diff --git a/.github/CODEOWNERS b/.github/CODEOWNERS index b7ce34297a1f..858c897310b3 100644 --- a/.github/CODEOWNERS +++ b/.github/CODEOWNERS @@ -161,6 +161,7 @@ /pkg/cmd/generate-metadata-tables/ @cockroachdb/sql-experience /pkg/cmd/generate-spatial-ref-sys/ @cockroachdb/geospatial /pkg/cmd/generate-test-suites/ @cockroachdb/dev-inf +/pkg/cmd/generate-staticcheck/ @cockroachdb/dev-inf /pkg/cmd/geoviz/ @cockroachdb/geospatial /pkg/cmd/github-post/ @cockroachdb/test-eng /pkg/cmd/github-pull-request-make/ @cockroachdb/dev-inf diff --git a/BUILD.bazel b/BUILD.bazel index d2d4b590ed6c..ee78f6cb6a08 100644 --- a/BUILD.bazel +++ b/BUILD.bazel @@ -7,6 +7,7 @@ exports_files([ load("@bazel_gazelle//:def.bzl", "gazelle") load("@io_bazel_rules_go//go:def.bzl", "nogo") +load("//build/bazelutil/staticcheckanalyzers:def.bzl", "STATICCHECK_CHECKS") # The following directives inform gazelle how to auto-generate BUILD.bazel # files throughout the repo. By including them here, we can run gazelle using @@ -250,6 +251,6 @@ nogo( "//pkg/testutils/lint/passes/returnerrcheck", "//pkg/testutils/lint/passes/timer", "//pkg/testutils/lint/passes/unconvert", - ], + ] + STATICCHECK_CHECKS, }), ) diff --git a/build/bazelutil/bazel-generate.sh b/build/bazelutil/bazel-generate.sh index 08adeb3d6236..43b61002b4d8 100755 --- a/build/bazelutil/bazel-generate.sh +++ b/build/bazelutil/bazel-generate.sh @@ -9,6 +9,7 @@ set -euo pipefail CONTENTS=$(bazel run //pkg/cmd/mirror) echo "$CONTENTS" > DEPS.bzl +bazel run pkg/cmd/generate-staticcheck --run_under="cd $PWD && " bazel run //:gazelle CONTENTS=$(bazel run //pkg/cmd/generate-test-suites --run_under="cd $PWD && ") echo "$CONTENTS" > pkg/BUILD.bazel diff --git a/build/bazelutil/nogo_config.json b/build/bazelutil/nogo_config.json index d9391744eaca..ac2655b1c036 100644 --- a/build/bazelutil/nogo_config.json +++ b/build/bazelutil/nogo_config.json @@ -26,7 +26,7 @@ } }, "errcheck": { - "exclude_files": { + "exclude_files": { "github.com/cockroachdb/cockroach/.*\\.eg\\.go$": "generated code", ".*\\.pb\\.go$": "generated code", ".*\\.pb\\.gw\\.go$": "generated code", @@ -104,6 +104,1534 @@ "github.com/cockroachdb/cockroach/.*$": "first-party code" } }, + "S1000": { + "exclude_files": { + "github.com/cockroachdb/cockroach/.*\\.eg\\.go$": "generated code", + ".*\\.pb\\.go$": "generated code", + ".*\\.pb\\.gw\\.go$": "generated code", + "github.com/cockroachdb/cockroach/.*_generated\\.go$": "generated code" + }, + "only_files": { + "github.com/cockroachdb/cockroach/.*$": "first-party code" + } + }, + "S1001": { + "exclude_files": { + "github.com/cockroachdb/cockroach/.*\\.eg\\.go$": "generated code", + ".*\\.pb\\.go$": "generated code", + ".*\\.pb\\.gw\\.go$": "generated code", + "github.com/cockroachdb/cockroach/.*_generated\\.go$": "generated code" + }, + "only_files": { + "github.com/cockroachdb/cockroach/.*$": "first-party code" + } + }, + "S1002": { + "exclude_files": { + "github.com/cockroachdb/cockroach/.*\\.eg\\.go$": "generated code", + ".*\\.pb\\.go$": "generated code", + ".*\\.pb\\.gw\\.go$": "generated code", + "github.com/cockroachdb/cockroach/.*_generated\\.go$": "generated code" + }, + "only_files": { + "github.com/cockroachdb/cockroach/.*$": "first-party code" + } + }, + "S1003": { + "exclude_files": { + "github.com/cockroachdb/cockroach/.*\\.eg\\.go$": "generated code", + ".*\\.pb\\.go$": "generated code", + ".*\\.pb\\.gw\\.go$": "generated code", + "github.com/cockroachdb/cockroach/.*_generated\\.go$": "generated code" + }, + "only_files": { + "github.com/cockroachdb/cockroach/.*$": "first-party code" + } + }, + "S1004": { + "exclude_files": { + "github.com/cockroachdb/cockroach/.*\\.eg\\.go$": "generated code", + ".*\\.pb\\.go$": "generated code", + ".*\\.pb\\.gw\\.go$": "generated code", + "github.com/cockroachdb/cockroach/.*_generated\\.go$": "generated code" + }, + "only_files": { + "github.com/cockroachdb/cockroach/.*$": "first-party code" + } + }, + "S1005": { + "exclude_files": { + "github.com/cockroachdb/cockroach/.*\\.eg\\.go$": "generated code", + ".*\\.pb\\.go$": "generated code", + ".*\\.pb\\.gw\\.go$": "generated code", + "github.com/cockroachdb/cockroach/.*_generated\\.go$": "generated code" + }, + "only_files": { + "github.com/cockroachdb/cockroach/.*$": "first-party code" + } + }, + "S1006": { + "exclude_files": { + "github.com/cockroachdb/cockroach/.*\\.eg\\.go$": "generated code", + ".*\\.pb\\.go$": "generated code", + ".*\\.pb\\.gw\\.go$": "generated code", + "github.com/cockroachdb/cockroach/.*_generated\\.go$": "generated code" + }, + "only_files": { + "github.com/cockroachdb/cockroach/.*$": "first-party code" + } + }, + "S1007": { + "exclude_files": { + "github.com/cockroachdb/cockroach/.*\\.eg\\.go$": "generated code", + ".*\\.pb\\.go$": "generated code", + ".*\\.pb\\.gw\\.go$": "generated code", + "github.com/cockroachdb/cockroach/.*_generated\\.go$": "generated code" + }, + "only_files": { + "github.com/cockroachdb/cockroach/.*$": "first-party code" + } + }, + "S1008": { + "exclude_files": { + "github.com/cockroachdb/cockroach/.*\\.eg\\.go$": "generated code", + ".*\\.pb\\.go$": "generated code", + ".*\\.pb\\.gw\\.go$": "generated code", + "github.com/cockroachdb/cockroach/.*_generated\\.go$": "generated code" + }, + "only_files": { + "github.com/cockroachdb/cockroach/.*$": "first-party code" + } + }, + "S1009": { + "exclude_files": { + "github.com/cockroachdb/cockroach/.*\\.eg\\.go$": "generated code", + ".*\\.pb\\.go$": "generated code", + ".*\\.pb\\.gw\\.go$": "generated code", + "github.com/cockroachdb/cockroach/.*_generated\\.go$": "generated code" + }, + "only_files": { + "github.com/cockroachdb/cockroach/.*$": "first-party code" + } + }, + "S1010": { + "exclude_files": { + "github.com/cockroachdb/cockroach/.*\\.eg\\.go$": "generated code", + ".*\\.pb\\.go$": "generated code", + ".*\\.pb\\.gw\\.go$": "generated code", + "github.com/cockroachdb/cockroach/.*_generated\\.go$": "generated code" + }, + "only_files": { + "github.com/cockroachdb/cockroach/.*$": "first-party code" + } + }, + "S1011": { + "exclude_files": { + "github.com/cockroachdb/cockroach/.*\\.eg\\.go$": "generated code", + ".*\\.pb\\.go$": "generated code", + ".*\\.pb\\.gw\\.go$": "generated code", + "github.com/cockroachdb/cockroach/.*_generated\\.go$": "generated code" + }, + "only_files": { + "github.com/cockroachdb/cockroach/.*$": "first-party code" + } + }, + "S1012": { + "exclude_files": { + "github.com/cockroachdb/cockroach/.*\\.eg\\.go$": "generated code", + ".*\\.pb\\.go$": "generated code", + ".*\\.pb\\.gw\\.go$": "generated code", + "github.com/cockroachdb/cockroach/.*_generated\\.go$": "generated code" + }, + "only_files": { + "github.com/cockroachdb/cockroach/.*$": "first-party code" + } + }, + "S1016": { + "exclude_files": { + "github.com/cockroachdb/cockroach/.*\\.eg\\.go$": "generated code", + ".*\\.pb\\.go$": "generated code", + ".*\\.pb\\.gw\\.go$": "generated code", + "github.com/cockroachdb/cockroach/.*_generated\\.go$": "generated code" + }, + "only_files": { + "github.com/cockroachdb/cockroach/.*$": "first-party code" + } + }, + "S1017": { + "exclude_files": { + "github.com/cockroachdb/cockroach/.*\\.eg\\.go$": "generated code", + ".*\\.pb\\.go$": "generated code", + ".*\\.pb\\.gw\\.go$": "generated code", + "github.com/cockroachdb/cockroach/.*_generated\\.go$": "generated code" + }, + "only_files": { + "github.com/cockroachdb/cockroach/.*$": "first-party code" + } + }, + "S1018": { + "exclude_files": { + "github.com/cockroachdb/cockroach/.*\\.eg\\.go$": "generated code", + ".*\\.pb\\.go$": "generated code", + ".*\\.pb\\.gw\\.go$": "generated code", + "github.com/cockroachdb/cockroach/.*_generated\\.go$": "generated code" + }, + "only_files": { + "github.com/cockroachdb/cockroach/.*$": "first-party code" + } + }, + "S1019": { + "exclude_files": { + "github.com/cockroachdb/cockroach/.*\\.eg\\.go$": "generated code", + ".*\\.pb\\.go$": "generated code", + ".*\\.pb\\.gw\\.go$": "generated code", + "github.com/cockroachdb/cockroach/.*_generated\\.go$": "generated code" + }, + "only_files": { + "github.com/cockroachdb/cockroach/.*$": "first-party code" + } + }, + "S1020": { + "exclude_files": { + "github.com/cockroachdb/cockroach/.*\\.eg\\.go$": "generated code", + ".*\\.pb\\.go$": "generated code", + ".*\\.pb\\.gw\\.go$": "generated code", + "github.com/cockroachdb/cockroach/.*_generated\\.go$": "generated code" + }, + "only_files": { + "github.com/cockroachdb/cockroach/.*$": "first-party code" + } + }, + "S1021": { + "exclude_files": { + "github.com/cockroachdb/cockroach/.*\\.eg\\.go$": "generated code", + ".*\\.pb\\.go$": "generated code", + ".*\\.pb\\.gw\\.go$": "generated code", + "github.com/cockroachdb/cockroach/.*_generated\\.go$": "generated code" + }, + "only_files": { + "github.com/cockroachdb/cockroach/.*$": "first-party code" + } + }, + "S1023": { + "exclude_files": { + "github.com/cockroachdb/cockroach/.*\\.eg\\.go$": "generated code", + ".*\\.pb\\.go$": "generated code", + ".*\\.pb\\.gw\\.go$": "generated code", + "github.com/cockroachdb/cockroach/.*_generated\\.go$": "generated code" + }, + "only_files": { + "github.com/cockroachdb/cockroach/.*$": "first-party code" + } + }, + "S1024": { + "exclude_files": { + "github.com/cockroachdb/cockroach/.*\\.eg\\.go$": "generated code", + ".*\\.pb\\.go$": "generated code", + ".*\\.pb\\.gw\\.go$": "generated code", + "github.com/cockroachdb/cockroach/.*_generated\\.go$": "generated code" + }, + "only_files": { + "github.com/cockroachdb/cockroach/.*$": "first-party code" + } + }, + "S1025": { + "exclude_files": { + "github.com/cockroachdb/cockroach/.*\\.eg\\.go$": "generated code", + ".*\\.pb\\.go$": "generated code", + ".*\\.pb\\.gw\\.go$": "generated code", + "github.com/cockroachdb/cockroach/.*_generated\\.go$": "generated code" + }, + "only_files": { + "github.com/cockroachdb/cockroach/.*$": "first-party code" + } + }, + "S1028": { + "exclude_files": { + "github.com/cockroachdb/cockroach/.*\\.eg\\.go$": "generated code", + ".*\\.pb\\.go$": "generated code", + ".*\\.pb\\.gw\\.go$": "generated code", + "github.com/cockroachdb/cockroach/.*_generated\\.go$": "generated code" + }, + "only_files": { + "github.com/cockroachdb/cockroach/.*$": "first-party code" + } + }, + "S1029": { + "exclude_files": { + "github.com/cockroachdb/cockroach/.*\\.eg\\.go$": "generated code", + ".*\\.pb\\.go$": "generated code", + ".*\\.pb\\.gw\\.go$": "generated code", + "github.com/cockroachdb/cockroach/.*_generated\\.go$": "generated code" + }, + "only_files": { + "github.com/cockroachdb/cockroach/.*$": "first-party code" + } + }, + "S1030": { + "exclude_files": { + "github.com/cockroachdb/cockroach/.*\\.eg\\.go$": "generated code", + ".*\\.pb\\.go$": "generated code", + ".*\\.pb\\.gw\\.go$": "generated code", + "github.com/cockroachdb/cockroach/.*_generated\\.go$": "generated code" + }, + "only_files": { + "github.com/cockroachdb/cockroach/.*$": "first-party code" + } + }, + "S1031": { + "exclude_files": { + "github.com/cockroachdb/cockroach/.*\\.eg\\.go$": "generated code", + ".*\\.pb\\.go$": "generated code", + ".*\\.pb\\.gw\\.go$": "generated code", + "github.com/cockroachdb/cockroach/.*_generated\\.go$": "generated code" + }, + "only_files": { + "github.com/cockroachdb/cockroach/.*$": "first-party code" + } + }, + "S1032": { + "exclude_files": { + "github.com/cockroachdb/cockroach/.*\\.eg\\.go$": "generated code", + ".*\\.pb\\.go$": "generated code", + ".*\\.pb\\.gw\\.go$": "generated code", + "github.com/cockroachdb/cockroach/.*_generated\\.go$": "generated code" + }, + "only_files": { + "github.com/cockroachdb/cockroach/.*$": "first-party code" + } + }, + "S1033": { + "exclude_files": { + "github.com/cockroachdb/cockroach/.*\\.eg\\.go$": "generated code", + ".*\\.pb\\.go$": "generated code", + ".*\\.pb\\.gw\\.go$": "generated code", + "github.com/cockroachdb/cockroach/.*_generated\\.go$": "generated code" + }, + "only_files": { + "github.com/cockroachdb/cockroach/.*$": "first-party code" + } + }, + "S1034": { + "exclude_files": { + "github.com/cockroachdb/cockroach/.*\\.eg\\.go$": "generated code", + ".*\\.pb\\.go$": "generated code", + ".*\\.pb\\.gw\\.go$": "generated code", + "github.com/cockroachdb/cockroach/.*_generated\\.go$": "generated code" + }, + "only_files": { + "github.com/cockroachdb/cockroach/.*$": "first-party code" + } + }, + "S1035": { + "exclude_files": { + "github.com/cockroachdb/cockroach/.*\\.eg\\.go$": "generated code", + ".*\\.pb\\.go$": "generated code", + ".*\\.pb\\.gw\\.go$": "generated code", + "github.com/cockroachdb/cockroach/.*_generated\\.go$": "generated code" + }, + "only_files": { + "github.com/cockroachdb/cockroach/.*$": "first-party code" + } + }, + "S1036": { + "exclude_files": { + "github.com/cockroachdb/cockroach/.*\\.eg\\.go$": "generated code", + ".*\\.pb\\.go$": "generated code", + ".*\\.pb\\.gw\\.go$": "generated code", + "github.com/cockroachdb/cockroach/.*_generated\\.go$": "generated code" + }, + "only_files": { + "github.com/cockroachdb/cockroach/.*$": "first-party code" + } + }, + "S1037": { + "exclude_files": { + "github.com/cockroachdb/cockroach/.*\\.eg\\.go$": "generated code", + ".*\\.pb\\.go$": "generated code", + ".*\\.pb\\.gw\\.go$": "generated code", + "github.com/cockroachdb/cockroach/.*_generated\\.go$": "generated code" + }, + "only_files": { + "github.com/cockroachdb/cockroach/.*$": "first-party code" + } + }, + "S1038": { + "exclude_files": { + "github.com/cockroachdb/cockroach/.*\\.eg\\.go$": "generated code", + ".*\\.pb\\.go$": "generated code", + ".*\\.pb\\.gw\\.go$": "generated code", + "github.com/cockroachdb/cockroach/.*_generated\\.go$": "generated code" + }, + "only_files": { + "github.com/cockroachdb/cockroach/.*$": "first-party code" + } + }, + "S1039": { + "exclude_files": { + "github.com/cockroachdb/cockroach/.*\\.eg\\.go$": "generated code", + ".*\\.pb\\.go$": "generated code", + ".*\\.pb\\.gw\\.go$": "generated code", + "github.com/cockroachdb/cockroach/.*_generated\\.go$": "generated code" + }, + "only_files": { + "github.com/cockroachdb/cockroach/.*$": "first-party code" + } + }, + "S1040": { + "exclude_files": { + "github.com/cockroachdb/cockroach/.*\\.eg\\.go$": "generated code", + ".*\\.pb\\.go$": "generated code", + ".*\\.pb\\.gw\\.go$": "generated code", + "github.com/cockroachdb/cockroach/.*_generated\\.go$": "generated code" + }, + "only_files": { + "github.com/cockroachdb/cockroach/.*$": "first-party code" + } + }, + "SA1000": { + "exclude_files": { + "github.com/cockroachdb/cockroach/.*\\.eg\\.go$": "generated code", + ".*\\.pb\\.go$": "generated code", + ".*\\.pb\\.gw\\.go$": "generated code", + "github.com/cockroachdb/cockroach/.*_generated\\.go$": "generated code" + }, + "only_files": { + "github.com/cockroachdb/cockroach/.*$": "first-party code" + } + }, + "SA1001": { + "exclude_files": { + "github.com/cockroachdb/cockroach/.*\\.eg\\.go$": "generated code", + ".*\\.pb\\.go$": "generated code", + ".*\\.pb\\.gw\\.go$": "generated code", + "github.com/cockroachdb/cockroach/.*_generated\\.go$": "generated code" + }, + "only_files": { + "github.com/cockroachdb/cockroach/.*$": "first-party code" + } + }, + "SA1002": { + "exclude_files": { + "github.com/cockroachdb/cockroach/.*\\.eg\\.go$": "generated code", + ".*\\.pb\\.go$": "generated code", + ".*\\.pb\\.gw\\.go$": "generated code", + "github.com/cockroachdb/cockroach/.*_generated\\.go$": "generated code" + }, + "only_files": { + "github.com/cockroachdb/cockroach/.*$": "first-party code" + } + }, + "SA1003": { + "exclude_files": { + "github.com/cockroachdb/cockroach/.*\\.eg\\.go$": "generated code", + ".*\\.pb\\.go$": "generated code", + ".*\\.pb\\.gw\\.go$": "generated code", + "github.com/cockroachdb/cockroach/.*_generated\\.go$": "generated code" + }, + "only_files": { + "github.com/cockroachdb/cockroach/.*$": "first-party code" + } + }, + "SA1004": { + "exclude_files": { + "github.com/cockroachdb/cockroach/.*\\.eg\\.go$": "generated code", + ".*\\.pb\\.go$": "generated code", + ".*\\.pb\\.gw\\.go$": "generated code", + "github.com/cockroachdb/cockroach/.*_generated\\.go$": "generated code" + }, + "only_files": { + "github.com/cockroachdb/cockroach/.*$": "first-party code" + } + }, + "SA1005": { + "exclude_files": { + "github.com/cockroachdb/cockroach/.*\\.eg\\.go$": "generated code", + ".*\\.pb\\.go$": "generated code", + ".*\\.pb\\.gw\\.go$": "generated code", + "github.com/cockroachdb/cockroach/.*_generated\\.go$": "generated code" + }, + "only_files": { + "github.com/cockroachdb/cockroach/.*$": "first-party code" + } + }, + "SA1006": { + "exclude_files": { + "github.com/cockroachdb/cockroach/.*\\.eg\\.go$": "generated code", + ".*\\.pb\\.go$": "generated code", + ".*\\.pb\\.gw\\.go$": "generated code", + "github.com/cockroachdb/cockroach/.*_generated\\.go$": "generated code" + }, + "only_files": { + "github.com/cockroachdb/cockroach/.*$": "first-party code" + } + }, + "SA1007": { + "exclude_files": { + "github.com/cockroachdb/cockroach/.*\\.eg\\.go$": "generated code", + ".*\\.pb\\.go$": "generated code", + ".*\\.pb\\.gw\\.go$": "generated code", + "github.com/cockroachdb/cockroach/.*_generated\\.go$": "generated code" + }, + "only_files": { + "github.com/cockroachdb/cockroach/.*$": "first-party code" + } + }, + "SA1008": { + "exclude_files": { + "github.com/cockroachdb/cockroach/.*\\.eg\\.go$": "generated code", + ".*\\.pb\\.go$": "generated code", + ".*\\.pb\\.gw\\.go$": "generated code", + "github.com/cockroachdb/cockroach/.*_generated\\.go$": "generated code" + }, + "only_files": { + "github.com/cockroachdb/cockroach/.*$": "first-party code" + } + }, + "SA1010": { + "exclude_files": { + "github.com/cockroachdb/cockroach/.*\\.eg\\.go$": "generated code", + ".*\\.pb\\.go$": "generated code", + ".*\\.pb\\.gw\\.go$": "generated code", + "github.com/cockroachdb/cockroach/.*_generated\\.go$": "generated code" + }, + "only_files": { + "github.com/cockroachdb/cockroach/.*$": "first-party code" + } + }, + "SA1011": { + "exclude_files": { + "github.com/cockroachdb/cockroach/.*\\.eg\\.go$": "generated code", + ".*\\.pb\\.go$": "generated code", + ".*\\.pb\\.gw\\.go$": "generated code", + "github.com/cockroachdb/cockroach/.*_generated\\.go$": "generated code" + }, + "only_files": { + "github.com/cockroachdb/cockroach/.*$": "first-party code" + } + }, + "SA1012": { + "exclude_files": { + "github.com/cockroachdb/cockroach/.*\\.eg\\.go$": "generated code", + ".*\\.pb\\.go$": "generated code", + ".*\\.pb\\.gw\\.go$": "generated code", + "github.com/cockroachdb/cockroach/.*_generated\\.go$": "generated code" + }, + "only_files": { + "github.com/cockroachdb/cockroach/.*$": "first-party code" + } + }, + "SA1013": { + "exclude_files": { + "github.com/cockroachdb/cockroach/.*\\.eg\\.go$": "generated code", + ".*\\.pb\\.go$": "generated code", + ".*\\.pb\\.gw\\.go$": "generated code", + "github.com/cockroachdb/cockroach/.*_generated\\.go$": "generated code" + }, + "only_files": { + "github.com/cockroachdb/cockroach/.*$": "first-party code" + } + }, + "SA1014": { + "exclude_files": { + "github.com/cockroachdb/cockroach/.*\\.eg\\.go$": "generated code", + ".*\\.pb\\.go$": "generated code", + ".*\\.pb\\.gw\\.go$": "generated code", + "github.com/cockroachdb/cockroach/.*_generated\\.go$": "generated code" + }, + "only_files": { + "github.com/cockroachdb/cockroach/.*$": "first-party code" + } + }, + "SA1015": { + "exclude_files": { + "github.com/cockroachdb/cockroach/.*\\.eg\\.go$": "generated code", + ".*\\.pb\\.go$": "generated code", + ".*\\.pb\\.gw\\.go$": "generated code", + "github.com/cockroachdb/cockroach/.*_generated\\.go$": "generated code" + }, + "only_files": { + "github.com/cockroachdb/cockroach/.*$": "first-party code" + } + }, + "SA1016": { + "exclude_files": { + "github.com/cockroachdb/cockroach/.*\\.eg\\.go$": "generated code", + ".*\\.pb\\.go$": "generated code", + ".