from 1.9.0 to 1.10.0 (excludecrypto/rand.Readby default)gosec: from 2.23.0 to 2.24.6 (new rules:G113,G118,G119,G120,G121,G122,G123,G408,G707)noctx: from 0.4.0 to 0.5.0 (new detection:httptest.NewRequestWithContext)prealloc: from 1.0.2 to 1.1.0revive: from 1.14.0 to 1.15.0 (var-namingto a new rulepackage-naming)gocognit: from 1.2.0 to 1.2.1gosec: from 2.24.6 to 2.24.7unqueryvet: from 1.5.3 to 1.5.4v2.10.1Compare Source
Released on 2026-02-17
v2.10.0Compare Source
Released on 2026-02-17
ginkgolinter: from 0.22.0 to 0.23.0gosec: from 2.22.11 to 2.23.0 (new rules:G117,G602,G701,G702,G703,G704,G705,G706)staticcheck: from 0.6.1 to 0.7.0godoclint: from 0.11.1 to 0.11.2v2.9.0Compare Source
Released on 2026-02-10
arangolint: from 0.3.1 to 0.4.0 (new rule: detect potential query injections)ginkgolinter: from 0.21.2 to 0.22.0 (support for wrappers)golines: from 0.14.0 to 0.15.0misspell: from 0.7.0 to 0.8.0revive: from v1.13.0 to v1.14.0 (new rules:epoch-naming,use-slices-sort)unqueryvet: from 1.4.0 to 1.5.3 (new options:check-n1,check-sql-injection,check-tx-leaks,allow,custom-rules)wsl_v5: from 5.3.0 to 5.6.0 (new rule:after-block)modernize: from 0.41.0 to 0.42.0prealloc: from 1.0.1 to 1.0.2protogetter: from 0.3.18 to 0.3.20Configuration
📅 Schedule: Branch creation - At any time (no schedule defined), Automerge - At any time (no schedule defined).
🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.
♻ Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.
🔕 Ignore: Close this PR and you won't be reminded about this update again.
To execute skipped test pipelines write comment
/ok-to-test.Documentation
Find out how to configure dependency updates in MintMaker documentation or see all available configuration options in Renovate documentation.