*\\.pb\\.gw\\.go$": "generated code", + "github.com/cockroachdb/cockroach/.*_generated\\.go$": "generated code" + }, + "only_files": { + "github.com/cockroachdb/cockroach/.*$": "first-party code" + } + }, + "SA1017": { + "exclude_files": { + "github.com/cockroachdb/cockroach/.*\\.eg\\.go$": "generated code", + ".*\\.pb\\.go$": "generated code", + ".*\\.pb\\.gw\\.go$": "generated code", + "github.com/cockroachdb/cockroach/.*_generated\\.go$": "generated code" + }, + "only_files": { + "github.com/cockroachdb/cockroach/.*$": "first-party code" + } + }, + "SA1018": { + "exclude_files": { + "github.com/cockroachdb/cockroach/.*\\.eg\\.go$": "generated code", + ".*\\.pb\\.go$": "generated code", + ".*\\.pb\\.gw\\.go$": "generated code", + "github.com/cockroachdb/cockroach/.*_generated\\.go$": "generated code" + }, + "only_files": { + "github.com/cockroachdb/cockroach/.*$": "first-party code" + } + }, + "SA1019": { + "exclude_files": { + "github.com/cockroachdb/cockroach/pkg/roachpb/api_test.go$": "same package that grpc-go imports", + "github.com/cockroachdb/cockroach/pkg/rpc/codec.go$": "rpc/codec.go imports the same proto package that grpc-go imports (as of crdb@dd87d1145 and grpc-go@7b167fd6).", + "github.com/cockroachdb/cockroach/pkg/rpc/stats_handler.go$": "Using deprecated WireLength call", + "github.com/cockroachdb/cockroach/.*\\.eg\\.go$": "generated code", + ".*\\.pb\\.go$": "generated code", + ".*\\.pb\\.gw\\.go$": "generated code", + "github.com/cockroachdb/cockroach/.*_generated\\.go$": "generated code" + }, + "only_files": { + "github.com/cockroachdb/cockroach/.*$": "first-party code" + } + }, + "SA1020": { + "exclude_files": { + "github.com/cockroachdb/cockroach/.*\\.eg\\.go$": "generated code", + ".*\\.pb\\.go$": "generated code", + ".*\\.pb\\.gw\\.go$": "generated code", + "github.com/cockroachdb/cockroach/.*_generated\\.go$": "generated code" + }, + "only_files": { + "github.com/cockroachdb/cockroach/.*$": "first-party code" + } + }, + "SA1021": { + "exclude_files": { + "github.com/cockroachdb/cockroach/.*\\.eg\\.go$": "generated code", + ".*\\.pb\\.go$": "generated code", + ".*\\.pb\\.gw\\.go$": "generated code", + "github.com/cockroachdb/cockroach/.*_generated\\.go$": "generated code" + }, + "only_files": { + "github.com/cockroachdb/cockroach/.*$": "first-party code" + } + }, + "SA1023": { + "exclude_files": { + "github.com/cockroachdb/cockroach/.*\\.eg\\.go$": "generated code", + ".*\\.pb\\.go$": "generated code", + ".*\\.pb\\.gw\\.go$": "generated code", + "github.com/cockroachdb/cockroach/.*_generated\\.go$": "generated code" + }, + "only_files": { + "github.com/cockroachdb/cockroach/.*$": "first-party code" + } + }, + "SA1024": { + "exclude_files": { + "github.com/cockroachdb/cockroach/.*\\.eg\\.go$": "generated code", + ".*\\.pb\\.go$": "generated code", + ".*\\.pb\\.gw\\.go$": "generated code", + "github.com/cockroachdb/cockroach/.*_generated\\.go$": "generated code" + }, + "only_files": { + "github.com/cockroachdb/cockroach/.*$": "first-party code" + } + }, + "SA1025": { + "exclude_files": { + "github.com/cockroachdb/cockroach/.*\\.eg\\.go$": "generated code", + ".*\\.pb\\.go$": "generated code", + ".*\\.pb\\.gw\\.go$": "generated code", + "github.com/cockroachdb/cockroach/.*_generated\\.go$": "generated code" + }, + "only_files": { + "github.com/cockroachdb/cockroach/.*$": "first-party code" + } + }, + "SA1026": { + "exclude_files": { + "github.com/cockroachdb/cockroach/.*\\.eg\\.go$": "generated code", + ".*\\.pb\\.go$": "generated code", + ".*\\.pb\\.gw\\.go$": "generated code", + "github.com/cockroachdb/cockroach/.*_generated\\.go$": "generated code" + }, + "only_files": { + "github.com/cockroachdb/cockroach/.*$": "first-party code" + } + }, + "SA1027": { + "exclude_files": { + "github.com/cockroachdb/cockroach/.*\\.eg\\.go$": "generated code", + ".*\\.pb\\.go$": "generated code", + ".*\\.pb\\.gw\\.go$": "generated code", + "github.com/cockroachdb/cockroach/.*_generated\\.go$": "generated code" + }, + "only_files": { + "github.com/cockroachdb/cockroach/.*$": "first-party code" + } + }, + "SA1028": { + "exclude_files": { + "github.com/cockroachdb/cockroach/.*\\.eg\\.go$": "generated code", + ".*\\.pb\\.go$": "generated code", + ".*\\.pb\\.gw\\.go$": "generated code", + "github.com/cockroachdb/cockroach/.*_generated\\.go$": "generated code" + }, + "only_files": { + "github.com/cockroachdb/cockroach/.*$": "first-party code" + } + }, + "SA1029": { + "exclude_files": { + "github.com/cockroachdb/cockroach/.*\\.eg\\.go$": "generated code", + ".*\\.pb\\.go$": "generated code", + ".*\\.pb\\.gw\\.go$": "generated code", + "github.com/cockroachdb/cockroach/.*_generated\\.go$": "generated code" + }, + "only_files": { + "github.com/cockroachdb/cockroach/.*$": "first-party code" + } + }, + "SA1030": { + "exclude_files": { + "github.com/cockroachdb/cockroach/.*\\.eg\\.go$": "generated code", + ".*\\.pb\\.go$": "generated code", + ".*\\.pb\\.gw\\.go$": "generated code", + "github.com/cockroachdb/cockroach/.*_generated\\.go$": "generated code" + }, + "only_files": { + "github.com/cockroachdb/cockroach/.*$": "first-party code" + } + }, + "SA2000": { + "exclude_files": { + "github.com/cockroachdb/cockroach/.*\\.eg\\.go$": "generated code", + ".*\\.pb\\.go$": "generated code", + ".*\\.pb\\.gw\\.go$": "generated code", + "github.com/cockroachdb/cockroach/.*_generated\\.go$": "generated code" + }, + "only_files": { + "github.com/cockroachdb/cockroach/.*$": "first-party code" + } + }, + "SA2001": { + "exclude_files": { + "github.com/cockroachdb/cockroach/.*\\.eg\\.go$": "generated code", + ".*\\.pb\\.go$": "generated code", + ".*\\.pb\\.gw\\.go$": "generated code", + "github.com/cockroachdb/cockroach/.*_generated\\.go$": "generated code" + }, + "only_files": { + "github.com/cockroachdb/cockroach/.*$": "first-party code" + } + }, + "SA2002": { + "exclude_files": { + "github.com/cockroachdb/cockroach/.*\\.eg\\.go$": "generated code", + ".*\\.pb\\.go$": "generated code", + ".*\\.pb\\.gw\\.go$": "generated code", + "github.com/cockroachdb/cockroach/.*_generated\\.go$": "generated code" + }, + "only_files": { + "github.com/cockroachdb/cockroach/.*$": "first-party code" + } + }, + "SA2003": { + "exclude_files": { + "github.com/cockroachdb/cockroach/.*\\.eg\\.go$": "generated code", + ".*\\.pb\\.go$": "generated code", + ".*\\.pb\\.gw\\.go$": "generated code", + "github.com/cockroachdb/cockroach/.*_generated\\.go$": "generated code" + }, + "only_files": { + "github.com/cockroachdb/cockroach/.*$": "first-party code" + } + }, + "SA3000": { + "exclude_files": { + "github.com/cockroachdb/cockroach/.*\\.eg\\.go$": "generated code", + ".*\\.pb\\.go$": "generated code", + ".*\\.pb\\.gw\\.go$": "generated code", + "github.com/cockroachdb/cockroach/.*_generated\\.go$": "generated code" + }, + "only_files": { + "github.com/cockroachdb/cockroach/.*$": "first-party code" + } + }, + "SA3001": { + "exclude_files": { + "github.com/cockroachdb/cockroach/.*\\.eg\\.go$": "generated code", + ".*\\.pb\\.go$": "generated code", + ".*\\.pb\\.gw\\.go$": "generated code", + "github.com/cockroachdb/cockroach/.*_generated\\.go$": "generated code" + }, + "only_files": { + "github.com/cockroachdb/cockroach/.*$": "first-party code" + } + }, + "SA4000": { + "exclude_files": { + "github.com/cockroachdb/cockroach/.*\\.eg\\.go$": "generated code", + ".*\\.pb\\.go$": "generated code", + ".*\\.pb\\.gw\\.go$": "generated code", + "github.com/cockroachdb/cockroach/.*_generated\\.go$": "generated code" + }, + "only_files": { + "github.com/cockroachdb/cockroach/.*$": "first-party code" + } + }, + "SA4001": { + "exclude_files": { + "github.com/cockroachdb/cockroach/.*\\.eg\\.go$": "generated code", + ".*\\.pb\\.go$": "generated code", + ".*\\.pb\\.gw\\.go$": "generated code", + "github.com/cockroachdb/cockroach/.*_generated\\.go$": "generated code" + }, + "only_files": { + "github.com/cockroachdb/cockroach/.*$": "first-party code" + } + }, + "SA4003": { + "exclude_files": { + "github.com/cockroachdb/cockroach/.*\\.eg\\.go$": "generated code", + ".*\\.pb\\.go$": "generated code", + ".*\\.pb\\.gw\\.go$": "generated code", + "github.com/cockroachdb/cockroach/.*_generated\\.go$": "generated code" + }, + "only_files": { + "github.com/cockroachdb/cockroach/.*$": "first-party code" + } + }, + "SA4004": { + "exclude_files": { + "github.com/cockroachdb/cockroach/.*\\.eg\\.go$": "generated code", + ".*\\.pb\\.go$": "generated code", + ".*\\.pb\\.gw\\.go$": "generated code", + "github.com/cockroachdb/cockroach/.*_generated\\.go$": "generated code" + }, + "only_files": { + "github.com/cockroachdb/cockroach/.*$": "first-party code" + } + }, + "SA4005": { + "exclude_files": { + "github.com/cockroachdb/cockroach/.*\\.eg\\.go$": "generated code", + ".*\\.pb\\.go$": "generated code", + ".*\\.pb\\.gw\\.go$": "generated code", + "github.com/cockroachdb/cockroach/.*_generated\\.go$": "generated code" + }, + "only_files": { + "github.com/cockroachdb/cockroach/.*$": "first-party code" + } + }, + "SA4006": { + "exclude_files": { + "github.com/cockroachdb/cockroach/.*\\.eg\\.go$": "generated code", + ".*\\.pb\\.go$": "generated code", + ".*\\.pb\\.gw\\.go$": "generated code", + "github.com/cockroachdb/cockroach/.*_generated\\.go$": "generated code" + }, + "only_files": { + "github.com/cockroachdb/cockroach/.*$": "first-party code" + } + }, + "SA4008": { + "exclude_files": { + "github.com/cockroachdb/cockroach/.*\\.eg\\.go$": "generated code", + ".*\\.pb\\.go$": "generated code", + ".*\\.pb\\.gw\\.go$": "generated code", + "github.com/cockroachdb/cockroach/.*_generated\\.go$": "generated code" + }, + "only_files": { + "github.com/cockroachdb/cockroach/.*$": "first-party code" + } + }, + "SA4009": { + "exclude_files": { + "github.com/cockroachdb/cockroach/.*\\.eg\\.go$": "generated code", + ".*\\.pb\\.go$": "generated code", + ".*\\.pb\\.gw\\.go$": "generated code", + "github.com/cockroachdb/cockroach/.*_generated\\.go$": "generated code" + }, + "only_files": { + "github.com/cockroachdb/cockroach/.*$": "first-party code" + } + }, + "SA4010": { + "exclude_files": { + "github.com/cockroachdb/cockroach/.*\\.eg\\.go$": "generated code", + ".*\\.pb\\.go$": "generated code", + ".*\\.pb\\.gw\\.go$": "generated code", + "github.com/cockroachdb/cockroach/.*_generated\\.go$": "generated code" + }, + "only_files": { + "github.com/cockroachdb/cockroach/.*$": "first-party code" + } + }, + "SA4011": { + "exclude_files": { + "github.com/cockroachdb/cockroach/.*\\.eg\\.go$": "generated code", + ".*\\.pb\\.go$": "generated code", + ".*\\.pb\\.gw\\.go$": "generated code", + "github.com/cockroachdb/cockroach/.*_generated\\.go$": "generated code" + }, + "only_files": { + "github.com/cockroachdb/cockroach/.*$": "first-party code" + } + }, + "SA4012": { + "exclude_files": { + "github.com/cockroachdb/cockroach/.*\\.eg\\.go$": "generated code", + ".*\\.pb\\.go$": "generated code", + ".*\\.pb\\.gw\\.go$": "generated code", + "github.com/cockroachdb/cockroach/.*_generated\\.go$": "generated code" + }, + "only_files": { + "github.com/cockroachdb/cockroach/.*$": "first-party code" + } + }, + "SA4013": { + "exclude_files": { + "github.com/cockroachdb/cockroach/.*\\.eg\\.go$": "generated code", + ".*\\.pb\\.go$": "generated code", + ".*\\.pb\\.gw\\.go$": "generated code", + "github.com/cockroachdb/cockroach/.*_generated\\.go$": "generated code" + }, + "only_files": { + "github.com/cockroachdb/cockroach/.*$": "first-party code" + } + }, + "SA4014": { + "exclude_files": { + "github.com/cockroachdb/cockroach/.*\\.eg\\.go$": "generated code", + ".*\\.pb\\.go$": "generated code", + ".*\\.pb\\.gw\\.go$": "generated code", + "github.com/cockroachdb/cockroach/.*_generated\\.go$": "generated code" + }, + "only_files": { + "github.com/cockroachdb/cockroach/.*$": "first-party code" + } + }, + "SA4015": { + "exclude_files": { + "github.com/cockroachdb/cockroach/.*\\.eg\\.go$": "generated code", + ".*\\.pb\\.go$": "generated code", + ".*\\.pb\\.gw\\.go$": "generated code", + "github.com/cockroachdb/cockroach/.*_generated\\.go$": "generated code" + }, + "only_files": { + "github.com/cockroachdb/cockroach/.*$": "first-party code" + } + }, + "SA4016": { + "exclude_files": { + "github.com/cockroachdb/cockroach/.*\\.eg\\.go$": "generated code", + ".*\\.pb\\.go$": "generated code", + ".*\\.pb\\.gw\\.go$": "generated code", + "github.com/cockroachdb/cockroach/.*_generated\\.go$": "generated code" + }, + "only_files": { + "github.com/cockroachdb/cockroach/.*$": "first-party code" + } + }, + "SA4017": { + "exclude_files": { + "github.com/cockroachdb/cockroach/.*\\.eg\\.go$": "generated code", + ".*\\.pb\\.go$": "generated code", + ".*\\.pb\\.gw\\.go$": "generated code", + "github.com/cockroachdb/cockroach/.*_generated\\.go$": "generated code" + }, + "only_files": { + "github.com/cockroachdb/cockroach/.*$": "first-party code" + } + }, + "SA4018": { + "exclude_files": { + "github.com/cockroachdb/cockroach/.*\\.eg\\.go$": "generated code", + ".*\\.pb\\.go$": "generated code", + ".*\\.pb\\.gw\\.go$": "generated code", + "github.com/cockroachdb/cockroach/.*_generated\\.go$": "generated code" + }, + "only_files": { + "github.com/cockroachdb/cockroach/.*$": "first-party code" + } + }, + "SA4019": { + "exclude_files": { + "github.com/cockroachdb/cockroach/.*\\.eg\\.go$": "generated code", + ".*\\.pb\\.go$": "generated code", + ".*\\.pb\\.gw\\.go$": "generated code", + "github.com/cockroachdb/cockroach/.*_generated\\.go$": "generated code" + }, + "only_files": { + "github.com/cockroachdb/cockroach/.*$": "first-party code" + } + }, + "SA4020": { + "exclude_files": { + "github.com/cockroachdb/cockroach/.*\\.eg\\.go$": "generated code", + ".*\\.pb\\.go$": "generated code", + ".*\\.pb\\.gw\\.go$": "generated code", + "github.com/cockroachdb/cockroach/.*_generated\\.go$": "generated code" + }, + "only_files": { + "github.com/cockroachdb/cockroach/.*$": "first-party code" + } + }, + "SA4021": { + "exclude_files": { + "github.com/cockroachdb/cockroach/.*\\.eg\\.go$": "generated code", + ".*\\.pb\\.go$": "generated code", + ".*\\.pb\\.gw\\.go$": "generated code", + "github.com/cockroachdb/cockroach/.*_generated\\.go$": "generated code" + }, + "only_files": { + "github.com/cockroachdb/cockroach/.*$": "first-party code" + } + }, + "SA4022": { + "exclude_files": { + "github.com/cockroachdb/cockroach/.*\\.eg\\.go$": "generated code", + ".*\\.pb\\.go$": "generated code", + ".*\\.pb\\.gw\\.go$": "generated code", + "github.com/cockroachdb/cockroach/.*_generated\\.go$": "generated code" + }, + "only_files": { + "github.com/cockroachdb/cockroach/.*$": "first-party code" + } + }, + "SA4023": { + "exclude_files": { + "github.com/cockroachdb/cockroach/.*\\.eg\\.go$": "generated code", + ".*\\.pb\\.go$": "generated code", + ".*\\.pb\\.gw\\.go$": "generated code", + "github.com/cockroachdb/cockroach/.*_generated\\.go$": "generated code" + }, + "only_files": { + "github.com/cockroachdb/cockroach/.*$": "first-party code" + } + }, + "SA4024": { + "exclude_files": { + "github.com/cockroachdb/cockroach/.*\\.eg\\.go$": "generated code", + ".*\\.pb\\.go$": "generated code", + ".*\\.pb\\.gw\\.go$": "generated code", + "github.com/cockroachdb/cockroach/.*_generated\\.go$": "generated code" + }, + "only_files": { + "github.com/cockroachdb/cockroach/.*$": "first-party code" + } + }, + "SA4025": { + "exclude_files": { + "github.com/cockroachdb/cockroach/.*\\.eg\\.go$": "generated code", + ".*\\.pb\\.go$": "generated code", + ".*\\.pb\\.gw\\.go$": "generated code", + "github.com/cockroachdb/cockroach/.*_generated\\.go$": "generated code" + }, + "only_files": { + "github.com/cockroachdb/cockroach/.*$": "first-party code" + } + }, + "SA4026": { + "exclude_files": { + "github.com/cockroachdb/cockroach/.*\\.eg\\.go$": "generated code", + ".*\\.pb\\.go$": "generated code", + ".*\\.pb\\.gw\\.go$": "generated code", + "github.com/cockroachdb/cockroach/.*_generated\\.go$": "generated code" + }, + "only_files": { + "github.com/cockroachdb/cockroach/.*$": "first-party code" + } + }, + "SA4027": { + "exclude_files": { + "github.com/cockroachdb/cockroach/.*\\.eg\\.go$": "generated code", + ".*\\.pb\\.go$": "generated code", + ".*\\.pb\\.gw\\.go$": "generated code", + "github.com/cockroachdb/cockroach/.*_generated\\.go$": "generated code" + }, + "only_files": { + "github.com/cockroachdb/cockroach/.*$": "first-party code" + } + }, + "SA5000": { + "exclude_files": { + "github.com/cockroachdb/cockroach/.*\\.eg\\.go$": "generated code", + ".*\\.pb\\.go$": "generated code", + ".*\\.pb\\.gw\\.go$": "generated code", + "github.com/cockroachdb/cockroach/.*_generated\\.go$": "generated code" + }, + "only_files": { + "github.com/cockroachdb/cockroach/.*$": "first-party code" + } + }, + "SA5001": { + "exclude_files": { + "github.com/cockroachdb/cockroach/.*\\.eg\\.go$": "generated code", + ".*\\.pb\\.go$": "generated code", + ".*\\.pb\\.gw\\.go$": "generated code", + "github.com/cockroachdb/cockroach/.*_generated\\.go$": "generated code" + }, + "only_files": { + "github.com/cockroachdb/cockroach/.*$": "first-party code" + } + }, + "SA5002": { + "exclude_files": { + "github.com/cockroachdb/cockroach/.*\\.eg\\.go$": "generated code", + ".*\\.pb\\.go$": "generated code", + ".*\\.pb\\.gw\\.go$": "generated code", + "github.com/cockroachdb/cockroach/.*_generated\\.go$": "generated code" + }, + "only_files": { + "github.com/cockroachdb/cockroach/.*$": "first-party code" + } + }, + "SA5003": { + "exclude_files": { + "github.com/cockroachdb/cockroach/.*\\.eg\\.go$": "generated code", + ".*\\.pb\\.go$": "generated code", + ".*\\.pb\\.gw\\.go$": "generated code", + "github.com/cockroachdb/cockroach/.*_generated\\.go$": "generated code" + }, + "only_files": { + "github.com/cockroachdb/cockroach/.*$": "first-party code" + } + }, + "SA5004": { + "exclude_files": { + "github.com/cockroachdb/cockroach/.*\\.eg\\.go$": "generated code", + ".*\\.pb\\.go$": "generated code", + ".*\\.pb\\.gw\\.go$": "generated code", + "github.com/cockroachdb/cockroach/.*_generated\\.go$": "generated code" + }, + "only_files": { + "github.com/cockroachdb/cockroach/.*$": "first-party code" + } + }, + "SA5005": { + "exclude_files": { + "github.com/cockroachdb/cockroach/.*\\.eg\\.go$": "generated code", + ".*\\.pb\\.go$": "generated code", + ".*\\.pb\\.gw\\.go$": "generated code", + "github.com/cockroachdb/cockroach/.*_generated\\.go$": "generated code" + }, + "only_files": { + "github.com/cockroachdb/cockroach/.*$": "first-party code" + } + }, + "SA5007": { + "exclude_files": { + "github.com/cockroachdb/cockroach/.*\\.eg\\.go$": "generated code", + ".*\\.pb\\.go$": "generated code", + ".*\\.pb\\.gw\\.go$": "generated code", + "github.com/cockroachdb/cockroach/.*_generated\\.go$": "generated code" + }, + "only_files": { + "github.com/cockroachdb/cockroach/.*$": "first-party code" + } + }, + "SA5008": { + "exclude_files": { + "github.com/cockroachdb/cockroach/.*\\.eg\\.go$": "generated code", + ".*\\.pb\\.go$": "generated code", + ".*\\.pb\\.gw\\.go$": "generated code", + "github.com/cockroachdb/cockroach/.*_generated\\.go$": "generated code" + }, + "only_files": { + "github.com/cockroachdb/cockroach/.*$": "first-party code" + } + }, + "SA5009": { + "exclude_files": { + "github.com/cockroachdb/cockroach/.*\\.eg\\.go$": "generated code", + ".*\\.pb\\.go$": "generated code", + ".*\\.pb\\.gw\\.go$": "generated code", + "github.com/cockroachdb/cockroach/.*_generated\\.go$": "generated code" + }, + "only_files": { + "github.com/cockroachdb/cockroach/.*$": "first-party code" + } + }, + "SA5010": { + "exclude_files": { + "github.com/cockroachdb/cockroach/.*\\.eg\\.go$": "generated code", + ".*\\.pb\\.go$": "generated code", + ".*\\.pb\\.gw\\.go$": "generated code", + "github.com/cockroachdb/cockroach/.*_generated\\.go$": "generated code" + }, + "only_files": { + "github.com/cockroachdb/cockroach/.*$": "first-party code" + } + }, + "SA5011": { + "exclude_files": { + "_test\\.go$": "tests", + "github.com/cockroachdb/cockroach/.*\\.eg\\.go$": "generated code", + ".*\\.pb\\.go$": "generated code", + ".*\\.pb\\.gw\\.go$": "generated code", + "github.com/cockroachdb/cockroach/.*_generated\\.go$": "generated code" + }, + "only_files": { + "github.com/cockroachdb/cockroach/.*$": "first-party code" + } + }, + "SA5012": { + "exclude_files": { + "github.com/cockroachdb/cockroach/.*\\.eg\\.go$": "generated code", + ".*\\.pb\\.go$": "generated code", + ".*\\.pb\\.gw\\.go$": "generated code", + "github.com/cockroachdb/cockroach/.*_generated\\.go$": "generated code" + }, + "only_files": { + "github.com/cockroachdb/cockroach/.*$": "first-party code" + } + }, + "SA6000": { + "exclude_files": { + "github.com/cockroachdb/cockroach/.*\\.eg\\.go$": "generated code", + ".*\\.pb\\.go$": "generated code", + ".*\\.pb\\.gw\\.go$": "generated code", + "github.com/cockroachdb/cockroach/.*_generated\\.go$": "generated code" + }, + "only_files": { + "github.com/cockroachdb/cockroach/.*$": "first-party code" + } + }, + "SA6001": { + "exclude_files": { + "github.com/cockroachdb/cockroach/.*\\.eg\\.go$": "generated code", + ".*\\.pb\\.go$": "generated code", + ".*\\.pb\\.gw\\.go$": "generated code", + "github.com/cockroachdb/cockroach/.*_generated\\.go$": "generated code" + }, + "only_files": { + "github.com/cockroachdb/cockroach/.*$": "first-party code" + } + }, + "SA6002": { + "exclude_files": { + "github.com/cockroachdb/cockroach/.*\\.eg\\.go$": "generated code", + ".*\\.pb\\.go$": "generated code", + ".*\\.pb\\.gw\\.go$": "generated code", + "github.com/cockroachdb/cockroach/.*_generated\\.go$": "generated code" + }, + "only_files": { + "github.com/cockroachdb/cockroach/.*$": "first-party code" + } + }, + "SA6003": { + "exclude_files": { + "github.com/cockroachdb/cockroach/.*\\.eg\\.go$": "generated code", + ".*\\.pb\\.go$": "generated code", + ".*\\.pb\\.gw\\.go$": "generated code", + "github.com/cockroachdb/cockroach/.*_generated\\.go$": "generated code" + }, + "only_files": { + "github.com/cockroachdb/cockroach/.*$": "first-party code" + } + }, + "SA6005": { + "exclude_files": { + "github.com/cockroachdb/cockroach/.*\\.eg\\.go$": "generated code", + ".*\\.pb\\.go$": "generated code", + ".*\\.pb\\.gw\\.go$": "generated code", + "github.com/cockroachdb/cockroach/.*_generated\\.go$": "generated code" + }, + "only_files": { + "github.com/cockroachdb/cockroach/.*$": "first-party code" + } + }, + "SA9001": { + "exclude_files": { + "github.com/cockroachdb/cockroach/.*\\.eg\\.go$": "generated code", + ".*\\.pb\\.go$": "generated code", + ".*\\.pb\\.gw\\.go$": "generated code", + "github.com/cockroachdb/cockroach/.*_generated\\.go$": "generated code" + }, + "only_files": { + "github.com/cockroachdb/cockroach/.*$": "first-party code" + } + }, + "SA9002": { + "exclude_files": { + "github.com/cockroachdb/cockroach/.*\\.eg\\.go$": "generated code", + ".*\\.pb\\.go$": "generated code", + ".*\\.pb\\.gw\\.go$": "generated code", + "github.com/cockroachdb/cockroach/.*_generated\\.go$": "generated code" + }, + "only_files": { + "github.com/cockroachdb/cockroach/.*$": "first-party code" + } + }, + "SA9003": { + "exclude_files": { + "github.com/cockroachdb/cockroach/.*\\.eg\\.go$": "generated code", + ".*\\.pb\\.go$": "generated code", + ".*\\.pb\\.gw\\.go$": "generated code", + "github.com/cockroachdb/cockroach/.*_generated\\.go$": "generated code" + }, + "only_files": { + "github.com/cockroachdb/cockroach/.*$": "first-party code" + } + }, + "SA9004": { + "exclude_files": { + "github.com/cockroachdb/cockroach/.*\\.eg\\.go$": "generated code", + ".*\\.pb\\.go$": "generated code", + ".*\\.pb\\.gw\\.go$": "generated code", + "github.com/cockroachdb/cockroach/.*_generated\\.go$": "generated code" + }, + "only_files": { + "github.com/cockroachdb/cockroach/.*$": "first-party code" + } + }, + "SA9005": { + "exclude_files": { + "github.com/cockroachdb/cockroach/.*\\.eg\\.go$": "generated code", + ".*\\.pb\\.go$": "generated code", + ".*\\.pb\\.gw\\.go$": "generated code", + "github.com/cockroachdb/cockroach/.*_generated\\.go$": "generated code" + }, + "only_files": { + "github.com/cockroachdb/cockroach/.*$": "first-party code" + } + }, + "SA9006": { + "exclude_files": { + "github.com/cockroachdb/cockroach/.*\\.eg\\.go$": "generated code", + ".*\\.pb\\.go$": "generated code", + ".*\\.pb\\.gw\\.go$": "generated code", + "github.com/cockroachdb/cockroach/.*_generated\\.go$": "generated code" + }, + "only_files": { + "github.com/cockroachdb/cockroach/.*$": "first-party code" + } + }, + "ST1000": { + "exclude_files": { + "github.com/cockroachdb/cockroach/.*$": "skipped in default staticcheck config", + "github.com/cockroachdb/cockroach/.*\\.eg\\.go$": "generated code", + ".*\\.pb\\.go$": "generated code", + ".*\\.pb\\.gw\\.go$": "generated code", + "github.com/cockroachdb/cockroach/.*_generated\\.go$": "generated code" + }, + "only_files": { + "github.com/cockroachdb/cockroach/.*$": "first-party code" + } + }, + "ST1001": { + "exclude_files": { + "github.com/cockroachdb/cockroach/.*\\.eg\\.go$": "generated code", + ".*\\.pb\\.go$": "generated code", + ".*\\.pb\\.gw\\.go$": "generated code", + "github.com/cockroachdb/cockroach/.*_generated\\.go$": "generated code" + }, + "only_files": { + "github.com/cockroachdb/cockroach/.*$": "first-party code" + } + }, + "ST1003": { + "exclude_files": { + "github.com/cockroachdb/cockroach/.*$": "skipped in default staticcheck config", + "github.com/cockroachdb/cockroach/.*\\.eg\\.go$": "generated code", + ".*\\.pb\\.go$": "generated code", + ".*\\.pb\\.gw\\.go$": "generated code", + "github.com/cockroachdb/cockroach/.*_generated\\.go$": "generated code" + }, + "only_files": { + "github.com/cockroachdb/cockroach/.*$": "first-party code" + } + }, + "ST1005": { + "exclude_files": { + "github.com/cockroachdb/cockroach/.*\\.eg\\.go$": "generated code", + ".*\\.pb\\.go$": "generated code", + ".*\\.pb\\.gw\\.go$": "generated code", + "github.com/cockroachdb/cockroach/.*_generated\\.go$": "generated code" + }, + "only_files": { + "github.com/cockroachdb/cockroach/.*$": "first-party code" + } + }, + "ST1006": { + "exclude_files": { + "github.com/cockroachdb/cockroach/.*\\.eg\\.go$": "generated code", + ".*\\.pb\\.go$": "generated code", + ".*\\.pb\\.gw\\.go$": "generated code", + "github.com/cockroachdb/cockroach/.*_generated\\.go$": "generated code" + }, + "only_files": { + "github.com/cockroachdb/cockroach/.*$": "first-party code" + } + }, + "ST1008": { + "exclude_files": { + "github.com/cockroachdb/cockroach/.*\\.eg\\.go$": "generated code", + ".*\\.pb\\.go$": "generated code", + ".*\\.pb\\.gw\\.go$": "generated code", + "github.com/cockroachdb/cockroach/.*_generated\\.go$": "generated code" + }, + "only_files": { + "github.com/cockroachdb/cockroach/.*$": "first-party code" + } + }, + "ST1011": { + "exclude_files": { + "github.com/cockroachdb/cockroach/.*\\.eg\\.go$": "generated code", + ".*\\.pb\\.go$": "generated code", + ".*\\.pb\\.gw\\.go$": "generated code", + "github.com/cockroachdb/cockroach/.*_generated\\.go$": "generated code" + }, + "only_files": { + "github.com/cockroachdb/cockroach/.*$": "first-party code" + } + }, + "ST1011": { + "exclude_files": { + "github.com/cockroachdb/cockroach/.*\\.eg\\.go$": "generated code", + ".*\\.pb\\.go$": "generated code", + ".*\\.pb\\.gw\\.go$": "generated code", + "github.com/cockroachdb/cockroach/.*_generated\\.go$": "generated code" + }, + "only_files": { + "github.com/cockroachdb/cockroach/.*$": "first-party code" + } + }, + "ST1012": { + "exclude_files": { + "github.com/cockroachdb/cockroach/.*\\.eg\\.go$": "generated code", + ".*\\.pb\\.go$": "generated code", + ".*\\.pb\\.gw\\.go$": "generated code", + "github.com/cockroachdb/cockroach/.*_generated\\.go$": "generated code" + }, + "only_files": { + "github.com/cockroachdb/cockroach/.*$": "first-party code" + } + }, + "ST1013": { + "exclude_files": { + "github.com/cockroachdb/cockroach/.*\\.eg\\.go$": "generated code", + ".*\\.pb\\.go$": "generated code", + ".*\\.pb\\.gw\\.go$": "generated code", + "github.com/cockroachdb/cockroach/.*_generated\\.go$": "generated code" + }, + "only_files": { + "github.com/cockroachdb/cockroach/.*$": "first-party code" + } + }, + "ST1015": { + "exclude_files": { + "github.com/cockroachdb/cockroach/.*\\.eg\\.go$": "generated code", + ".*\\.pb\\.go$": "generated code", + ".*\\.pb\\.gw\\.go$": "generated code", + "github.com/cockroachdb/cockroach/.*_generated\\.go$": "generated code" + }, + "only_files": { + "github.com/cockroachdb/cockroach/.*$": "first-party code" + } + }, + "ST1016": { + "exclude_files": { + "github.com/cockroachdb/cockroach/.*$": "skipped in default staticcheck config", + "github.com/cockroachdb/cockroach/.*\\.eg\\.go$": "generated code", + ".*\\.pb\\.go$": "generated code", + ".*\\.pb\\.gw\\.go$": "generated code", + "github.com/cockroachdb/cockroach/.*_generated\\.go$": "generated code" + }, + "only_files": { + "github.com/cockroachdb/cockroach/.*$": "first-party code" + } + }, + "ST1017": { + "exclude_files": { + "github.com/cockroachdb/cockroach/.*\\.eg\\.go$": "generated code", + ".*\\.pb\\.go$": "generated code", + ".*\\.pb\\.gw\\.go$": "generated code", + "github.com/cockroachdb/cockroach/.*_generated\\.go$": "generated code" + }, + "only_files": { + "github.com/cockroachdb/cockroach/.*$": "first-party code" + } + }, + "ST1018": { + "exclude_files": { + "github.com/cockroachdb/cockroach/.*\\.eg\\.go$": "generated code", + ".*\\.pb\\.go$": "generated code", + ".*\\.pb\\.gw\\.go$": "generated code", + "github.com/cockroachdb/cockroach/.*_generated\\.go$": "generated code" + }, + "only_files": { + "github.com/cockroachdb/cockroach/.*$": "first-party code" + } + }, + "ST1019": { + "exclude_files": { + "github.com/cockroachdb/cockroach/.*\\.eg\\.go$": "generated code", + ".*\\.pb\\.go$": "generated code", + ".*\\.pb\\.gw\\.go$": "generated code", + "github.com/cockroachdb/cockroach/.*_generated\\.go$": "generated code" + }, + "only_files": { + "github.com/cockroachdb/cockroach/.*$": "first-party code" + } + }, + "ST1020": { + "exclude_files": { + "github.com/cockroachdb/cockroach/.*$": "skipped in default staticcheck config", + "github.com/cockroachdb/cockroach/.*\\.eg\\.go$": "generated code", + ".*\\.pb\\.go$": "generated code", + ".*\\.pb\\.gw\\.go$": "generated code", + "github.com/cockroachdb/cockroach/.*_generated\\.go$": "generated code" + }, + "only_files": { + "github.com/cockroachdb/cockroach/.*$": "first-party code" + } + }, + "ST1021": { + "exclude_files": { + "github.com/cockroachdb/cockroach/.*$": "skipped in default staticcheck config", + "github.com/cockroachdb/cockroach/.*\\.eg\\.go$": "generated code", + ".*\\.pb\\.go$": "generated code", + ".*\\.pb\\.gw\\.go$": "generated code", + "github.com/cockroachdb/cockroach/.*_generated\\.go$": "generated code" + }, + "only_files": { + "github.com/cockroachdb/cockroach/.*$": "first-party code" + } + }, + "ST1022": { + "exclude_files": { + "github.com/cockroachdb/cockroach/.*$": "skipped in default staticcheck config", + "github.com/cockroachdb/cockroach/.*\\.eg\\.go$": "generated code", + ".*\\.pb\\.go$": "generated code", + ".*\\.pb\\.gw\\.go$": "generated code", + "github.com/cockroachdb/cockroach/.*_generated\\.go$": "generated code" + }, + "only_files": { + "github.com/cockroachdb/cockroach/.*$": "first-party code" + } + }, + "ST1023": { + "exclude_files": { + "github.com/cockroachdb/cockroach/.*\\.eg\\.go$": "generated code", + ".*\\.pb\\.go$": "generated code", + ".*\\.pb\\.gw\\.go$": "generated code", + "github.com/cockroachdb/cockroach/.*_generated\\.go$": "generated code" + }, + "only_files": { + "github.com/cockroachdb/cockroach/.*$": "first-party code" + } + }, "stdmethods": { "only_files": { "github.com/cockroachdb/cockroach/.*$": "first-party code" diff --git a/build/bazelutil/staticcheckanalyzers/BUILD.bazel b/build/bazelutil/staticcheckanalyzers/BUILD.bazel new file mode 100644 index 000000000000..50f545d6c4e4 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/BUILD.bazel @@ -0,0 +1 @@ +exports_files(["def.bzl"]) diff --git a/build/bazelutil/staticcheckanalyzers/README.md b/build/bazelutil/staticcheckanalyzers/README.md new file mode 100644 index 000000000000..7a8ef54e330b --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/README.md @@ -0,0 +1 @@ +All of the code in this directory is generated by generate-staticcheck for use in Bazel. diff --git a/build/bazelutil/staticcheckanalyzers/def.bzl b/build/bazelutil/staticcheckanalyzers/def.bzl new file mode 100644 index 000000000000..93a5fd8db788 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/def.bzl @@ -0,0 +1,141 @@ +# Code generated by generate-staticcheck; DO NOT EDIT. + +STATICCHECK_CHECKS = [ + "//build/bazelutil/staticcheckanalyzers/s1000", + "//build/bazelutil/staticcheckanalyzers/s1001", + "//build/bazelutil/staticcheckanalyzers/s1002", + "//build/bazelutil/staticcheckanalyzers/s1003", + "//build/bazelutil/staticcheckanalyzers/s1004", + "//build/bazelutil/staticcheckanalyzers/s1005", + "//build/bazelutil/staticcheckanalyzers/s1006", + "//build/bazelutil/staticcheckanalyzers/s1007", + "//build/bazelutil/staticcheckanalyzers/s1008", + "//build/bazelutil/staticcheckanalyzers/s1009", + "//build/bazelutil/staticcheckanalyzers/s1010", + "//build/bazelutil/staticcheckanalyzers/s1011", + "//build/bazelutil/staticcheckanalyzers/s1012", + "//build/bazelutil/staticcheckanalyzers/s1016", + "//build/bazelutil/staticcheckanalyzers/s1017", + "//build/bazelutil/staticcheckanalyzers/s1018", + "//build/bazelutil/staticcheckanalyzers/s1019", + "//build/bazelutil/staticcheckanalyzers/s1020", + "//build/bazelutil/staticcheckanalyzers/s1021", + "//build/bazelutil/staticcheckanalyzers/s1023", + "//build/bazelutil/staticcheckanalyzers/s1024", + "//build/bazelutil/staticcheckanalyzers/s1025", + "//build/bazelutil/staticcheckanalyzers/s1028", + "//build/bazelutil/staticcheckanalyzers/s1029", + "//build/bazelutil/staticcheckanalyzers/s1030", + "//build/bazelutil/staticcheckanalyzers/s1031", + "//build/bazelutil/staticcheckanalyzers/s1032", + "//build/bazelutil/staticcheckanalyzers/s1033", + "//build/bazelutil/staticcheckanalyzers/s1034", + "//build/bazelutil/staticcheckanalyzers/s1035", + "//build/bazelutil/staticcheckanalyzers/s1036", + "//build/bazelutil/staticcheckanalyzers/s1037", + "//build/bazelutil/staticcheckanalyzers/s1038", + "//build/bazelutil/staticcheckanalyzers/s1039", + "//build/bazelutil/staticcheckanalyzers/s1040", + "//build/bazelutil/staticcheckanalyzers/sa1000", + "//build/bazelutil/staticcheckanalyzers/sa1001", + "//build/bazelutil/staticcheckanalyzers/sa1002", + "//build/bazelutil/staticcheckanalyzers/sa1003", + "//build/bazelutil/staticcheckanalyzers/sa1004", + "//build/bazelutil/staticcheckanalyzers/sa1005", + "//build/bazelutil/staticcheckanalyzers/sa1006", + "//build/bazelutil/staticcheckanalyzers/sa1007", + "//build/bazelutil/staticcheckanalyzers/sa1008", + "//build/bazelutil/staticcheckanalyzers/sa1010", + "//build/bazelutil/staticcheckanalyzers/sa1011", + "//build/bazelutil/staticcheckanalyzers/sa1012", + "//build/bazelutil/staticcheckanalyzers/sa1013", + "//build/bazelutil/staticcheckanalyzers/sa1014", + "//build/bazelutil/staticcheckanalyzers/sa1015", + "//build/bazelutil/staticcheckanalyzers/sa1016", + "//build/bazelutil/staticcheckanalyzers/sa1017", + "//build/bazelutil/staticcheckanalyzers/sa1018", + "//build/bazelutil/staticcheckanalyzers/sa1019", + "//build/bazelutil/staticcheckanalyzers/sa1020", + "//build/bazelutil/staticcheckanalyzers/sa1021", + "//build/bazelutil/staticcheckanalyzers/sa1023", + "//build/bazelutil/staticcheckanalyzers/sa1024", + "//build/bazelutil/staticcheckanalyzers/sa1025", + "//build/bazelutil/staticcheckanalyzers/sa1026", + "//build/bazelutil/staticcheckanalyzers/sa1027", + "//build/bazelutil/staticcheckanalyzers/sa1028", + "//build/bazelutil/staticcheckanalyzers/sa1029", + "//build/bazelutil/staticcheckanalyzers/sa1030", + "//build/bazelutil/staticcheckanalyzers/sa2000", + "//build/bazelutil/staticcheckanalyzers/sa2001", + "//build/bazelutil/staticcheckanalyzers/sa2002", + "//build/bazelutil/staticcheckanalyzers/sa2003", + "//build/bazelutil/staticcheckanalyzers/sa3000", + "//build/bazelutil/staticcheckanalyzers/sa3001", + "//build/bazelutil/staticcheckanalyzers/sa4000", + "//build/bazelutil/staticcheckanalyzers/sa4001", + "//build/bazelutil/staticcheckanalyzers/sa4003", + "//build/bazelutil/staticcheckanalyzers/sa4004", + "//build/bazelutil/staticcheckanalyzers/sa4005", + "//build/bazelutil/staticcheckanalyzers/sa4006", + "//build/bazelutil/staticcheckanalyzers/sa4008", + "//build/bazelutil/staticcheckanalyzers/sa4009", + "//build/bazelutil/staticcheckanalyzers/sa4010", + "//build/bazelutil/staticcheckanalyzers/sa4011", + "//build/bazelutil/staticcheckanalyzers/sa4012", + "//build/bazelutil/staticcheckanalyzers/sa4013", + "//build/bazelutil/staticcheckanalyzers/sa4014", + "//build/bazelutil/staticcheckanalyzers/sa4015", + "//build/bazelutil/staticcheckanalyzers/sa4016", + "//build/bazelutil/staticcheckanalyzers/sa4017", + "//build/bazelutil/staticcheckanalyzers/sa4018", + "//build/bazelutil/staticcheckanalyzers/sa4019", + "//build/bazelutil/staticcheckanalyzers/sa4020", + "//build/bazelutil/staticcheckanalyzers/sa4021", + "//build/bazelutil/staticcheckanalyzers/sa4022", + "//build/bazelutil/staticcheckanalyzers/sa4023", + "//build/bazelutil/staticcheckanalyzers/sa4024", + "//build/bazelutil/staticcheckanalyzers/sa4025", + "//build/bazelutil/staticcheckanalyzers/sa4026", + "//build/bazelutil/staticcheckanalyzers/sa4027", + "//build/bazelutil/staticcheckanalyzers/sa5000", + "//build/bazelutil/staticcheckanalyzers/sa5001", + "//build/bazelutil/staticcheckanalyzers/sa5002", + "//build/bazelutil/staticcheckanalyzers/sa5003", + "//build/bazelutil/staticcheckanalyzers/sa5004", + "//build/bazelutil/staticcheckanalyzers/sa5005", + "//build/bazelutil/staticcheckanalyzers/sa5007", + "//build/bazelutil/staticcheckanalyzers/sa5008", + "//build/bazelutil/staticcheckanalyzers/sa5009", + "//build/bazelutil/staticcheckanalyzers/sa5010", + "//build/bazelutil/staticcheckanalyzers/sa5011", + "//build/bazelutil/staticcheckanalyzers/sa5012", + "//build/bazelutil/staticcheckanalyzers/sa6000", + "//build/bazelutil/staticcheckanalyzers/sa6001", + "//build/bazelutil/staticcheckanalyzers/sa6002", + "//build/bazelutil/staticcheckanalyzers/sa6003", + "//build/bazelutil/staticcheckanalyzers/sa6005", + "//build/bazelutil/staticcheckanalyzers/sa9001", + "//build/bazelutil/staticcheckanalyzers/sa9002", + "//build/bazelutil/staticcheckanalyzers/sa9003", + "//build/bazelutil/staticcheckanalyzers/sa9004", + "//build/bazelutil/staticcheckanalyzers/sa9005", + "//build/bazelutil/staticcheckanalyzers/sa9006", + "//build/bazelutil/staticcheckanalyzers/st1000", + "//build/bazelutil/staticcheckanalyzers/st1001", + "//build/bazelutil/staticcheckanalyzers/st1003", + "//build/bazelutil/staticcheckanalyzers/st1005", + "//build/bazelutil/staticcheckanalyzers/st1006", + "//build/bazelutil/staticcheckanalyzers/st1008", + "//build/bazelutil/staticcheckanalyzers/st1011", + "//build/bazelutil/staticcheckanalyzers/st1012", + "//build/bazelutil/staticcheckanalyzers/st1013", + "//build/bazelutil/staticcheckanalyzers/st1015", + "//build/bazelutil/staticcheckanalyzers/st1016", + "//build/bazelutil/staticcheckanalyzers/st1017", + "//build/bazelutil/staticcheckanalyzers/st1018", + "//build/bazelutil/staticcheckanalyzers/st1019", + "//build/bazelutil/staticcheckanalyzers/st1020", + "//build/bazelutil/staticcheckanalyzers/st1021", + "//build/bazelutil/staticcheckanalyzers/st1022", + "//build/bazelutil/staticcheckanalyzers/st1023", +] diff --git a/build/bazelutil/staticcheckanalyzers/s1000/BUILD.bazel b/build/bazelutil/staticcheckanalyzers/s1000/BUILD.bazel new file mode 100644 index 000000000000..96e279f3e950 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/s1000/BUILD.bazel @@ -0,0 +1,13 @@ +load("@io_bazel_rules_go//go:def.bzl", "go_library") + +go_library( + name = "s1000", + srcs = ["analyzer.go"], + importpath = "github.com/cockroachdb/cockroach/build/bazelutil/staticcheckanalyzers/s1000", + visibility = ["//visibility:public"], + deps = [ + "//pkg/testutils/lint/passes/staticcheck", + "@co_honnef_go_tools//simple", + "@org_golang_x_tools//go/analysis", + ], +) diff --git a/build/bazelutil/staticcheckanalyzers/s1000/analyzer.go b/build/bazelutil/staticcheckanalyzers/s1000/analyzer.go new file mode 100644 index 000000000000..873450b37983 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/s1000/analyzer.go @@ -0,0 +1,24 @@ +// Code generated by generate-staticcheck; DO NOT EDIT. + +//go:build bazel +// +build bazel + +package s1000 + +import ( + util "github.com/cockroachdb/cockroach/pkg/testutils/lint/passes/staticcheck" + "golang.org/x/tools/go/analysis" + "honnef.co/go/tools/simple" +) + +var Analyzer *analysis.Analyzer + +func init() { + for _, analyzer := range simple.Analyzers { + if analyzer.Analyzer.Name == "S1000" { + Analyzer = analyzer.Analyzer + break + } + } + util.MungeAnalyzer(Analyzer) +} diff --git a/build/bazelutil/staticcheckanalyzers/s1001/BUILD.bazel b/build/bazelutil/staticcheckanalyzers/s1001/BUILD.bazel new file mode 100644 index 000000000000..bd92983c2513 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/s1001/BUILD.bazel @@ -0,0 +1,13 @@ +load("@io_bazel_rules_go//go:def.bzl", "go_library") + +go_library( + name = "s1001", + srcs = ["analyzer.go"], + importpath = "github.com/cockroachdb/cockroach/build/bazelutil/staticcheckanalyzers/s1001", + visibility = ["//visibility:public"], + deps = [ + "//pkg/testutils/lint/passes/staticcheck", + "@co_honnef_go_tools//simple", + "@org_golang_x_tools//go/analysis", + ], +) diff --git a/build/bazelutil/staticcheckanalyzers/s1001/analyzer.go b/build/bazelutil/staticcheckanalyzers/s1001/analyzer.go new file mode 100644 index 000000000000..48a87bf68ae2 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/s1001/analyzer.go @@ -0,0 +1,24 @@ +// Code generated by generate-staticcheck; DO NOT EDIT. + +//go:build bazel +// +build bazel + +package s1001 + +import ( + util "github.com/cockroachdb/cockroach/pkg/testutils/lint/passes/staticcheck" + "golang.org/x/tools/go/analysis" + "honnef.co/go/tools/simple" +) + +var Analyzer *analysis.Analyzer + +func init() { + for _, analyzer := range simple.Analyzers { + if analyzer.Analyzer.Name == "S1001" { + Analyzer = analyzer.Analyzer + break + } + } + util.MungeAnalyzer(Analyzer) +} diff --git a/build/bazelutil/staticcheckanalyzers/s1002/BUILD.bazel b/build/bazelutil/staticcheckanalyzers/s1002/BUILD.bazel new file mode 100644 index 000000000000..c1f72e380e41 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/s1002/BUILD.bazel @@ -0,0 +1,13 @@ +load("@io_bazel_rules_go//go:def.bzl", "go_library") + +go_library( + name = "s1002", + srcs = ["analyzer.go"], + importpath = "github.com/cockroachdb/cockroach/build/bazelutil/staticcheckanalyzers/s1002", + visibility = ["//visibility:public"], + deps = [ + "//pkg/testutils/lint/passes/staticcheck", + "@co_honnef_go_tools//simple", + "@org_golang_x_tools//go/analysis", + ], +) diff --git a/build/bazelutil/staticcheckanalyzers/s1002/analyzer.go b/build/bazelutil/staticcheckanalyzers/s1002/analyzer.go new file mode 100644 index 000000000000..f09edb662c6a --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/s1002/analyzer.go @@ -0,0 +1,24 @@ +// Code generated by generate-staticcheck; DO NOT EDIT. + +//go:build bazel +// +build bazel + +package s1002 + +import ( + util "github.com/cockroachdb/cockroach/pkg/testutils/lint/passes/staticcheck" + "golang.org/x/tools/go/analysis" + "honnef.co/go/tools/simple" +) + +var Analyzer *analysis.Analyzer + +func init() { + for _, analyzer := range simple.Analyzers { + if analyzer.Analyzer.Name == "S1002" { + Analyzer = analyzer.Analyzer + break + } + } + util.MungeAnalyzer(Analyzer) +} diff --git a/build/bazelutil/staticcheckanalyzers/s1003/BUILD.bazel b/build/bazelutil/staticcheckanalyzers/s1003/BUILD.bazel new file mode 100644 index 000000000000..1aaac650a5fa --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/s1003/BUILD.bazel @@ -0,0 +1,13 @@ +load("@io_bazel_rules_go//go:def.bzl", "go_library") + +go_library( + name = "s1003", + srcs = ["analyzer.go"], + importpath = "github.com/cockroachdb/cockroach/build/bazelutil/staticcheckanalyzers/s1003", + visibility = ["//visibility:public"], + deps = [ + "//pkg/testutils/lint/passes/staticcheck", + "@co_honnef_go_tools//simple", + "@org_golang_x_tools//go/analysis", + ], +) diff --git a/build/bazelutil/staticcheckanalyzers/s1003/analyzer.go b/build/bazelutil/staticcheckanalyzers/s1003/analyzer.go new file mode 100644 index 000000000000..55946edc1117 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/s1003/analyzer.go @@ -0,0 +1,24 @@ +// Code generated by generate-staticcheck; DO NOT EDIT. + +//go:build bazel +// +build bazel + +package s1003 + +import ( + util "github.com/cockroachdb/cockroach/pkg/testutils/lint/passes/staticcheck" + "golang.org/x/tools/go/analysis" + "honnef.co/go/tools/simple" +) + +var Analyzer *analysis.Analyzer + +func init() { + for _, analyzer := range simple.Analyzers { + if analyzer.Analyzer.Name == "S1003" { + Analyzer = analyzer.Analyzer + break + } + } + util.MungeAnalyzer(Analyzer) +} diff --git a/build/bazelutil/staticcheckanalyzers/s1004/BUILD.bazel b/build/bazelutil/staticcheckanalyzers/s1004/BUILD.bazel new file mode 100644 index 000000000000..653a9456806c --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/s1004/BUILD.bazel @@ -0,0 +1,13 @@ +load("@io_bazel_rules_go//go:def.bzl", "go_library") + +go_library( + name = "s1004", + srcs = ["analyzer.go"], + importpath = "github.com/cockroachdb/cockroach/build/bazelutil/staticcheckanalyzers/s1004", + visibility = ["//visibility:public"], + deps = [ + "//pkg/testutils/lint/passes/staticcheck", + "@co_honnef_go_tools//simple", + "@org_golang_x_tools//go/analysis", + ], +) diff --git a/build/bazelutil/staticcheckanalyzers/s1004/analyzer.go b/build/bazelutil/staticcheckanalyzers/s1004/analyzer.go new file mode 100644 index 000000000000..fae3860850c8 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/s1004/analyzer.go @@ -0,0 +1,24 @@ +// Code generated by generate-staticcheck; DO NOT EDIT. + +//go:build bazel +// +build bazel + +package s1004 + +import ( + util "github.com/cockroachdb/cockroach/pkg/testutils/lint/passes/staticcheck" + "golang.org/x/tools/go/analysis" + "honnef.co/go/tools/simple" +) + +var Analyzer *analysis.Analyzer + +func init() { + for _, analyzer := range simple.Analyzers { + if analyzer.Analyzer.Name == "S1004" { + Analyzer = analyzer.Analyzer + break + } + } + util.MungeAnalyzer(Analyzer) +} diff --git a/build/bazelutil/staticcheckanalyzers/s1005/BUILD.bazel b/build/bazelutil/staticcheckanalyzers/s1005/BUILD.bazel new file mode 100644 index 000000000000..9fb5c1a7eb63 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/s1005/BUILD.bazel @@ -0,0 +1,13 @@ +load("@io_bazel_rules_go//go:def.bzl", "go_library") + +go_library( + name = "s1005", + srcs = ["analyzer.go"], + importpath = "github.com/cockroachdb/cockroach/build/bazelutil/staticcheckanalyzers/s1005", + visibility = ["//visibility:public"], + deps = [ + "//pkg/testutils/lint/passes/staticcheck", + "@co_honnef_go_tools//simple", + "@org_golang_x_tools//go/analysis", + ], +) diff --git a/build/bazelutil/staticcheckanalyzers/s1005/analyzer.go b/build/bazelutil/staticcheckanalyzers/s1005/analyzer.go new file mode 100644 index 000000000000..575023ad6910 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/s1005/analyzer.go @@ -0,0 +1,24 @@ +// Code generated by generate-staticcheck; DO NOT EDIT. + +//go:build bazel +// +build bazel + +package s1005 + +import ( + util "github.com/cockroachdb/cockroach/pkg/testutils/lint/passes/staticcheck" + "golang.org/x/tools/go/analysis" + "honnef.co/go/tools/simple" +) + +var Analyzer *analysis.Analyzer + +func init() { + for _, analyzer := range simple.Analyzers { + if analyzer.Analyzer.Name == "S1005" { + Analyzer = analyzer.Analyzer + break + } + } + util.MungeAnalyzer(Analyzer) +} diff --git a/build/bazelutil/staticcheckanalyzers/s1006/BUILD.bazel b/build/bazelutil/staticcheckanalyzers/s1006/BUILD.bazel new file mode 100644 index 000000000000..712621889385 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/s1006/BUILD.bazel @@ -0,0 +1,13 @@ +load("@io_bazel_rules_go//go:def.bzl", "go_library") + +go_library( + name = "s1006", + srcs = ["analyzer.go"], + importpath = "github.com/cockroachdb/cockroach/build/bazelutil/staticcheckanalyzers/s1006", + visibility = ["//visibility:public"], + deps = [ + "//pkg/testutils/lint/passes/staticcheck", + "@co_honnef_go_tools//simple", + "@org_golang_x_tools//go/analysis", + ], +) diff --git a/build/bazelutil/staticcheckanalyzers/s1006/analyzer.go b/build/bazelutil/staticcheckanalyzers/s1006/analyzer.go new file mode 100644 index 000000000000..4e6d35a1aa63 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/s1006/analyzer.go @@ -0,0 +1,24 @@ +// Code generated by generate-staticcheck; DO NOT EDIT. + +//go:build bazel +// +build bazel + +package s1006 + +import ( + util "github.com/cockroachdb/cockroach/pkg/testutils/lint/passes/staticcheck" + "golang.org/x/tools/go/analysis" + "honnef.co/go/tools/simple" +) + +var Analyzer *analysis.Analyzer + +func init() { + for _, analyzer := range simple.Analyzers { + if analyzer.Analyzer.Name == "S1006" { + Analyzer = analyzer.Analyzer + break + } + } + util.MungeAnalyzer(Analyzer) +} diff --git a/build/bazelutil/staticcheckanalyzers/s1007/BUILD.bazel b/build/bazelutil/staticcheckanalyzers/s1007/BUILD.bazel new file mode 100644 index 000000000000..9533db0316d2 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/s1007/BUILD.bazel @@ -0,0 +1,13 @@ +load("@io_bazel_rules_go//go:def.bzl", "go_library") + +go_library( + name = "s1007", + srcs = ["analyzer.go"], + importpath = "github.com/cockroachdb/cockroach/build/bazelutil/staticcheckanalyzers/s1007", + visibility = ["//visibility:public"], + deps = [ + "//pkg/testutils/lint/passes/staticcheck", + "@co_honnef_go_tools//simple", + "@org_golang_x_tools//go/analysis", + ], +) diff --git a/build/bazelutil/staticcheckanalyzers/s1007/analyzer.go b/build/bazelutil/staticcheckanalyzers/s1007/analyzer.go new file mode 100644 index 000000000000..72f893353669 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/s1007/analyzer.go @@ -0,0 +1,24 @@ +// Code generated by generate-staticcheck; DO NOT EDIT. + +//go:build bazel +// +build bazel + +package s1007 + +import ( + util "github.com/cockroachdb/cockroach/pkg/testutils/lint/passes/staticcheck" + "golang.org/x/tools/go/analysis" + "honnef.co/go/tools/simple" +) + +var Analyzer *analysis.Analyzer + +func init() { + for _, analyzer := range simple.Analyzers { + if analyzer.Analyzer.Name == "S1007" { + Analyzer = analyzer.Analyzer + break + } + } + util.MungeAnalyzer(Analyzer) +} diff --git a/build/bazelutil/staticcheckanalyzers/s1008/BUILD.bazel b/build/bazelutil/staticcheckanalyzers/s1008/BUILD.bazel new file mode 100644 index 000000000000..7b794b9c4280 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/s1008/BUILD.bazel @@ -0,0 +1,13 @@ +load("@io_bazel_rules_go//go:def.bzl", "go_library") + +go_library( + name = "s1008", + srcs = ["analyzer.go"], + importpath = "github.com/cockroachdb/cockroach/build/bazelutil/staticcheckanalyzers/s1008", + visibility = ["//visibility:public"], + deps = [ + "//pkg/testutils/lint/passes/staticcheck", + "@co_honnef_go_tools//simple", + "@org_golang_x_tools//go/analysis", + ], +) diff --git a/build/bazelutil/staticcheckanalyzers/s1008/analyzer.go b/build/bazelutil/staticcheckanalyzers/s1008/analyzer.go new file mode 100644 index 000000000000..c74632c326a8 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/s1008/analyzer.go @@ -0,0 +1,24 @@ +// Code generated by generate-staticcheck; DO NOT EDIT. + +//go:build bazel +// +build bazel + +package s1008 + +import ( + util "github.com/cockroachdb/cockroach/pkg/testutils/lint/passes/staticcheck" + "golang.org/x/tools/go/analysis" + "honnef.co/go/tools/simple" +) + +var Analyzer *analysis.Analyzer + +func init() { + for _, analyzer := range simple.Analyzers { + if analyzer.Analyzer.Name == "S1008" { + Analyzer = analyzer.Analyzer + break + } + } + util.MungeAnalyzer(Analyzer) +} diff --git a/build/bazelutil/staticcheckanalyzers/s1009/BUILD.bazel b/build/bazelutil/staticcheckanalyzers/s1009/BUILD.bazel new file mode 100644 index 000000000000..de68c1e43112 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/s1009/BUILD.bazel @@ -0,0 +1,13 @@ +load("@io_bazel_rules_go//go:def.bzl", "go_library") + +go_library( + name = "s1009", + srcs = ["analyzer.go"], + importpath = "github.com/cockroachdb/cockroach/build/bazelutil/staticcheckanalyzers/s1009", + visibility = ["//visibility:public"], + deps = [ + "//pkg/testutils/lint/passes/staticcheck", + "@co_honnef_go_tools//simple", + "@org_golang_x_tools//go/analysis", + ], +) diff --git a/build/bazelutil/staticcheckanalyzers/s1009/analyzer.go b/build/bazelutil/staticcheckanalyzers/s1009/analyzer.go new file mode 100644 index 000000000000..0607068f3161 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/s1009/analyzer.go @@ -0,0 +1,24 @@ +// Code generated by generate-staticcheck; DO NOT EDIT. + +//go:build bazel +// +build bazel + +package s1009 + +import ( + util "github.com/cockroachdb/cockroach/pkg/testutils/lint/passes/staticcheck" + "golang.org/x/tools/go/analysis" + "honnef.co/go/tools/simple" +) + +var Analyzer *analysis.Analyzer + +func init() { + for _, analyzer := range simple.Analyzers { + if analyzer.Analyzer.Name == "S1009" { + Analyzer = analyzer.Analyzer + break + } + } + util.MungeAnalyzer(Analyzer) +} diff --git a/build/bazelutil/staticcheckanalyzers/s1010/BUILD.bazel b/build/bazelutil/staticcheckanalyzers/s1010/BUILD.bazel new file mode 100644 index 000000000000..046c5396c388 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/s1010/BUILD.bazel @@ -0,0 +1,13 @@ +load("@io_bazel_rules_go//go:def.bzl", "go_library") + +go_library( + name = "s1010", + srcs = ["analyzer.go"], + importpath = "github.com/cockroachdb/cockroach/build/bazelutil/staticcheckanalyzers/s1010", + visibility = ["//visibility:public"], + deps = [ + "//pkg/testutils/lint/passes/staticcheck", + "@co_honnef_go_tools//simple", + "@org_golang_x_tools//go/analysis", + ], +) diff --git a/build/bazelutil/staticcheckanalyzers/s1010/analyzer.go b/build/bazelutil/staticcheckanalyzers/s1010/analyzer.go new file mode 100644 index 000000000000..ca2f98aef586 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/s1010/analyzer.go @@ -0,0 +1,24 @@ +// Code generated by generate-staticcheck; DO NOT EDIT. + +//go:build bazel +// +build bazel + +package s1010 + +import ( + util "github.com/cockroachdb/cockroach/pkg/testutils/lint/passes/staticcheck" + "golang.org/x/tools/go/analysis" + "honnef.co/go/tools/simple" +) + +var Analyzer *analysis.Analyzer + +func init() { + for _, analyzer := range simple.Analyzers { + if analyzer.Analyzer.Name == "S1010" { + Analyzer = analyzer.Analyzer + break + } + } + util.MungeAnalyzer(Analyzer) +} diff --git a/build/bazelutil/staticcheckanalyzers/s1011/BUILD.bazel b/build/bazelutil/staticcheckanalyzers/s1011/BUILD.bazel new file mode 100644 index 000000000000..c6812b7ac267 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/s1011/BUILD.bazel @@ -0,0 +1,13 @@ +load("@io_bazel_rules_go//go:def.bzl", "go_library") + +go_library( + name = "s1011", + srcs = ["analyzer.go"], + importpath = "github.com/cockroachdb/cockroach/build/bazelutil/staticcheckanalyzers/s1011", + visibility = ["//visibility:public"], + deps = [ + "//pkg/testutils/lint/passes/staticcheck", + "@co_honnef_go_tools//simple", + "@org_golang_x_tools//go/analysis", + ], +) diff --git a/build/bazelutil/staticcheckanalyzers/s1011/analyzer.go b/build/bazelutil/staticcheckanalyzers/s1011/analyzer.go new file mode 100644 index 000000000000..d740d277d985 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/s1011/analyzer.go @@ -0,0 +1,24 @@ +// Code generated by generate-staticcheck; DO NOT EDIT. + +//go:build bazel +// +build bazel + +package s1011 + +import ( + util "github.com/cockroachdb/cockroach/pkg/testutils/lint/passes/staticcheck" + "golang.org/x/tools/go/analysis" + "honnef.co/go/tools/simple" +) + +var Analyzer *analysis.Analyzer + +func init() { + for _, analyzer := range simple.Analyzers { + if analyzer.Analyzer.Name == "S1011" { + Analyzer = analyzer.Analyzer + break + } + } + util.MungeAnalyzer(Analyzer) +} diff --git a/build/bazelutil/staticcheckanalyzers/s1012/BUILD.bazel b/build/bazelutil/staticcheckanalyzers/s1012/BUILD.bazel new file mode 100644 index 000000000000..7dbd0d558a3c --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/s1012/BUILD.bazel @@ -0,0 +1,13 @@ +load("@io_bazel_rules_go//go:def.bzl", "go_library") + +go_library( + name = "s1012", + srcs = ["analyzer.go"], + importpath = "github.com/cockroachdb/cockroach/build/bazelutil/staticcheckanalyzers/s1012", + visibility = ["//visibility:public"], + deps = [ + "//pkg/testutils/lint/passes/staticcheck", + "@co_honnef_go_tools//simple", + "@org_golang_x_tools//go/analysis", + ], +) diff --git a/build/bazelutil/staticcheckanalyzers/s1012/analyzer.go b/build/bazelutil/staticcheckanalyzers/s1012/analyzer.go new file mode 100644 index 000000000000..3161722226f2 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/s1012/analyzer.go @@ -0,0 +1,24 @@ +// Code generated by generate-staticcheck; DO NOT EDIT. + +//go:build bazel +// +build bazel + +package s1012 + +import ( + util "github.com/cockroachdb/cockroach/pkg/testutils/lint/passes/staticcheck" + "golang.org/x/tools/go/analysis" + "honnef.co/go/tools/simple" +) + +var Analyzer *analysis.Analyzer + +func init() { + for _, analyzer := range simple.Analyzers { + if analyzer.Analyzer.Name == "S1012" { + Analyzer = analyzer.Analyzer + break + } + } + util.MungeAnalyzer(Analyzer) +} diff --git a/build/bazelutil/staticcheckanalyzers/s1016/BUILD.bazel b/build/bazelutil/staticcheckanalyzers/s1016/BUILD.bazel new file mode 100644 index 000000000000..a1667919777c --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/s1016/BUILD.bazel @@ -0,0 +1,13 @@ +load("@io_bazel_rules_go//go:def.bzl", "go_library") + +go_library( + name = "s1016", + srcs = ["analyzer.go"], + importpath = "github.com/cockroachdb/cockroach/build/bazelutil/staticcheckanalyzers/s1016", + visibility = ["//visibility:public"], + deps = [ + "//pkg/testutils/lint/passes/staticcheck", + "@co_honnef_go_tools//simple", + "@org_golang_x_tools//go/analysis", + ], +) diff --git a/build/bazelutil/staticcheckanalyzers/s1016/analyzer.go b/build/bazelutil/staticcheckanalyzers/s1016/analyzer.go new file mode 100644 index 000000000000..5897bdd06e27 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/s1016/analyzer.go @@ -0,0 +1,24 @@ +// Code generated by generate-staticcheck; DO NOT EDIT. + +//go:build bazel +// +build bazel + +package s1016 + +import ( + util "github.com/cockroachdb/cockroach/pkg/testutils/lint/passes/staticcheck" + "golang.org/x/tools/go/analysis" + "honnef.co/go/tools/simple" +) + +var Analyzer *analysis.Analyzer + +func init() { + for _, analyzer := range simple.Analyzers { + if analyzer.Analyzer.Name == "S1016" { + Analyzer = analyzer.Analyzer + break + } + } + util.MungeAnalyzer(Analyzer) +} diff --git a/build/bazelutil/staticcheckanalyzers/s1017/BUILD.bazel b/build/bazelutil/staticcheckanalyzers/s1017/BUILD.bazel new file mode 100644 index 000000000000..3969c0c1817c --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/s1017/BUILD.bazel @@ -0,0 +1,13 @@ +load("@io_bazel_rules_go//go:def.bzl", "go_library") + +go_library( + name = "s1017", + srcs = ["analyzer.go"], + importpath = "github.com/cockroachdb/cockroach/build/bazelutil/staticcheckanalyzers/s1017", + visibility = ["//visibility:public"], + deps = [ + "//pkg/testutils/lint/passes/staticcheck", + "@co_honnef_go_tools//simple", + "@org_golang_x_tools//go/analysis", + ], +) diff --git a/build/bazelutil/staticcheckanalyzers/s1017/analyzer.go b/build/bazelutil/staticcheckanalyzers/s1017/analyzer.go new file mode 100644 index 000000000000..e6e1d287208e --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/s1017/analyzer.go @@ -0,0 +1,24 @@ +// Code generated by generate-staticcheck; DO NOT EDIT. + +//go:build bazel +// +build bazel + +package s1017 + +import ( + util "github.com/cockroachdb/cockroach/pkg/testutils/lint/passes/staticcheck" + "golang.org/x/tools/go/analysis" + "honnef.co/go/tools/simple" +) + +var Analyzer *analysis.Analyzer + +func init() { + for _, analyzer := range simple.Analyzers { + if analyzer.Analyzer.Name == "S1017" { + Analyzer = analyzer.Analyzer + break + } + } + util.MungeAnalyzer(Analyzer) +} diff --git a/build/bazelutil/staticcheckanalyzers/s1018/BUILD.bazel b/build/bazelutil/staticcheckanalyzers/s1018/BUILD.bazel new file mode 100644 index 000000000000..f5e0dfa3749d --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/s1018/BUILD.bazel @@ -0,0 +1,13 @@ +load("@io_bazel_rules_go//go:def.bzl", "go_library") + +go_library( + name = "s1018", + srcs = ["analyzer.go"], + importpath = "github.com/cockroachdb/cockroach/build/bazelutil/staticcheckanalyzers/s1018", + visibility = ["//visibility:public"], + deps = [ + "//pkg/testutils/lint/passes/staticcheck", + "@co_honnef_go_tools//simple", + "@org_golang_x_tools//go/analysis", + ], +) diff --git a/build/bazelutil/staticcheckanalyzers/s1018/analyzer.go b/build/bazelutil/staticcheckanalyzers/s1018/analyzer.go new file mode 100644 index 000000000000..ddc0a87f404d --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/s1018/analyzer.go @@ -0,0 +1,24 @@ +// Code generated by generate-staticcheck; DO NOT EDIT. + +//go:build bazel +// +build bazel + +package s1018 + +import ( + util "github.com/cockroachdb/cockroach/pkg/testutils/lint/passes/staticcheck" + "golang.org/x/tools/go/analysis" + "honnef.co/go/tools/simple" +) + +var Analyzer *analysis.Analyzer + +func init() { + for _, analyzer := range simple.Analyzers { + if analyzer.Analyzer.Name == "S1018" { + Analyzer = analyzer.Analyzer + break + } + } + util.MungeAnalyzer(Analyzer) +} diff --git a/build/bazelutil/staticcheckanalyzers/s1019/BUILD.bazel b/build/bazelutil/staticcheckanalyzers/s1019/BUILD.bazel new file mode 100644 index 000000000000..0a7664167ab7 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/s1019/BUILD.bazel @@ -0,0 +1,13 @@ +load("@io_bazel_rules_go//go:def.bzl", "go_library") + +go_library( + name = "s1019", + srcs = ["analyzer.go"], + importpath = "github.com/cockroachdb/cockroach/build/bazelutil/staticcheckanalyzers/s1019", + visibility = ["//visibility:public"], + deps = [ + "//pkg/testutils/lint/passes/staticcheck", + "@co_honnef_go_tools//simple", + "@org_golang_x_tools//go/analysis", + ], +) diff --git a/build/bazelutil/staticcheckanalyzers/s1019/analyzer.go b/build/bazelutil/staticcheckanalyzers/s1019/analyzer.go new file mode 100644 index 000000000000..c937e7107dd6 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/s1019/analyzer.go @@ -0,0 +1,24 @@ +// Code generated by generate-staticcheck; DO NOT EDIT. + +//go:build bazel +// +build bazel + +package s1019 + +import ( + util "github.com/cockroachdb/cockroach/pkg/testutils/lint/passes/staticcheck" + "golang.org/x/tools/go/analysis" + "honnef.co/go/tools/simple" +) + +var Analyzer *analysis.Analyzer + +func init() { + for _, analyzer := range simple.Analyzers { + if analyzer.Analyzer.Name == "S1019" { + Analyzer = analyzer.Analyzer + break + } + } + util.MungeAnalyzer(Analyzer) +} diff --git a/build/bazelutil/staticcheckanalyzers/s1020/BUILD.bazel b/build/bazelutil/staticcheckanalyzers/s1020/BUILD.bazel new file mode 100644 index 000000000000..80ed8d7b2980 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/s1020/BUILD.bazel @@ -0,0 +1,13 @@ +load("@io_bazel_rules_go//go:def.bzl", "go_library") + +go_library( + name = "s1020", + srcs = ["analyzer.go"], + importpath = "github.com/cockroachdb/cockroach/build/bazelutil/staticcheckanalyzers/s1020", + visibility = ["//visibility:public"], + deps = [ + "//pkg/testutils/lint/passes/staticcheck", + "@co_honnef_go_tools//simple", + "@org_golang_x_tools//go/analysis", + ], +) diff --git a/build/bazelutil/staticcheckanalyzers/s1020/analyzer.go b/build/bazelutil/staticcheckanalyzers/s1020/analyzer.go new file mode 100644 index 000000000000..c19f5464fe44 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/s1020/analyzer.go @@ -0,0 +1,24 @@ +// Code generated by generate-staticcheck; DO NOT EDIT. + +//go:build bazel +// +build bazel + +package s1020 + +import ( + util "github.com/cockroachdb/cockroach/pkg/testutils/lint/passes/staticcheck" + "golang.org/x/tools/go/analysis" + "honnef.co/go/tools/simple" +) + +var Analyzer *analysis.Analyzer + +func init() { + for _, analyzer := range simple.Analyzers { + if analyzer.Analyzer.Name == "S1020" { + Analyzer = analyzer.Analyzer + break + } + } + util.MungeAnalyzer(Analyzer) +} diff --git a/build/bazelutil/staticcheckanalyzers/s1021/BUILD.bazel b/build/bazelutil/staticcheckanalyzers/s1021/BUILD.bazel new file mode 100644 index 000000000000..dec08b6c1360 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/s1021/BUILD.bazel @@ -0,0 +1,13 @@ +load("@io_bazel_rules_go//go:def.bzl", "go_library") + +go_library( + name = "s1021", + srcs = ["analyzer.go"], + importpath = "github.com/cockroachdb/cockroach/build/bazelutil/staticcheckanalyzers/s1021", + visibility = ["//visibility:public"], + deps = [ + "//pkg/testutils/lint/passes/staticcheck", + "@co_honnef_go_tools//simple", + "@org_golang_x_tools//go/analysis", + ], +) diff --git a/build/bazelutil/staticcheckanalyzers/s1021/analyzer.go b/build/bazelutil/staticcheckanalyzers/s1021/analyzer.go new file mode 100644 index 000000000000..48f9c71e810c --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/s1021/analyzer.go @@ -0,0 +1,24 @@ +// Code generated by generate-staticcheck; DO NOT EDIT. + +//go:build bazel +// +build bazel + +package s1021 + +import ( + util "github.com/cockroachdb/cockroach/pkg/testutils/lint/passes/staticcheck" + "golang.org/x/tools/go/analysis" + "honnef.co/go/tools/simple" +) + +var Analyzer *analysis.Analyzer + +func init() { + for _, analyzer := range simple.Analyzers { + if analyzer.Analyzer.Name == "S1021" { + Analyzer = analyzer.Analyzer + break + } + } + util.MungeAnalyzer(Analyzer) +} diff --git a/build/bazelutil/staticcheckanalyzers/s1023/BUILD.bazel b/build/bazelutil/staticcheckanalyzers/s1023/BUILD.bazel new file mode 100644 index 000000000000..dd28f453c532 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/s1023/BUILD.bazel @@ -0,0 +1,13 @@ +load("@io_bazel_rules_go//go:def.bzl", "go_library") + +go_library( + name = "s1023", + srcs = ["analyzer.go"], + importpath = "github.com/cockroachdb/cockroach/build/bazelutil/staticcheckanalyzers/s1023", + visibility = ["//visibility:public"], + deps = [ + "//pkg/testutils/lint/passes/staticcheck", + "@co_honnef_go_tools//simple", + "@org_golang_x_tools//go/analysis", + ], +) diff --git a/build/bazelutil/staticcheckanalyzers/s1023/analyzer.go b/build/bazelutil/staticcheckanalyzers/s1023/analyzer.go new file mode 100644 index 000000000000..ef98962c876a --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/s1023/analyzer.go @@ -0,0 +1,24 @@ +// Code generated by generate-staticcheck; DO NOT EDIT. + +//go:build bazel +// +build bazel + +package s1023 + +import ( + util "github.com/cockroachdb/cockroach/pkg/testutils/lint/passes/staticcheck" + "golang.org/x/tools/go/analysis" + "honnef.co/go/tools/simple" +) + +var Analyzer *analysis.Analyzer + +func init() { + for _, analyzer := range simple.Analyzers { + if analyzer.Analyzer.Name == "S1023" { + Analyzer = analyzer.Analyzer + break + } + } + util.MungeAnalyzer(Analyzer) +} diff --git a/build/bazelutil/staticcheckanalyzers/s1024/BUILD.bazel b/build/bazelutil/staticcheckanalyzers/s1024/BUILD.bazel new file mode 100644 index 000000000000..6f1b1f4e3a4a --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/s1024/BUILD.bazel @@ -0,0 +1,13 @@ +load("@io_bazel_rules_go//go:def.bzl", "go_library") + +go_library( + name = "s1024", + srcs = ["analyzer.go"], + importpath = "github.com/cockroachdb/cockroach/build/bazelutil/staticcheckanalyzers/s1024", + visibility = ["//visibility:public"], + deps = [ + "//pkg/testutils/lint/passes/staticcheck", + "@co_honnef_go_tools//simple", + "@org_golang_x_tools//go/analysis", + ], +) diff --git a/build/bazelutil/staticcheckanalyzers/s1024/analyzer.go b/build/bazelutil/staticcheckanalyzers/s1024/analyzer.go new file mode 100644 index 000000000000..f656e83fff10 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/s1024/analyzer.go @@ -0,0 +1,24 @@ +// Code generated by generate-staticcheck; DO NOT EDIT. + +//go:build bazel +// +build bazel + +package s1024 + +import ( + util "github.com/cockroachdb/cockroach/pkg/testutils/lint/passes/staticcheck" + "golang.org/x/tools/go/analysis" + "honnef.co/go/tools/simple" +) + +var Analyzer *analysis.Analyzer + +func init() { + for _, analyzer := range simple.Analyzers { + if analyzer.Analyzer.Name == "S1024" { + Analyzer = analyzer.Analyzer + break + } + } + util.MungeAnalyzer(Analyzer) +} diff --git a/build/bazelutil/staticcheckanalyzers/s1025/BUILD.bazel b/build/bazelutil/staticcheckanalyzers/s1025/BUILD.bazel new file mode 100644 index 000000000000..4b82a5192d08 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/s1025/BUILD.bazel @@ -0,0 +1,13 @@ +load("@io_bazel_rules_go//go:def.bzl", "go_library") + +go_library( + name = "s1025", + srcs = ["analyzer.go"], + importpath = "github.com/cockroachdb/cockroach/build/bazelutil/staticcheckanalyzers/s1025", + visibility = ["//visibility:public"], + deps = [ + "//pkg/testutils/lint/passes/staticcheck", + "@co_honnef_go_tools//simple", + "@org_golang_x_tools//go/analysis", + ], +) diff --git a/build/bazelutil/staticcheckanalyzers/s1025/analyzer.go b/build/bazelutil/staticcheckanalyzers/s1025/analyzer.go new file mode 100644 index 000000000000..b410282c94f9 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/s1025/analyzer.go @@ -0,0 +1,24 @@ +// Code generated by generate-staticcheck; DO NOT EDIT. + +//go:build bazel +// +build bazel + +package s1025 + +import ( + util "github.com/cockroachdb/cockroach/pkg/testutils/lint/passes/staticcheck" + "golang.org/x/tools/go/analysis" + "honnef.co/go/tools/simple" +) + +var Analyzer *analysis.Analyzer + +func init() { + for _, analyzer := range simple.Analyzers { + if analyzer.Analyzer.Name == "S1025" { + Analyzer = analyzer.Analyzer + break + } + } + util.MungeAnalyzer(Analyzer) +} diff --git a/build/bazelutil/staticcheckanalyzers/s1028/BUILD.bazel b/build/bazelutil/staticcheckanalyzers/s1028/BUILD.bazel new file mode 100644 index 000000000000..f08aecab60db --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/s1028/BUILD.bazel @@ -0,0 +1,13 @@ +load("@io_bazel_rules_go//go:def.bzl", "go_library") + +go_library( + name = "s1028", + srcs = ["analyzer.go"], + importpath = "github.com/cockroachdb/cockroach/build/bazelutil/staticcheckanalyzers/s1028", + visibility = ["//visibility:public"], + deps = [ + "//pkg/testutils/lint/passes/staticcheck", + "@co_honnef_go_tools//simple", + "@org_golang_x_tools//go/analysis", + ], +) diff --git a/build/bazelutil/staticcheckanalyzers/s1028/analyzer.go b/build/bazelutil/staticcheckanalyzers/s1028/analyzer.go new file mode 100644 index 000000000000..9567d6fd466d --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/s1028/analyzer.go @@ -0,0 +1,24 @@ +// Code generated by generate-staticcheck; DO NOT EDIT. + +//go:build bazel +// +build bazel + +package s1028 + +import ( + util "github.com/cockroachdb/cockroach/pkg/testutils/lint/passes/staticcheck" + "golang.org/x/tools/go/analysis" + "honnef.co/go/tools/simple" +) + +var Analyzer *analysis.Analyzer + +func init() { + for _, analyzer := range simple.Analyzers { + if analyzer.Analyzer.Name == "S1028" { + Analyzer = analyzer.Analyzer + break + } + } + util.MungeAnalyzer(Analyzer) +} diff --git a/build/bazelutil/staticcheckanalyzers/s1029/BUILD.bazel b/build/bazelutil/staticcheckanalyzers/s1029/BUILD.bazel new file mode 100644 index 000000000000..997a930bedf8 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/s1029/BUILD.bazel @@ -0,0 +1,13 @@ +load("@io_bazel_rules_go//go:def.bzl", "go_library") + +go_library( + name = "s1029", + srcs = ["analyzer.go"], + importpath = "github.com/cockroachdb/cockroach/build/bazelutil/staticcheckanalyzers/s1029", + visibility = ["//visibility:public"], + deps = [ + "//pkg/testutils/lint/passes/staticcheck", + "@co_honnef_go_tools//simple", + "@org_golang_x_tools//go/analysis", + ], +) diff --git a/build/bazelutil/staticcheckanalyzers/s1029/analyzer.go b/build/bazelutil/staticcheckanalyzers/s1029/analyzer.go new file mode 100644 index 000000000000..ff97319c229f --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/s1029/analyzer.go @@ -0,0 +1,24 @@ +// Code generated by generate-staticcheck; DO NOT EDIT. + +//go:build bazel +// +build bazel + +package s1029 + +import ( + util "github.com/cockroachdb/cockroach/pkg/testutils/lint/passes/staticcheck" + "golang.org/x/tools/go/analysis" + "honnef.co/go/tools/simple" +) + +var Analyzer *analysis.Analyzer + +func init() { + for _, analyzer := range simple.Analyzers { + if analyzer.Analyzer.Name == "S1029" { + Analyzer = analyzer.Analyzer + break + } + } + util.MungeAnalyzer(Analyzer) +} diff --git a/build/bazelutil/staticcheckanalyzers/s1030/BUILD.bazel b/build/bazelutil/staticcheckanalyzers/s1030/BUILD.bazel new file mode 100644 index 000000000000..d61906987926 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/s1030/BUILD.bazel @@ -0,0 +1,13 @@ +load("@io_bazel_rules_go//go:def.bzl", "go_library") + +go_library( + name = "s1030", + srcs = ["analyzer.go"], + importpath = "github.com/cockroachdb/cockroach/build/bazelutil/staticcheckanalyzers/s1030", + visibility = ["//visibility:public"], + deps = [ + "//pkg/testutils/lint/passes/staticcheck", + "@co_honnef_go_tools//simple", + "@org_golang_x_tools//go/analysis", + ], +) diff --git a/build/bazelutil/staticcheckanalyzers/s1030/analyzer.go b/build/bazelutil/staticcheckanalyzers/s1030/analyzer.go new file mode 100644 index 000000000000..e8016cf91395 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/s1030/analyzer.go @@ -0,0 +1,24 @@ +// Code generated by generate-staticcheck; DO NOT EDIT. + +//go:build bazel +// +build bazel + +package s1030 + +import ( + util "github.com/cockroachdb/cockroach/pkg/testutils/lint/passes/staticcheck" + "golang.org/x/tools/go/analysis" + "honnef.co/go/tools/simple" +) + +var Analyzer *analysis.Analyzer + +func init() { + for _, analyzer := range simple.Analyzers { + if analyzer.Analyzer.Name == "S1030" { + Analyzer = analyzer.Analyzer + break + } + } + util.MungeAnalyzer(Analyzer) +} diff --git a/build/bazelutil/staticcheckanalyzers/s1031/BUILD.bazel b/build/bazelutil/staticcheckanalyzers/s1031/BUILD.bazel new file mode 100644 index 000000000000..836c47a6a109 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/s1031/BUILD.bazel @@ -0,0 +1,13 @@ +load("@io_bazel_rules_go//go:def.bzl", "go_library") + +go_library( + name = "s1031", + srcs = ["analyzer.go"], + importpath = "github.com/cockroachdb/cockroach/build/bazelutil/staticcheckanalyzers/s1031", + visibility = ["//visibility:public"], + deps = [ + "//pkg/testutils/lint/passes/staticcheck", + "@co_honnef_go_tools//simple", + "@org_golang_x_tools//go/analysis", + ], +) diff --git a/build/bazelutil/staticcheckanalyzers/s1031/analyzer.go b/build/bazelutil/staticcheckanalyzers/s1031/analyzer.go new file mode 100644 index 000000000000..fa3af4766af9 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/s1031/analyzer.go @@ -0,0 +1,24 @@ +// Code generated by generate-staticcheck; DO NOT EDIT. + +//go:build bazel +// +build bazel + +package s1031 + +import ( + util "github.com/cockroachdb/cockroach/pkg/testutils/lint/passes/staticcheck" + "golang.org/x/tools/go/analysis" + "honnef.co/go/tools/simple" +) + +var Analyzer *analysis.Analyzer + +func init() { + for _, analyzer := range simple.Analyzers { + if analyzer.Analyzer.Name == "S1031" { + Analyzer = analyzer.Analyzer + break + } + } + util.MungeAnalyzer(Analyzer) +} diff --git a/build/bazelutil/staticcheckanalyzers/s1032/BUILD.bazel b/build/bazelutil/staticcheckanalyzers/s1032/BUILD.bazel new file mode 100644 index 000000000000..f59d6b589996 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/s1032/BUILD.bazel @@ -0,0 +1,13 @@ +load("@io_bazel_rules_go//go:def.bzl", "go_library") + +go_library( + name = "s1032", + srcs = ["analyzer.go"], + importpath = "github.com/cockroachdb/cockroach/build/bazelutil/staticcheckanalyzers/s1032", + visibility = ["//visibility:public"], + deps = [ + "//pkg/testutils/lint/passes/staticcheck", + "@co_honnef_go_tools//simple", + "@org_golang_x_tools//go/analysis", + ], +) diff --git a/build/bazelutil/staticcheckanalyzers/s1032/analyzer.go b/build/bazelutil/staticcheckanalyzers/s1032/analyzer.go new file mode 100644 index 000000000000..2f359651c95b --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/s1032/analyzer.go @@ -0,0 +1,24 @@ +// Code generated by generate-staticcheck; DO NOT EDIT. + +//go:build bazel +// +build bazel + +package s1032 + +import ( + util "github.com/cockroachdb/cockroach/pkg/testutils/lint/passes/staticcheck" + "golang.org/x/tools/go/analysis" + "honnef.co/go/tools/simple" +) + +var Analyzer *analysis.Analyzer + +func init() { + for _, analyzer := range simple.Analyzers { + if analyzer.Analyzer.Name == "S1032" { + Analyzer = analyzer.Analyzer + break + } + } + util.MungeAnalyzer(Analyzer) +} diff --git a/build/bazelutil/staticcheckanalyzers/s1033/BUILD.bazel b/build/bazelutil/staticcheckanalyzers/s1033/BUILD.bazel new file mode 100644 index 000000000000..52efec5656a0 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/s1033/BUILD.bazel @@ -0,0 +1,13 @@ +load("@io_bazel_rules_go//go:def.bzl", "go_library") + +go_library( + name = "s1033", + srcs = ["analyzer.go"], + importpath = "github.com/cockroachdb/cockroach/build/bazelutil/staticcheckanalyzers/s1033", + visibility = ["//visibility:public"], + deps = [ + "//pkg/testutils/lint/passes/staticcheck", + "@co_honnef_go_tools//simple", + "@org_golang_x_tools//go/analysis", + ], +) diff --git a/build/bazelutil/staticcheckanalyzers/s1033/analyzer.go b/build/bazelutil/staticcheckanalyzers/s1033/analyzer.go new file mode 100644 index 000000000000..2f0800baab06 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/s1033/analyzer.go @@ -0,0 +1,24 @@ +// Code generated by generate-staticcheck; DO NOT EDIT. + +//go:build bazel +// +build bazel + +package s1033 + +import ( + util "github.com/cockroachdb/cockroach/pkg/testutils/lint/passes/staticcheck" + "golang.org/x/tools/go/analysis" + "honnef.co/go/tools/simple" +) + +var Analyzer *analysis.Analyzer + +func init() { + for _, analyzer := range simple.Analyzers { + if analyzer.Analyzer.Name == "S1033" { + Analyzer = analyzer.Analyzer + break + } + } + util.MungeAnalyzer(Analyzer) +} diff --git a/build/bazelutil/staticcheckanalyzers/s1034/BUILD.bazel b/build/bazelutil/staticcheckanalyzers/s1034/BUILD.bazel new file mode 100644 index 000000000000..894c72d74904 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/s1034/BUILD.bazel @@ -0,0 +1,13 @@ +load("@io_bazel_rules_go//go:def.bzl", "go_library") + +go_library( + name = "s1034", + srcs = ["analyzer.go"], + importpath = "github.com/cockroachdb/cockroach/build/bazelutil/staticcheckanalyzers/s1034", + visibility = ["//visibility:public"], + deps = [ + "//pkg/testutils/lint/passes/staticcheck", + "@co_honnef_go_tools//simple", + "@org_golang_x_tools//go/analysis", + ], +) diff --git a/build/bazelutil/staticcheckanalyzers/s1034/analyzer.go b/build/bazelutil/staticcheckanalyzers/s1034/analyzer.go new file mode 100644 index 000000000000..ebc6ab9b90d7 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/s1034/analyzer.go @@ -0,0 +1,24 @@ +// Code generated by generate-staticcheck; DO NOT EDIT. + +//go:build bazel +// +build bazel + +package s1034 + +import ( + util "github.com/cockroachdb/cockroach/pkg/testutils/lint/passes/staticcheck" + "golang.org/x/tools/go/analysis" + "honnef.co/go/tools/simple" +) + +var Analyzer *analysis.Analyzer + +func init() { + for _, analyzer := range simple.Analyzers { + if analyzer.Analyzer.Name == "S1034" { + Analyzer = analyzer.Analyzer + break + } + } + util.MungeAnalyzer(Analyzer) +} diff --git a/build/bazelutil/staticcheckanalyzers/s1035/BUILD.bazel b/build/bazelutil/staticcheckanalyzers/s1035/BUILD.bazel new file mode 100644 index 000000000000..864d0daab96c --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/s1035/BUILD.bazel @@ -0,0 +1,13 @@ +load("@io_bazel_rules_go//go:def.bzl", "go_library") + +go_library( + name = "s1035", + srcs = ["analyzer.go"], + importpath = "github.com/cockroachdb/cockroach/build/bazelutil/staticcheckanalyzers/s1035", + visibility = ["//visibility:public"], + deps = [ + "//pkg/testutils/lint/passes/staticcheck", + "@co_honnef_go_tools//simple", + "@org_golang_x_tools//go/analysis", + ], +) diff --git a/build/bazelutil/staticcheckanalyzers/s1035/analyzer.go b/build/bazelutil/staticcheckanalyzers/s1035/analyzer.go new file mode 100644 index 000000000000..4ebf44dbfb12 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/s1035/analyzer.go @@ -0,0 +1,24 @@ +// Code generated by generate-staticcheck; DO NOT EDIT. + +//go:build bazel +// +build bazel + +package s1035 + +import ( + util "github.com/cockroachdb/cockroach/pkg/testutils/lint/passes/staticcheck" + "golang.org/x/tools/go/analysis" + "honnef.co/go/tools/simple" +) + +var Analyzer *analysis.Analyzer + +func init() { + for _, analyzer := range simple.Analyzers { + if analyzer.Analyzer.Name == "S1035" { + Analyzer = analyzer.Analyzer + break + } + } + util.MungeAnalyzer(Analyzer) +} diff --git a/build/bazelutil/staticcheckanalyzers/s1036/BUILD.bazel b/build/bazelutil/staticcheckanalyzers/s1036/BUILD.bazel new file mode 100644 index 000000000000..a047a9077d62 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/s1036/BUILD.bazel @@ -0,0 +1,13 @@ +load("@io_bazel_rules_go//go:def.bzl", "go_library") + +go_library( + name = "s1036", + srcs = ["analyzer.go"], + importpath = "github.com/cockroachdb/cockroach/build/bazelutil/staticcheckanalyzers/s1036", + visibility = ["//visibility:public"], + deps = [ + "//pkg/testutils/lint/passes/staticcheck", + "@co_honnef_go_tools//simple", + "@org_golang_x_tools//go/analysis", + ], +) diff --git a/build/bazelutil/staticcheckanalyzers/s1036/analyzer.go b/build/bazelutil/staticcheckanalyzers/s1036/analyzer.go new file mode 100644 index 000000000000..7c0438b1d3a8 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/s1036/analyzer.go @@ -0,0 +1,24 @@ +// Code generated by generate-staticcheck; DO NOT EDIT. + +//go:build bazel +// +build bazel + +package s1036 + +import ( + util "github.com/cockroachdb/cockroach/pkg/testutils/lint/passes/staticcheck" + "golang.org/x/tools/go/analysis" + "honnef.co/go/tools/simple" +) + +var Analyzer *analysis.Analyzer + +func init() { + for _, analyzer := range simple.Analyzers { + if analyzer.Analyzer.Name == "S1036" { + Analyzer = analyzer.Analyzer + break + } + } + util.MungeAnalyzer(Analyzer) +} diff --git a/build/bazelutil/staticcheckanalyzers/s1037/BUILD.bazel b/build/bazelutil/staticcheckanalyzers/s1037/BUILD.bazel new file mode 100644 index 000000000000..02e43b9ff301 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/s1037/BUILD.bazel @@ -0,0 +1,13 @@ +load("@io_bazel_rules_go//go:def.bzl", "go_library") + +go_library( + name = "s1037", + srcs = ["analyzer.go"], + importpath = "github.com/cockroachdb/cockroach/build/bazelutil/staticcheckanalyzers/s1037", + visibility = ["//visibility:public"], + deps = [ + "//pkg/testutils/lint/passes/staticcheck", + "@co_honnef_go_tools//simple", + "@org_golang_x_tools//go/analysis", + ], +) diff --git a/build/bazelutil/staticcheckanalyzers/s1037/analyzer.go b/build/bazelutil/staticcheckanalyzers/s1037/analyzer.go new file mode 100644 index 000000000000..b768430aec07 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/s1037/analyzer.go @@ -0,0 +1,24 @@ +// Code generated by generate-staticcheck; DO NOT EDIT. + +//go:build bazel +// +build bazel + +package s1037 + +import ( + util "github.com/cockroachdb/cockroach/pkg/testutils/lint/passes/staticcheck" + "golang.org/x/tools/go/analysis" + "honnef.co/go/tools/simple" +) + +var Analyzer *analysis.Analyzer + +func init() { + for _, analyzer := range simple.Analyzers { + if analyzer.Analyzer.Name == "S1037" { + Analyzer = analyzer.Analyzer + break + } + } + util.MungeAnalyzer(Analyzer) +} diff --git a/build/bazelutil/staticcheckanalyzers/s1038/BUILD.bazel b/build/bazelutil/staticcheckanalyzers/s1038/BUILD.bazel new file mode 100644 index 000000000000..d1d451c95255 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/s1038/BUILD.bazel @@ -0,0 +1,13 @@ +load("@io_bazel_rules_go//go:def.bzl", "go_library") + +go_library( + name = "s1038", + srcs = ["analyzer.go"], + importpath = "github.com/cockroachdb/cockroach/build/bazelutil/staticcheckanalyzers/s1038", + visibility = ["//visibility:public"], + deps = [ + "//pkg/testutils/lint/passes/staticcheck", + "@co_honnef_go_tools//simple", + "@org_golang_x_tools//go/analysis", + ], +) diff --git a/build/bazelutil/staticcheckanalyzers/s1038/analyzer.go b/build/bazelutil/staticcheckanalyzers/s1038/analyzer.go new file mode 100644 index 000000000000..5867c44bb258 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/s1038/analyzer.go @@ -0,0 +1,24 @@ +// Code generated by generate-staticcheck; DO NOT EDIT. + +//go:build bazel +// +build bazel + +package s1038 + +import ( + util "github.com/cockroachdb/cockroach/pkg/testutils/lint/passes/staticcheck" + "golang.org/x/tools/go/analysis" + "honnef.co/go/tools/simple" +) + +var Analyzer *analysis.Analyzer + +func init() { + for _, analyzer := range simple.Analyzers { + if analyzer.Analyzer.Name == "S1038" { + Analyzer = analyzer.Analyzer + break + } + } + util.MungeAnalyzer(Analyzer) +} diff --git a/build/bazelutil/staticcheckanalyzers/s1039/BUILD.bazel b/build/bazelutil/staticcheckanalyzers/s1039/BUILD.bazel new file mode 100644 index 000000000000..752e4d105090 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/s1039/BUILD.bazel @@ -0,0 +1,13 @@ +load("@io_bazel_rules_go//go:def.bzl", "go_library") + +go_library( + name = "s1039", + srcs = ["analyzer.go"], + importpath = "github.com/cockroachdb/cockroach/build/bazelutil/staticcheckanalyzers/s1039", + visibility = ["//visibility:public"], + deps = [ + "//pkg/testutils/lint/passes/staticcheck", + "@co_honnef_go_tools//simple", + "@org_golang_x_tools//go/analysis", + ], +) diff --git a/build/bazelutil/staticcheckanalyzers/s1039/analyzer.go b/build/bazelutil/staticcheckanalyzers/s1039/analyzer.go new file mode 100644 index 000000000000..2c7bd76b9710 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/s1039/analyzer.go @@ -0,0 +1,24 @@ +// Code generated by generate-staticcheck; DO NOT EDIT. + +//go:build bazel +// +build bazel + +package s1039 + +import ( + util "github.com/cockroachdb/cockroach/pkg/testutils/lint/passes/staticcheck" + "golang.org/x/tools/go/analysis" + "honnef.co/go/tools/simple" +) + +var Analyzer *analysis.Analyzer + +func init() { + for _, analyzer := range simple.Analyzers { + if analyzer.Analyzer.Name == "S1039" { + Analyzer = analyzer.Analyzer + break + } + } + util.MungeAnalyzer(Analyzer) +} diff --git a/build/bazelutil/staticcheckanalyzers/s1040/BUILD.bazel b/build/bazelutil/staticcheckanalyzers/s1040/BUILD.bazel new file mode 100644 index 000000000000..6eae37ef0715 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/s1040/BUILD.bazel @@ -0,0 +1,13 @@ +load("@io_bazel_rules_go//go:def.bzl", "go_library") + +go_library( + name = "s1040", + srcs = ["analyzer.go"], + importpath = "github.com/cockroachdb/cockroach/build/bazelutil/staticcheckanalyzers/s1040", + visibility = ["//visibility:public"], + deps = [ + "//pkg/testutils/lint/passes/staticcheck", + "@co_honnef_go_tools//simple", + "@org_golang_x_tools//go/analysis", + ], +) diff --git a/build/bazelutil/staticcheckanalyzers/s1040/analyzer.go b/build/bazelutil/staticcheckanalyzers/s1040/analyzer.go new file mode 100644 index 000000000000..7afad78749e6 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/s1040/analyzer.go @@ -0,0 +1,24 @@ +// Code generated by generate-staticcheck; DO NOT EDIT. + +//go:build bazel +// +build bazel + +package s1040 + +import ( + util "github.com/cockroachdb/cockroach/pkg/testutils/lint/passes/staticcheck" + "golang.org/x/tools/go/analysis" + "honnef.co/go/tools/simple" +) + +var Analyzer *analysis.Analyzer + +func init() { + for _, analyzer := range simple.Analyzers { + if analyzer.Analyzer.Name == "S1040" { + Analyzer = analyzer.Analyzer + break + } + } + util.MungeAnalyzer(Analyzer) +} diff --git a/build/bazelutil/staticcheckanalyzers/sa1000/BUILD.bazel b/build/bazelutil/staticcheckanalyzers/sa1000/BUILD.bazel new file mode 100644 index 000000000000..ec4c15457faa --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa1000/BUILD.bazel @@ -0,0 +1,13 @@ +load("@io_bazel_rules_go//go:def.bzl", "go_library") + +go_library( + name = "sa1000", + srcs = ["analyzer.go"], + importpath = "github.com/cockroachdb/cockroach/build/bazelutil/staticcheckanalyzers/sa1000", + visibility = ["//visibility:public"], + deps = [ + "//pkg/testutils/lint/passes/staticcheck", + "@co_honnef_go_tools//staticcheck", + "@org_golang_x_tools//go/analysis", + ], +) diff --git a/build/bazelutil/staticcheckanalyzers/sa1000/analyzer.go b/build/bazelutil/staticcheckanalyzers/sa1000/analyzer.go new file mode 100644 index 000000000000..4acf9bc1cce7 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa1000/analyzer.go @@ -0,0 +1,24 @@ +// Code generated by generate-staticcheck; DO NOT EDIT. + +//go:build bazel +// +build bazel + +package sa1000 + +import ( + util "github.com/cockroachdb/cockroach/pkg/testutils/lint/passes/staticcheck" + "golang.org/x/tools/go/analysis" + "honnef.co/go/tools/staticcheck" +) + +var Analyzer *analysis.Analyzer + +func init() { + for _, analyzer := range staticcheck.Analyzers { + if analyzer.Analyzer.Name == "SA1000" { + Analyzer = analyzer.Analyzer + break + } + } + util.MungeAnalyzer(Analyzer) +} diff --git a/build/bazelutil/staticcheckanalyzers/sa1001/BUILD.bazel b/build/bazelutil/staticcheckanalyzers/sa1001/BUILD.bazel new file mode 100644 index 000000000000..757a7842fe1b --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa1001/BUILD.bazel @@ -0,0 +1,13 @@ +load("@io_bazel_rules_go//go:def.bzl", "go_library") + +go_library( + name = "sa1001", + srcs = ["analyzer.go"], + importpath = "github.com/cockroachdb/cockroach/build/bazelutil/staticcheckanalyzers/sa1001", + visibility = ["//visibility:public"], + deps = [ + "//pkg/testutils/lint/passes/staticcheck", + "@co_honnef_go_tools//staticcheck", + "@org_golang_x_tools//go/analysis", + ], +) diff --git a/build/bazelutil/staticcheckanalyzers/sa1001/analyzer.go b/build/bazelutil/staticcheckanalyzers/sa1001/analyzer.go new file mode 100644 index 000000000000..e0a14fead722 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa1001/analyzer.go @@ -0,0 +1,24 @@ +// Code generated by generate-staticcheck; DO NOT EDIT. + +//go:build bazel +// +build bazel + +package sa1001 + +import ( + util "github.com/cockroachdb/cockroach/pkg/testutils/lint/passes/staticcheck" + "golang.org/x/tools/go/analysis" + "honnef.co/go/tools/staticcheck" +) + +var Analyzer *analysis.Analyzer + +func init() { + for _, analyzer := range staticcheck.Analyzers { + if analyzer.Analyzer.Name == "SA1001" { + Analyzer = analyzer.Analyzer + break + } + } + util.MungeAnalyzer(Analyzer) +} diff --git a/build/bazelutil/staticcheckanalyzers/sa1002/BUILD.bazel b/build/bazelutil/staticcheckanalyzers/sa1002/BUILD.bazel new file mode 100644 index 000000000000..6fde3e73c46a --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa1002/BUILD.bazel @@ -0,0 +1,13 @@ +load("@io_bazel_rules_go//go:def.bzl", "go_library") + +go_library( + name = "sa1002", + srcs = ["analyzer.go"], + importpath = "github.com/cockroachdb/cockroach/build/bazelutil/staticcheckanalyzers/sa1002", + visibility = ["//visibility:public"], + deps = [ + "//pkg/testutils/lint/passes/staticcheck", + "@co_honnef_go_tools//staticcheck", + "@org_golang_x_tools//go/analysis", + ], +) diff --git a/build/bazelutil/staticcheckanalyzers/sa1002/analyzer.go b/build/bazelutil/staticcheckanalyzers/sa1002/analyzer.go new file mode 100644 index 000000000000..75133d88c83d --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa1002/analyzer.go @@ -0,0 +1,24 @@ +// Code generated by generate-staticcheck; DO NOT EDIT. + +//go:build bazel +// +build bazel + +package sa1002 + +import ( + util "github.com/cockroachdb/cockroach/pkg/testutils/lint/passes/staticcheck" + "golang.org/x/tools/go/analysis" + "honnef.co/go/tools/staticcheck" +) + +var Analyzer *analysis.Analyzer + +func init() { + for _, analyzer := range staticcheck.Analyzers { + if analyzer.Analyzer.Name == "SA1002" { + Analyzer = analyzer.Analyzer + break + } + } + util.MungeAnalyzer(Analyzer) +} diff --git a/build/bazelutil/staticcheckanalyzers/sa1003/BUILD.bazel b/build/bazelutil/staticcheckanalyzers/sa1003/BUILD.bazel new file mode 100644 index 000000000000..e854d6e07aae --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa1003/BUILD.bazel @@ -0,0 +1,13 @@ +load("@io_bazel_rules_go//go:def.bzl", "go_library") + +go_library( + name = "sa1003", + srcs = ["analyzer.go"], + importpath = "github.com/cockroachdb/cockroach/build/bazelutil/staticcheckanalyzers/sa1003", + visibility = ["//visibility:public"], + deps = [ + "//pkg/testutils/lint/passes/staticcheck", + "@co_honnef_go_tools//staticcheck", + "@org_golang_x_tools//go/analysis", + ], +) diff --git a/build/bazelutil/staticcheckanalyzers/sa1003/analyzer.go b/build/bazelutil/staticcheckanalyzers/sa1003/analyzer.go new file mode 100644 index 000000000000..ea7b45a9c479 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa1003/analyzer.go @@ -0,0 +1,24 @@ +// Code generated by generate-staticcheck; DO NOT EDIT. + +//go:build bazel +// +build bazel + +package sa1003 + +import ( + util "github.com/cockroachdb/cockroach/pkg/testutils/lint/passes/staticcheck" + "golang.org/x/tools/go/analysis" + "honnef.co/go/tools/staticcheck" +) + +var Analyzer *analysis.Analyzer + +func init() { + for _, analyzer := range staticcheck.Analyzers { + if analyzer.Analyzer.Name == "SA1003" { + Analyzer = analyzer.Analyzer + break + } + } + util.MungeAnalyzer(Analyzer) +} diff --git a/build/bazelutil/staticcheckanalyzers/sa1004/BUILD.bazel b/build/bazelutil/staticcheckanalyzers/sa1004/BUILD.bazel new file mode 100644 index 000000000000..a66ed151d959 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa1004/BUILD.bazel @@ -0,0 +1,13 @@ +load("@io_bazel_rules_go//go:def.bzl", "go_library") + +go_library( + name = "sa1004", + srcs = ["analyzer.go"], + importpath = "github.com/cockroachdb/cockroach/build/bazelutil/staticcheckanalyzers/sa1004", + visibility = ["//visibility:public"], + deps = [ + "//pkg/testutils/lint/passes/staticcheck", + "@co_honnef_go_tools//staticcheck", + "@org_golang_x_tools//go/analysis", + ], +) diff --git a/build/bazelutil/staticcheckanalyzers/sa1004/analyzer.go b/build/bazelutil/staticcheckanalyzers/sa1004/analyzer.go new file mode 100644 index 000000000000..5b4c2c5a663d --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa1004/analyzer.go @@ -0,0 +1,24 @@ +// Code generated by generate-staticcheck; DO NOT EDIT. + +//go:build bazel +// +build bazel + +package sa1004 + +import ( + util "github.com/cockroachdb/cockroach/pkg/testutils/lint/passes/staticcheck" + "golang.org/x/tools/go/analysis" + "honnef.co/go/tools/staticcheck" +) + +var Analyzer *analysis.Analyzer + +func init() { + for _, analyzer := range staticcheck.Analyzers { + if analyzer.Analyzer.Name == "SA1004" { + Analyzer = analyzer.Analyzer + break + } + } + util.MungeAnalyzer(Analyzer) +} diff --git a/build/bazelutil/staticcheckanalyzers/sa1005/BUILD.bazel b/build/bazelutil/staticcheckanalyzers/sa1005/BUILD.bazel new file mode 100644 index 000000000000..53b6f70199f5 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa1005/BUILD.bazel @@ -0,0 +1,13 @@ +load("@io_bazel_rules_go//go:def.bzl", "go_library") + +go_library( + name = "sa1005", + srcs = ["analyzer.go"], + importpath = "github.com/cockroachdb/cockroach/build/bazelutil/staticcheckanalyzers/sa1005", + visibility = ["//visibility:public"], + deps = [ + "//pkg/testutils/lint/passes/staticcheck", + "@co_honnef_go_tools//staticcheck", + "@org_golang_x_tools//go/analysis", + ], +) diff --git a/build/bazelutil/staticcheckanalyzers/sa1005/analyzer.go b/build/bazelutil/staticcheckanalyzers/sa1005/analyzer.go new file mode 100644 index 000000000000..703a10d0b49a --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa1005/analyzer.go @@ -0,0 +1,24 @@ +// Code generated by generate-staticcheck; DO NOT EDIT. + +//go:build bazel +// +build bazel + +package sa1005 + +import ( + util "github.com/cockroachdb/cockroach/pkg/testutils/lint/passes/staticcheck" + "golang.org/x/tools/go/analysis" + "honnef.co/go/tools/staticcheck" +) + +var Analyzer *analysis.Analyzer + +func init() { + for _, analyzer := range staticcheck.Analyzers { + if analyzer.Analyzer.Name == "SA1005" { + Analyzer = analyzer.Analyzer + break + } + } + util.MungeAnalyzer(Analyzer) +} diff --git a/build/bazelutil/staticcheckanalyzers/sa1006/BUILD.bazel b/build/bazelutil/staticcheckanalyzers/sa1006/BUILD.bazel new file mode 100644 index 000000000000..fd9d4631e2e4 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa1006/BUILD.bazel @@ -0,0 +1,13 @@ +load("@io_bazel_rules_go//go:def.bzl", "go_library") + +go_library( + name = "sa1006", + srcs = ["analyzer.go"], + importpath = "github.com/cockroachdb/cockroach/build/bazelutil/staticcheckanalyzers/sa1006", + visibility = ["//visibility:public"], + deps = [ + "//pkg/testutils/lint/passes/staticcheck", + "@co_honnef_go_tools//staticcheck", + "@org_golang_x_tools//go/analysis", + ], +) diff --git a/build/bazelutil/staticcheckanalyzers/sa1006/analyzer.go b/build/bazelutil/staticcheckanalyzers/sa1006/analyzer.go new file mode 100644 index 000000000000..de6cd892f60d --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa1006/analyzer.go @@ -0,0 +1,24 @@ +// Code generated by generate-staticcheck; DO NOT EDIT. + +//go:build bazel +// +build bazel + +package sa1006 + +import ( + util "github.com/cockroachdb/cockroach/pkg/testutils/lint/passes/staticcheck" + "golang.org/x/tools/go/analysis" + "honnef.co/go/tools/staticcheck" +) + +var Analyzer *analysis.Analyzer + +func init() { + for _, analyzer := range staticcheck.Analyzers { + if analyzer.Analyzer.Name == "SA1006" { + Analyzer = analyzer.Analyzer + break + } + } + util.MungeAnalyzer(Analyzer) +} diff --git a/build/bazelutil/staticcheckanalyzers/sa1007/BUILD.bazel b/build/bazelutil/staticcheckanalyzers/sa1007/BUILD.bazel new file mode 100644 index 000000000000..dbafdff204f5 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa1007/BUILD.bazel @@ -0,0 +1,13 @@ +load("@io_bazel_rules_go//go:def.bzl", "go_library") + +go_library( + name = "sa1007", + srcs = ["analyzer.go"], + importpath = "github.com/cockroachdb/cockroach/build/bazelutil/staticcheckanalyzers/sa1007", + visibility = ["//visibility:public"], + deps = [ + "//pkg/testutils/lint/passes/staticcheck", + "@co_honnef_go_tools//staticcheck", + "@org_golang_x_tools//go/analysis", + ], +) diff --git a/build/bazelutil/staticcheckanalyzers/sa1007/analyzer.go b/build/bazelutil/staticcheckanalyzers/sa1007/analyzer.go new file mode 100644 index 000000000000..dc4130d8a969 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa1007/analyzer.go @@ -0,0 +1,24 @@ +// Code generated by generate-staticcheck; DO NOT EDIT. + +//go:build bazel +// +build bazel + +package sa1007 + +import ( + util "github.com/cockroachdb/cockroach/pkg/testutils/lint/passes/staticcheck" + "golang.org/x/tools/go/analysis" + "honnef.co/go/tools/staticcheck" +) + +var Analyzer *analysis.Analyzer + +func init() { + for _, analyzer := range staticcheck.Analyzers { + if analyzer.Analyzer.Name == "SA1007" { + Analyzer = analyzer.Analyzer + break + } + } + util.MungeAnalyzer(Analyzer) +} diff --git a/build/bazelutil/staticcheckanalyzers/sa1008/BUILD.bazel b/build/bazelutil/staticcheckanalyzers/sa1008/BUILD.bazel new file mode 100644 index 000000000000..42094c1b8334 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa1008/BUILD.bazel @@ -0,0 +1,13 @@ +load("@io_bazel_rules_go//go:def.bzl", "go_library") + +go_library( + name = "sa1008", + srcs = ["analyzer.go"], + importpath = "github.com/cockroachdb/cockroach/build/bazelutil/staticcheckanalyzers/sa1008", + visibility = ["//visibility:public"], + deps = [ + "//pkg/testutils/lint/passes/staticcheck", + "@co_honnef_go_tools//staticcheck", + "@org_golang_x_tools//go/analysis", + ], +) diff --git a/build/bazelutil/staticcheckanalyzers/sa1008/analyzer.go b/build/bazelutil/staticcheckanalyzers/sa1008/analyzer.go new file mode 100644 index 000000000000..8e1428e9a0c9 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa1008/analyzer.go @@ -0,0 +1,24 @@ +// Code generated by generate-staticcheck; DO NOT EDIT. + +//go:build bazel +// +build bazel + +package sa1008 + +import ( + util "github.com/cockroachdb/cockroach/pkg/testutils/lint/passes/staticcheck" + "golang.org/x/tools/go/analysis" + "honnef.co/go/tools/staticcheck" +) + +var Analyzer *analysis.Analyzer + +func init() { + for _, analyzer := range staticcheck.Analyzers { + if analyzer.Analyzer.Name == "SA1008" { + Analyzer = analyzer.Analyzer + break + } + } + util.MungeAnalyzer(Analyzer) +} diff --git a/build/bazelutil/staticcheckanalyzers/sa1010/BUILD.bazel b/build/bazelutil/staticcheckanalyzers/sa1010/BUILD.bazel new file mode 100644 index 000000000000..95c5e53a8e18 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa1010/BUILD.bazel @@ -0,0 +1,13 @@ +load("@io_bazel_rules_go//go:def.bzl", "go_library") + +go_library( + name = "sa1010", + srcs = ["analyzer.go"], + importpath = "github.com/cockroachdb/cockroach/build/bazelutil/staticcheckanalyzers/sa1010", + visibility = ["//visibility:public"], + deps = [ + "//pkg/testutils/lint/passes/staticcheck", + "@co_honnef_go_tools//staticcheck", + "@org_golang_x_tools//go/analysis", + ], +) diff --git a/build/bazelutil/staticcheckanalyzers/sa1010/analyzer.go b/build/bazelutil/staticcheckanalyzers/sa1010/analyzer.go new file mode 100644 index 000000000000..4a4d85230db8 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa1010/analyzer.go @@ -0,0 +1,24 @@ +// Code generated by generate-staticcheck; DO NOT EDIT. + +//go:build bazel +// +build bazel + +package sa1010 + +import ( + util "github.com/cockroachdb/cockroach/pkg/testutils/lint/passes/staticcheck" + "golang.org/x/tools/go/analysis" + "honnef.co/go/tools/staticcheck" +) + +var Analyzer *analysis.Analyzer + +func init() { + for _, analyzer := range staticcheck.Analyzers { + if analyzer.Analyzer.Name == "SA1010" { + Analyzer = analyzer.Analyzer + break + } + } + util.MungeAnalyzer(Analyzer) +} diff --git a/build/bazelutil/staticcheckanalyzers/sa1011/BUILD.bazel b/build/bazelutil/staticcheckanalyzers/sa1011/BUILD.bazel new file mode 100644 index 000000000000..473d8b0391ef --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa1011/BUILD.bazel @@ -0,0 +1,13 @@ +load("@io_bazel_rules_go//go:def.bzl", "go_library") + +go_library( + name = "sa1011", + srcs = ["analyzer.go"], + importpath = "github.com/cockroachdb/cockroach/build/bazelutil/staticcheckanalyzers/sa1011", + visibility = ["//visibility:public"], + deps = [ + "//pkg/testutils/lint/passes/staticcheck", + "@co_honnef_go_tools//staticcheck", + "@org_golang_x_tools//go/analysis", + ], +) diff --git a/build/bazelutil/staticcheckanalyzers/sa1011/analyzer.go b/build/bazelutil/staticcheckanalyzers/sa1011/analyzer.go new file mode 100644 index 000000000000..9b6bc63c05aa --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa1011/analyzer.go @@ -0,0 +1,24 @@ +// Code generated by generate-staticcheck; DO NOT EDIT. + +//go:build bazel +// +build bazel + +package sa1011 + +import ( + util "github.com/cockroachdb/cockroach/pkg/testutils/lint/passes/staticcheck" + "golang.org/x/tools/go/analysis" + "honnef.co/go/tools/staticcheck" +) + +var Analyzer *analysis.Analyzer + +func init() { + for _, analyzer := range staticcheck.Analyzers { + if analyzer.Analyzer.Name == "SA1011" { + Analyzer = analyzer.Analyzer + break + } + } + util.MungeAnalyzer(Analyzer) +} diff --git a/build/bazelutil/staticcheckanalyzers/sa1012/BUILD.bazel b/build/bazelutil/staticcheckanalyzers/sa1012/BUILD.bazel new file mode 100644 index 000000000000..9591420a3ca8 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa1012/BUILD.bazel @@ -0,0 +1,13 @@ +load("@io_bazel_rules_go//go:def.bzl", "go_library") + +go_library( + name = "sa1012", + srcs = ["analyzer.go"], + importpath = "github.com/cockroachdb/cockroach/build/bazelutil/staticcheckanalyzers/sa1012", + visibility = ["//visibility:public"], + deps = [ + "//pkg/testutils/lint/passes/staticcheck", + "@co_honnef_go_tools//staticcheck", + "@org_golang_x_tools//go/analysis", + ], +) diff --git a/build/bazelutil/staticcheckanalyzers/sa1012/analyzer.go b/build/bazelutil/staticcheckanalyzers/sa1012/analyzer.go new file mode 100644 index 000000000000..dcd2eb117ed8 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa1012/analyzer.go @@ -0,0 +1,24 @@ +// Code generated by generate-staticcheck; DO NOT EDIT. + +//go:build bazel +// +build bazel + +package sa1012 + +import ( + util "github.com/cockroachdb/cockroach/pkg/testutils/lint/passes/staticcheck" + "golang.org/x/tools/go/analysis" + "honnef.co/go/tools/staticcheck" +) + +var Analyzer *analysis.Analyzer + +func init() { + for _, analyzer := range staticcheck.Analyzers { + if analyzer.Analyzer.Name == "SA1012" { + Analyzer = analyzer.Analyzer + break + } + } + util.MungeAnalyzer(Analyzer) +} diff --git a/build/bazelutil/staticcheckanalyzers/sa1013/BUILD.bazel b/build/bazelutil/staticcheckanalyzers/sa1013/BUILD.bazel new file mode 100644 index 000000000000..05ee93c8a880 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa1013/BUILD.bazel @@ -0,0 +1,13 @@ +load("@io_bazel_rules_go//go:def.bzl", "go_library") + +go_library( + name = "sa1013", + srcs = ["analyzer.go"], + importpath = "github.com/cockroachdb/cockroach/build/bazelutil/staticcheckanalyzers/sa1013", + visibility = ["//visibility:public"], + deps = [ + "//pkg/testutils/lint/passes/staticcheck", + "@co_honnef_go_tools//staticcheck", + "@org_golang_x_tools//go/analysis", + ], +) diff --git a/build/bazelutil/staticcheckanalyzers/sa1013/analyzer.go b/build/bazelutil/staticcheckanalyzers/sa1013/analyzer.go new file mode 100644 index 000000000000..ea401ef91d81 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa1013/analyzer.go @@ -0,0 +1,24 @@ +// Code generated by generate-staticcheck; DO NOT EDIT. + +//go:build bazel +// +build bazel + +package sa1013 + +import ( + util "github.com/cockroachdb/cockroach/pkg/testutils/lint/passes/staticcheck" + "golang.org/x/tools/go/analysis" + "honnef.co/go/tools/staticcheck" +) + +var Analyzer *analysis.Analyzer + +func init() { + for _, analyzer := range staticcheck.Analyzers { + if analyzer.Analyzer.Name == "SA1013" { + Analyzer = analyzer.Analyzer + break + } + } + util.MungeAnalyzer(Analyzer) +} diff --git a/build/bazelutil/staticcheckanalyzers/sa1014/BUILD.bazel b/build/bazelutil/staticcheckanalyzers/sa1014/BUILD.bazel new file mode 100644 index 000000000000..2048ba964e90 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa1014/BUILD.bazel @@ -0,0 +1,13 @@ +load("@io_bazel_rules_go//go:def.bzl", "go_library") + +go_library( + name = "sa1014", + srcs = ["analyzer.go"], + importpath = "github.com/cockroachdb/cockroach/build/bazelutil/staticcheckanalyzers/sa1014", + visibility = ["//visibility:public"], + deps = [ + "//pkg/testutils/lint/passes/staticcheck", + "@co_honnef_go_tools//staticcheck", + "@org_golang_x_tools//go/analysis", + ], +) diff --git a/build/bazelutil/staticcheckanalyzers/sa1014/analyzer.go b/build/bazelutil/staticcheckanalyzers/sa1014/analyzer.go new file mode 100644 index 000000000000..b31355c7838f --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa1014/analyzer.go @@ -0,0 +1,24 @@ +// Code generated by generate-staticcheck; DO NOT EDIT. + +//go:build bazel +// +build bazel + +package sa1014 + +import ( + util "github.com/cockroachdb/cockroach/pkg/testutils/lint/passes/staticcheck" + "golang.org/x/tools/go/analysis" + "honnef.co/go/tools/staticcheck" +) + +var Analyzer *analysis.Analyzer + +func init() { + for _, analyzer := range staticcheck.Analyzers { + if analyzer.Analyzer.Name == "SA1014" { + Analyzer = analyzer.Analyzer + break + } + } + util.MungeAnalyzer(Analyzer) +} diff --git a/build/bazelutil/staticcheckanalyzers/sa1015/BUILD.bazel b/build/bazelutil/staticcheckanalyzers/sa1015/BUILD.bazel new file mode 100644 index 000000000000..34c983041084 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa1015/BUILD.bazel @@ -0,0 +1,13 @@ +load("@io_bazel_rules_go//go:def.bzl", "go_library") + +go_library( + name = "sa1015", + srcs = ["analyzer.go"], + importpath = "github.com/cockroachdb/cockroach/build/bazelutil/staticcheckanalyzers/sa1015", + visibility = ["//visibility:public"], + deps = [ + "//pkg/testutils/lint/passes/staticcheck", + "@co_honnef_go_tools//staticcheck", + "@org_golang_x_tools//go/analysis", + ], +) diff --git a/build/bazelutil/staticcheckanalyzers/sa1015/analyzer.go b/build/bazelutil/staticcheckanalyzers/sa1015/analyzer.go new file mode 100644 index 000000000000..4ef3aa02cdaf --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa1015/analyzer.go @@ -0,0 +1,24 @@ +// Code generated by generate-staticcheck; DO NOT EDIT. + +//go:build bazel +// +build bazel + +package sa1015 + +import ( + util "github.com/cockroachdb/cockroach/pkg/testutils/lint/passes/staticcheck" + "golang.org/x/tools/go/analysis" + "honnef.co/go/tools/staticcheck" +) + +var Analyzer *analysis.Analyzer + +func init() { + for _, analyzer := range staticcheck.Analyzers { + if analyzer.Analyzer.Name == "SA1015" { + Analyzer = analyzer.Analyzer + break + } + } + util.MungeAnalyzer(Analyzer) +} diff --git a/build/bazelutil/staticcheckanalyzers/sa1016/BUILD.bazel b/build/bazelutil/staticcheckanalyzers/sa1016/BUILD.bazel new file mode 100644 index 000000000000..dcd76fa89274 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa1016/BUILD.bazel @@ -0,0 +1,13 @@ +load("@io_bazel_rules_go//go:def.bzl", "go_library") + +go_library( + name = "sa1016", + srcs = ["analyzer.go"], + importpath = "github.com/cockroachdb/cockroach/build/bazelutil/staticcheckanalyzers/sa1016", + visibility = ["//visibility:public"], + deps = [ + "//pkg/testutils/lint/passes/staticcheck", + "@co_honnef_go_tools//staticcheck", + "@org_golang_x_tools//go/analysis", + ], +) diff --git a/build/bazelutil/staticcheckanalyzers/sa1016/analyzer.go b/build/bazelutil/staticcheckanalyzers/sa1016/analyzer.go new file mode 100644 index 000000000000..947d35a221f2 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa1016/analyzer.go @@ -0,0 +1,24 @@ +// Code generated by generate-staticcheck; DO NOT EDIT. + +//go:build bazel +// +build bazel + +package sa1016 + +import ( + util "github.com/cockroachdb/cockroach/pkg/testutils/lint/passes/staticcheck" + "golang.org/x/tools/go/analysis" + "honnef.co/go/tools/staticcheck" +) + +var Analyzer *analysis.Analyzer + +func init() { + for _, analyzer := range staticcheck.Analyzers { + if analyzer.Analyzer.Name == "SA1016" { + Analyzer = analyzer.Analyzer + break + } + } + util.MungeAnalyzer(Analyzer) +} diff --git a/build/bazelutil/staticcheckanalyzers/sa1017/BUILD.bazel b/build/bazelutil/staticcheckanalyzers/sa1017/BUILD.bazel new file mode 100644 index 000000000000..7e3cbb531e92 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa1017/BUILD.bazel @@ -0,0 +1,13 @@ +load("@io_bazel_rules_go//go:def.bzl", "go_library") + +go_library( + name = "sa1017", + srcs = ["analyzer.go"], + importpath = "github.com/cockroachdb/cockroach/build/bazelutil/staticcheckanalyzers/sa1017", + visibility = ["//visibility:public"], + deps = [ + "//pkg/testutils/lint/passes/staticcheck", + "@co_honnef_go_tools//staticcheck", + "@org_golang_x_tools//go/analysis", + ], +) diff --git a/build/bazelutil/staticcheckanalyzers/sa1017/analyzer.go b/build/bazelutil/staticcheckanalyzers/sa1017/analyzer.go new file mode 100644 index 000000000000..ca66e3346654 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa1017/analyzer.go @@ -0,0 +1,24 @@ +// Code generated by generate-staticcheck; DO NOT EDIT. + +//go:build bazel +// +build bazel + +package sa1017 + +import ( + util "github.com/cockroachdb/cockroach/pkg/testutils/lint/passes/staticcheck" + "golang.org/x/tools/go/analysis" + "honnef.co/go/tools/staticcheck" +) + +var Analyzer *analysis.Analyzer + +func init() { + for _, analyzer := range staticcheck.Analyzers { + if analyzer.Analyzer.Name == "SA1017" { + Analyzer = analyzer.Analyzer + break + } + } + util.MungeAnalyzer(Analyzer) +} diff --git a/build/bazelutil/staticcheckanalyzers/sa1018/BUILD.bazel b/build/bazelutil/staticcheckanalyzers/sa1018/BUILD.bazel new file mode 100644 index 000000000000..95f60e904145 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa1018/BUILD.bazel @@ -0,0 +1,13 @@ +load("@io_bazel_rules_go//go:def.bzl", "go_library") + +go_library( + name = "sa1018", + srcs = ["analyzer.go"], + importpath = "github.com/cockroachdb/cockroach/build/bazelutil/staticcheckanalyzers/sa1018", + visibility = ["//visibility:public"], + deps = [ + "//pkg/testutils/lint/passes/staticcheck", + "@co_honnef_go_tools//staticcheck", + "@org_golang_x_tools//go/analysis", + ], +) diff --git a/build/bazelutil/staticcheckanalyzers/sa1018/analyzer.go b/build/bazelutil/staticcheckanalyzers/sa1018/analyzer.go new file mode 100644 index 000000000000..082baf37f4d9 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa1018/analyzer.go @@ -0,0 +1,24 @@ +// Code generated by generate-staticcheck; DO NOT EDIT. + +//go:build bazel +// +build bazel + +package sa1018 + +import ( + util "github.com/cockroachdb/cockroach/pkg/testutils/lint/passes/staticcheck" + "golang.org/x/tools/go/analysis" + "honnef.co/go/tools/staticcheck" +) + +var Analyzer *analysis.Analyzer + +func init() { + for _, analyzer := range staticcheck.Analyzers { + if analyzer.Analyzer.Name == "SA1018" { + Analyzer = analyzer.Analyzer + break + } + } + util.MungeAnalyzer(Analyzer) +} diff --git a/build/bazelutil/staticcheckanalyzers/sa1019/BUILD.bazel b/build/bazelutil/staticcheckanalyzers/sa1019/BUILD.bazel new file mode 100644 index 000000000000..ce5326e30371 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa1019/BUILD.bazel @@ -0,0 +1,13 @@ +load("@io_bazel_rules_go//go:def.bzl", "go_library") + +go_library( + name = "sa1019", + srcs = ["analyzer.go"], + importpath = "github.com/cockroachdb/cockroach/build/bazelutil/staticcheckanalyzers/sa1019", + visibility = ["//visibility:public"], + deps = [ + "//pkg/testutils/lint/passes/staticcheck", + "@co_honnef_go_tools//staticcheck", + "@org_golang_x_tools//go/analysis", + ], +) diff --git a/build/bazelutil/staticcheckanalyzers/sa1019/analyzer.go b/build/bazelutil/staticcheckanalyzers/sa1019/analyzer.go new file mode 100644 index 000000000000..6ba7721c784f --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa1019/analyzer.go @@ -0,0 +1,24 @@ +// Code generated by generate-staticcheck; DO NOT EDIT. + +//go:build bazel +// +build bazel + +package sa1019 + +import ( + util "github.com/cockroachdb/cockroach/pkg/testutils/lint/passes/staticcheck" + "golang.org/x/tools/go/analysis" + "honnef.co/go/tools/staticcheck" +) + +var Analyzer *analysis.Analyzer + +func init() { + for _, analyzer := range staticcheck.Analyzers { + if analyzer.Analyzer.Name == "SA1019" { + Analyzer = analyzer.Analyzer + break + } + } + util.MungeAnalyzer(Analyzer) +} diff --git a/build/bazelutil/staticcheckanalyzers/sa1020/BUILD.bazel b/build/bazelutil/staticcheckanalyzers/sa1020/BUILD.bazel new file mode 100644 index 000000000000..b5305d4e9b3a --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa1020/BUILD.bazel @@ -0,0 +1,13 @@ +load("@io_bazel_rules_go//go:def.bzl", "go_library") + +go_library( + name = "sa1020", + srcs = ["analyzer.go"], + importpath = "github.com/cockroachdb/cockroach/build/bazelutil/staticcheckanalyzers/sa1020", + visibility = ["//visibility:public"], + deps = [ + "//pkg/testutils/lint/passes/staticcheck", + "@co_honnef_go_tools//staticcheck", + "@org_golang_x_tools//go/analysis", + ], +) diff --git a/build/bazelutil/staticcheckanalyzers/sa1020/analyzer.go b/build/bazelutil/staticcheckanalyzers/sa1020/analyzer.go new file mode 100644 index 000000000000..d6b2c1cfffbc --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa1020/analyzer.go @@ -0,0 +1,24 @@ +// Code generated by generate-staticcheck; DO NOT EDIT. + +//go:build bazel +// +build bazel + +package sa1020 + +import ( + util "github.com/cockroachdb/cockroach/pkg/testutils/lint/passes/staticcheck" + "golang.org/x/tools/go/analysis" + "honnef.co/go/tools/staticcheck" +) + +var Analyzer *analysis.Analyzer + +func init() { + for _, analyzer := range staticcheck.Analyzers { + if analyzer.Analyzer.Name == "SA1020" { + Analyzer = analyzer.Analyzer + break + } + } + util.MungeAnalyzer(Analyzer) +} diff --git a/build/bazelutil/staticcheckanalyzers/sa1021/BUILD.bazel b/build/bazelutil/staticcheckanalyzers/sa1021/BUILD.bazel new file mode 100644 index 000000000000..197e010ff31a --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa1021/BUILD.bazel @@ -0,0 +1,13 @@ +load("@io_bazel_rules_go//go:def.bzl", "go_library") + +go_library( + name = "sa1021", + srcs = ["analyzer.go"], + importpath = "github.com/cockroachdb/cockroach/build/bazelutil/staticcheckanalyzers/sa1021", + visibility = ["//visibility:public"], + deps = [ + "//pkg/testutils/lint/passes/staticcheck", + "@co_honnef_go_tools//staticcheck", + "@org_golang_x_tools//go/analysis", + ], +) diff --git a/build/bazelutil/staticcheckanalyzers/sa1021/analyzer.go b/build/bazelutil/staticcheckanalyzers/sa1021/analyzer.go new file mode 100644 index 000000000000..0a570f851886 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa1021/analyzer.go @@ -0,0 +1,24 @@ +// Code generated by generate-staticcheck; DO NOT EDIT. + +//go:build bazel +// +build bazel + +package sa1021 + +import ( + util "github.com/cockroachdb/cockroach/pkg/testutils/lint/passes/staticcheck" + "golang.org/x/tools/go/analysis" + "honnef.co/go/tools/staticcheck" +) + +var Analyzer *analysis.Analyzer + +func init() { + for _, analyzer := range staticcheck.Analyzers { + if analyzer.Analyzer.Name == "SA1021" { + Analyzer = analyzer.Analyzer + break + } + } + util.MungeAnalyzer(Analyzer) +} diff --git a/build/bazelutil/staticcheckanalyzers/sa1023/BUILD.bazel b/build/bazelutil/staticcheckanalyzers/sa1023/BUILD.bazel new file mode 100644 index 000000000000..483a52f8de41 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa1023/BUILD.bazel @@ -0,0 +1,13 @@ +load("@io_bazel_rules_go//go:def.bzl", "go_library") + +go_library( + name = "sa1023", + srcs = ["analyzer.go"], + importpath = "github.com/cockroachdb/cockroach/build/bazelutil/staticcheckanalyzers/sa1023", + visibility = ["//visibility:public"], + deps = [ + "//pkg/testutils/lint/passes/staticcheck", + "@co_honnef_go_tools//staticcheck", + "@org_golang_x_tools//go/analysis", + ], +) diff --git a/build/bazelutil/staticcheckanalyzers/sa1023/analyzer.go b/build/bazelutil/staticcheckanalyzers/sa1023/analyzer.go new file mode 100644 index 000000000000..8b2ec5b54e38 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa1023/analyzer.go @@ -0,0 +1,24 @@ +// Code generated by generate-staticcheck; DO NOT EDIT. + +//go:build bazel +// +build bazel + +package sa1023 + +import ( + util "github.com/cockroachdb/cockroach/pkg/testutils/lint/passes/staticcheck" + "golang.org/x/tools/go/analysis" + "honnef.co/go/tools/staticcheck" +) + +var Analyzer *analysis.Analyzer + +func init() { + for _, analyzer := range staticcheck.Analyzers { + if analyzer.Analyzer.Name == "SA1023" { + Analyzer = analyzer.Analyzer + break + } + } + util.MungeAnalyzer(Analyzer) +} diff --git a/build/bazelutil/staticcheckanalyzers/sa1024/BUILD.bazel b/build/bazelutil/staticcheckanalyzers/sa1024/BUILD.bazel new file mode 100644 index 000000000000..8c5ecdfd9cbb --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa1024/BUILD.bazel @@ -0,0 +1,13 @@ +load("@io_bazel_rules_go//go:def.bzl", "go_library") + +go_library( + name = "sa1024", + srcs = ["analyzer.go"], + importpath = "github.com/cockroachdb/cockroach/build/bazelutil/staticcheckanalyzers/sa1024", + visibility = ["//visibility:public"], + deps = [ + "//pkg/testutils/lint/passes/staticcheck", + "@co_honnef_go_tools//staticcheck", + "@org_golang_x_tools//go/analysis", + ], +) diff --git a/build/bazelutil/staticcheckanalyzers/sa1024/analyzer.go b/build/bazelutil/staticcheckanalyzers/sa1024/analyzer.go new file mode 100644 index 000000000000..acc052bd6e13 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa1024/analyzer.go @@ -0,0 +1,24 @@ +// Code generated by generate-staticcheck; DO NOT EDIT. + +//go:build bazel +// +build bazel + +package sa1024 + +import ( + util "github.com/cockroachdb/cockroach/pkg/testutils/lint/passes/staticcheck" + "golang.org/x/tools/go/analysis" + "honnef.co/go/tools/staticcheck" +) + +var Analyzer *analysis.Analyzer + +func init() { + for _, analyzer := range staticcheck.Analyzers { + if analyzer.Analyzer.Name == "SA1024" { + Analyzer = analyzer.Analyzer + break + } + } + util.MungeAnalyzer(Analyzer) +} diff --git a/build/bazelutil/staticcheckanalyzers/sa1025/BUILD.bazel b/build/bazelutil/staticcheckanalyzers/sa1025/BUILD.bazel new file mode 100644 index 000000000000..f73118b9db3c --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa1025/BUILD.bazel @@ -0,0 +1,13 @@ +load("@io_bazel_rules_go//go:def.bzl", "go_library") + +go_library( + name = "sa1025", + srcs = ["analyzer.go"], + importpath = "github.com/cockroachdb/cockroach/build/bazelutil/staticcheckanalyzers/sa1025", + visibility = ["//visibility:public"], + deps = [ + "//pkg/testutils/lint/passes/staticcheck", + "@co_honnef_go_tools//staticcheck", + "@org_golang_x_tools//go/analysis", + ], +) diff --git a/build/bazelutil/staticcheckanalyzers/sa1025/analyzer.go b/build/bazelutil/staticcheckanalyzers/sa1025/analyzer.go new file mode 100644 index 000000000000..32e0649d7378 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa1025/analyzer.go @@ -0,0 +1,24 @@ +// Code generated by generate-staticcheck; DO NOT EDIT. + +//go:build bazel +// +build bazel + +package sa1025 + +import ( + util "github.com/cockroachdb/cockroach/pkg/testutils/lint/passes/staticcheck" + "golang.org/x/tools/go/analysis" + "honnef.co/go/tools/staticcheck" +) + +var Analyzer *analysis.Analyzer + +func init() { + for _, analyzer := range staticcheck.Analyzers { + if analyzer.Analyzer.Name == "SA1025" { + Analyzer = analyzer.Analyzer + break + } + } + util.MungeAnalyzer(Analyzer) +} diff --git a/build/bazelutil/staticcheckanalyzers/sa1026/BUILD.bazel b/build/bazelutil/staticcheckanalyzers/sa1026/BUILD.bazel new file mode 100644 index 000000000000..c78b97ebfca6 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa1026/BUILD.bazel @@ -0,0 +1,13 @@ +load("@io_bazel_rules_go//go:def.bzl", "go_library") + +go_library( + name = "sa1026", + srcs = ["analyzer.go"], + importpath = "github.com/cockroachdb/cockroach/build/bazelutil/staticcheckanalyzers/sa1026", + visibility = ["//visibility:public"], + deps = [ + "//pkg/testutils/lint/passes/staticcheck", + "@co_honnef_go_tools//staticcheck", + "@org_golang_x_tools//go/analysis", + ], +) diff --git a/build/bazelutil/staticcheckanalyzers/sa1026/analyzer.go b/build/bazelutil/staticcheckanalyzers/sa1026/analyzer.go new file mode 100644 index 000000000000..c5e696ce6da5 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa1026/analyzer.go @@ -0,0 +1,24 @@ +// Code generated by generate-staticcheck; DO NOT EDIT. + +//go:build bazel +// +build bazel + +package sa1026 + +import ( + util "github.com/cockroachdb/cockroach/pkg/testutils/lint/passes/staticcheck" + "golang.org/x/tools/go/analysis" + "honnef.co/go/tools/staticcheck" +) + +var Analyzer *analysis.Analyzer + +func init() { + for _, analyzer := range staticcheck.Analyzers { + if analyzer.Analyzer.Name == "SA1026" { + Analyzer = analyzer.Analyzer + break + } + } + util.MungeAnalyzer(Analyzer) +} diff --git a/build/bazelutil/staticcheckanalyzers/sa1027/BUILD.bazel b/build/bazelutil/staticcheckanalyzers/sa1027/BUILD.bazel new file mode 100644 index 000000000000..e6b60d13307e --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa1027/BUILD.bazel @@ -0,0 +1,13 @@ +load("@io_bazel_rules_go//go:def.bzl", "go_library") + +go_library( + name = "sa1027", + srcs = ["analyzer.go"], + importpath = "github.com/cockroachdb/cockroach/build/bazelutil/staticcheckanalyzers/sa1027", + visibility = ["//visibility:public"], + deps = [ + "//pkg/testutils/lint/passes/staticcheck", + "@co_honnef_go_tools//staticcheck", + "@org_golang_x_tools//go/analysis", + ], +) diff --git a/build/bazelutil/staticcheckanalyzers/sa1027/analyzer.go b/build/bazelutil/staticcheckanalyzers/sa1027/analyzer.go new file mode 100644 index 000000000000..55572d71e325 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa1027/analyzer.go @@ -0,0 +1,24 @@ +// Code generated by generate-staticcheck; DO NOT EDIT. + +//go:build bazel +// +build bazel + +package sa1027 + +import ( + util "github.com/cockroachdb/cockroach/pkg/testutils/lint/passes/staticcheck" + "golang.org/x/tools/go/analysis" + "honnef.co/go/tools/staticcheck" +) + +var Analyzer *analysis.Analyzer + +func init() { + for _, analyzer := range staticcheck.Analyzers { + if analyzer.Analyzer.Name == "SA1027" { + Analyzer = analyzer.Analyzer + break + } + } + util.MungeAnalyzer(Analyzer) +} diff --git a/build/bazelutil/staticcheckanalyzers/sa1028/BUILD.bazel b/build/bazelutil/staticcheckanalyzers/sa1028/BUILD.bazel new file mode 100644 index 000000000000..edde4ba83779 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa1028/BUILD.bazel @@ -0,0 +1,13 @@ +load("@io_bazel_rules_go//go:def.bzl", "go_library") + +go_library( + name = "sa1028", + srcs = ["analyzer.go"], + importpath = "github.com/cockroachdb/cockroach/build/bazelutil/staticcheckanalyzers/sa1028", + visibility = ["//visibility:public"], + deps = [ + "//pkg/testutils/lint/passes/staticcheck", + "@co_honnef_go_tools//staticcheck", + "@org_golang_x_tools//go/analysis", + ], +) diff --git a/build/bazelutil/staticcheckanalyzers/sa1028/analyzer.go b/build/bazelutil/staticcheckanalyzers/sa1028/analyzer.go new file mode 100644 index 000000000000..9a23b5c2071d --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa1028/analyzer.go @@ -0,0 +1,24 @@ +// Code generated by generate-staticcheck; DO NOT EDIT. + +//go:build bazel +// +build bazel + +package sa1028 + +import ( + util "github.com/cockroachdb/cockroach/pkg/testutils/lint/passes/staticcheck" + "golang.org/x/tools/go/analysis" + "honnef.co/go/tools/staticcheck" +) + +var Analyzer *analysis.Analyzer + +func init() { + for _, analyzer := range staticcheck.Analyzers { + if analyzer.Analyzer.Name == "SA1028" { + Analyzer = analyzer.Analyzer + break + } + } + util.MungeAnalyzer(Analyzer) +} diff --git a/build/bazelutil/staticcheckanalyzers/sa1029/BUILD.bazel b/build/bazelutil/staticcheckanalyzers/sa1029/BUILD.bazel new file mode 100644 index 000000000000..3f8ec7cc6a3f --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa1029/BUILD.bazel @@ -0,0 +1,13 @@ +load("@io_bazel_rules_go//go:def.bzl", "go_library") + +go_library( + name = "sa1029", + srcs = ["analyzer.go"], + importpath = "github.com/cockroachdb/cockroach/build/bazelutil/staticcheckanalyzers/sa1029", + visibility = ["//visibility:public"], + deps = [ + "//pkg/testutils/lint/passes/staticcheck", + "@co_honnef_go_tools//staticcheck", + "@org_golang_x_tools//go/analysis", + ], +) diff --git a/build/bazelutil/staticcheckanalyzers/sa1029/analyzer.go b/build/bazelutil/staticcheckanalyzers/sa1029/analyzer.go new file mode 100644 index 000000000000..ac55442eb729 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa1029/analyzer.go @@ -0,0 +1,24 @@ +// Code generated by generate-staticcheck; DO NOT EDIT. + +//go:build bazel +// +build bazel + +package sa1029 + +import ( + util "github.com/cockroachdb/cockroach/pkg/testutils/lint/passes/staticcheck" + "golang.org/x/tools/go/analysis" + "honnef.co/go/tools/staticcheck" +) + +var Analyzer *analysis.Analyzer + +func init() { + for _, analyzer := range staticcheck.Analyzers { + if analyzer.Analyzer.Name == "SA1029" { + Analyzer = analyzer.Analyzer + break + } + } + util.MungeAnalyzer(Analyzer) +} diff --git a/build/bazelutil/staticcheckanalyzers/sa1030/BUILD.bazel b/build/bazelutil/staticcheckanalyzers/sa1030/BUILD.bazel new file mode 100644 index 000000000000..9701b3296f9d --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa1030/BUILD.bazel @@ -0,0 +1,13 @@ +load("@io_bazel_rules_go//go:def.bzl", "go_library") + +go_library( + name = "sa1030", + srcs = ["analyzer.go"], + importpath = "github.com/cockroachdb/cockroach/build/bazelutil/staticcheckanalyzers/sa1030", + visibility = ["//visibility:public"], + deps = [ + "//pkg/testutils/lint/passes/staticcheck", + "@co_honnef_go_tools//staticcheck", + "@org_golang_x_tools//go/analysis", + ], +) diff --git a/build/bazelutil/staticcheckanalyzers/sa1030/analyzer.go b/build/bazelutil/staticcheckanalyzers/sa1030/analyzer.go new file mode 100644 index 000000000000..0e2b99e8b4cd --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa1030/analyzer.go @@ -0,0 +1,24 @@ +// Code generated by generate-staticcheck; DO NOT EDIT. + +//go:build bazel +// +build bazel + +package sa1030 + +import ( + util "github.com/cockroachdb/cockroach/pkg/testutils/lint/passes/staticcheck" + "golang.org/x/tools/go/analysis" + "honnef.co/go/tools/staticcheck" +) + +var Analyzer *analysis.Analyzer + +func init() { + for _, analyzer := range staticcheck.Analyzers { + if analyzer.Analyzer.Name == "SA1030" { + Analyzer = analyzer.Analyzer + break + } + } + util.MungeAnalyzer(Analyzer) +} diff --git a/build/bazelutil/staticcheckanalyzers/sa2000/BUILD.bazel b/build/bazelutil/staticcheckanalyzers/sa2000/BUILD.bazel new file mode 100644 index 000000000000..58bcec68d3a9 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa2000/BUILD.bazel @@ -0,0 +1,13 @@ +load("@io_bazel_rules_go//go:def.bzl", "go_library") + +go_library( + name = "sa2000", + srcs = ["analyzer.go"], + importpath = "github.com/cockroachdb/cockroach/build/bazelutil/staticcheckanalyzers/sa2000", + visibility = ["//visibility:public"], + deps = [ + "//pkg/testutils/lint/passes/staticcheck", + "@co_honnef_go_tools//staticcheck", + "@org_golang_x_tools//go/analysis", + ], +) diff --git a/build/bazelutil/staticcheckanalyzers/sa2000/analyzer.go b/build/bazelutil/staticcheckanalyzers/sa2000/analyzer.go new file mode 100644 index 000000000000..f4406584ed96 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa2000/analyzer.go @@ -0,0 +1,24 @@ +// Code generated by generate-staticcheck; DO NOT EDIT. + +//go:build bazel +// +build bazel + +package sa2000 + +import ( + util "github.com/cockroachdb/cockroach/pkg/testutils/lint/passes/staticcheck" + "golang.org/x/tools/go/analysis" + "honnef.co/go/tools/staticcheck" +) + +var Analyzer *analysis.Analyzer + +func init() { + for _, analyzer := range staticcheck.Analyzers { + if analyzer.Analyzer.Name == "SA2000" { + Analyzer = analyzer.Analyzer + break + } + } + util.MungeAnalyzer(Analyzer) +} diff --git a/build/bazelutil/staticcheckanalyzers/sa2001/BUILD.bazel b/build/bazelutil/staticcheckanalyzers/sa2001/BUILD.bazel new file mode 100644 index 000000000000..b358613fdc7d --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa2001/BUILD.bazel @@ -0,0 +1,13 @@ +load("@io_bazel_rules_go//go:def.bzl", "go_library") + +go_library( + name = "sa2001", + srcs = ["analyzer.go"], + importpath = "github.com/cockroachdb/cockroach/build/bazelutil/staticcheckanalyzers/sa2001", + visibility = ["//visibility:public"], + deps = [ + "//pkg/testutils/lint/passes/staticcheck", + "@co_honnef_go_tools//staticcheck", + "@org_golang_x_tools//go/analysis", + ], +) diff --git a/build/bazelutil/staticcheckanalyzers/sa2001/analyzer.go b/build/bazelutil/staticcheckanalyzers/sa2001/analyzer.go new file mode 100644 index 000000000000..202a9d36887d --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa2001/analyzer.go @@ -0,0 +1,24 @@ +// Code generated by generate-staticcheck; DO NOT EDIT. + +//go:build bazel +// +build bazel + +package sa2001 + +import ( + util "github.com/cockroachdb/cockroach/pkg/testutils/lint/passes/staticcheck" + "golang.org/x/tools/go/analysis" + "honnef.co/go/tools/staticcheck" +) + +var Analyzer *analysis.Analyzer + +func init() { + for _, analyzer := range staticcheck.Analyzers { + if analyzer.Analyzer.Name == "SA2001" { + Analyzer = analyzer.Analyzer + break + } + } + util.MungeAnalyzer(Analyzer) +} diff --git a/build/bazelutil/staticcheckanalyzers/sa2002/BUILD.bazel b/build/bazelutil/staticcheckanalyzers/sa2002/BUILD.bazel new file mode 100644 index 000000000000..65e33d0370f7 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa2002/BUILD.bazel @@ -0,0 +1,13 @@ +load("@io_bazel_rules_go//go:def.bzl", "go_library") + +go_library( + name = "sa2002", + srcs = ["analyzer.go"], + importpath = "github.com/cockroachdb/cockroach/build/bazelutil/staticcheckanalyzers/sa2002", + visibility = ["//visibility:public"], + deps = [ + "//pkg/testutils/lint/passes/staticcheck", + "@co_honnef_go_tools//staticcheck", + "@org_golang_x_tools//go/analysis", + ], +) diff --git a/build/bazelutil/staticcheckanalyzers/sa2002/analyzer.go b/build/bazelutil/staticcheckanalyzers/sa2002/analyzer.go new file mode 100644 index 000000000000..25d36638dc13 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa2002/analyzer.go @@ -0,0 +1,24 @@ +// Code generated by generate-staticcheck; DO NOT EDIT. + +//go:build bazel +// +build bazel + +package sa2002 + +import ( + util "github.com/cockroachdb/cockroach/pkg/testutils/lint/passes/staticcheck" + "golang.org/x/tools/go/analysis" + "honnef.co/go/tools/staticcheck" +) + +var Analyzer *analysis.Analyzer + +func init() { + for _, analyzer := range staticcheck.Analyzers { + if analyzer.Analyzer.Name == "SA2002" { + Analyzer = analyzer.Analyzer + break + } + } + util.MungeAnalyzer(Analyzer) +} diff --git a/build/bazelutil/staticcheckanalyzers/sa2003/BUILD.bazel b/build/bazelutil/staticcheckanalyzers/sa2003/BUILD.bazel new file mode 100644 index 000000000000..a105f40c5009 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa2003/BUILD.bazel @@ -0,0 +1,13 @@ +load("@io_bazel_rules_go//go:def.bzl", "go_library") + +go_library( + name = "sa2003", + srcs = ["analyzer.go"], + importpath = "github.com/cockroachdb/cockroach/build/bazelutil/staticcheckanalyzers/sa2003", + visibility = ["//visibility:public"], + deps = [ + "//pkg/testutils/lint/passes/staticcheck", + "@co_honnef_go_tools//staticcheck", + "@org_golang_x_tools//go/analysis", + ], +) diff --git a/build/bazelutil/staticcheckanalyzers/sa2003/analyzer.go b/build/bazelutil/staticcheckanalyzers/sa2003/analyzer.go new file mode 100644 index 000000000000..5665d9f8c589 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa2003/analyzer.go @@ -0,0 +1,24 @@ +// Code generated by generate-staticcheck; DO NOT EDIT. + +//go:build bazel +// +build bazel + +package sa2003 + +import ( + util "github.com/cockroachdb/cockroach/pkg/testutils/lint/passes/staticcheck" + "golang.org/x/tools/go/analysis" + "honnef.co/go/tools/staticcheck" +) + +var Analyzer *analysis.Analyzer + +func init() { + for _, analyzer := range staticcheck.Analyzers { + if analyzer.Analyzer.Name == "SA2003" { + Analyzer = analyzer.Analyzer + break + } + } + util.MungeAnalyzer(Analyzer) +} diff --git a/build/bazelutil/staticcheckanalyzers/sa3000/BUILD.bazel b/build/bazelutil/staticcheckanalyzers/sa3000/BUILD.bazel new file mode 100644 index 000000000000..ec0e785bb4d3 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa3000/BUILD.bazel @@ -0,0 +1,13 @@ +load("@io_bazel_rules_go//go:def.bzl", "go_library") + +go_library( + name = "sa3000", + srcs = ["analyzer.go"], + importpath = "github.com/cockroachdb/cockroach/build/bazelutil/staticcheckanalyzers/sa3000", + visibility = ["//visibility:public"], + deps = [ + "//pkg/testutils/lint/passes/staticcheck", + "@co_honnef_go_tools//staticcheck", + "@org_golang_x_tools//go/analysis", + ], +) diff --git a/build/bazelutil/staticcheckanalyzers/sa3000/analyzer.go b/build/bazelutil/staticcheckanalyzers/sa3000/analyzer.go new file mode 100644 index 000000000000..bc4c3d01cce3 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa3000/analyzer.go @@ -0,0 +1,24 @@ +// Code generated by generate-staticcheck; DO NOT EDIT. + +//go:build bazel +// +build bazel + +package sa3000 + +import ( + util "github.com/cockroachdb/cockroach/pkg/testutils/lint/passes/staticcheck" + "golang.org/x/tools/go/analysis" + "honnef.co/go/tools/staticcheck" +) + +var Analyzer *analysis.Analyzer + +func init() { + for _, analyzer := range staticcheck.Analyzers { + if analyzer.Analyzer.Name == "SA3000" { + Analyzer = analyzer.Analyzer + break + } + } + util.MungeAnalyzer(Analyzer) +} diff --git a/build/bazelutil/staticcheckanalyzers/sa3001/BUILD.bazel b/build/bazelutil/staticcheckanalyzers/sa3001/BUILD.bazel new file mode 100644 index 000000000000..9c1af386b583 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa3001/BUILD.bazel @@ -0,0 +1,13 @@ +load("@io_bazel_rules_go//go:def.bzl", "go_library") + +go_library( + name = "sa3001", + srcs = ["analyzer.go"], + importpath = "github.com/cockroachdb/cockroach/build/bazelutil/staticcheckanalyzers/sa3001", + visibility = ["//visibility:public"], + deps = [ + "//pkg/testutils/lint/passes/staticcheck", + "@co_honnef_go_tools//staticcheck", + "@org_golang_x_tools//go/analysis", + ], +) diff --git a/build/bazelutil/staticcheckanalyzers/sa3001/analyzer.go b/build/bazelutil/staticcheckanalyzers/sa3001/analyzer.go new file mode 100644 index 000000000000..6127f07e9b94 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa3001/analyzer.go @@ -0,0 +1,24 @@ +// Code generated by generate-staticcheck; DO NOT EDIT. + +//go:build bazel +// +build bazel + +package sa3001 + +import ( + util "github.com/cockroachdb/cockroach/pkg/testutils/lint/passes/staticcheck" + "golang.org/x/tools/go/analysis" + "honnef.co/go/tools/staticcheck" +) + +var Analyzer *analysis.Analyzer + +func init() { + for _, analyzer := range staticcheck.Analyzers { + if analyzer.Analyzer.Name == "SA3001" { + Analyzer = analyzer.Analyzer + break + } + } + util.MungeAnalyzer(Analyzer) +} diff --git a/build/bazelutil/staticcheckanalyzers/sa4000/BUILD.bazel b/build/bazelutil/staticcheckanalyzers/sa4000/BUILD.bazel new file mode 100644 index 000000000000..60993906bd3f --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa4000/BUILD.bazel @@ -0,0 +1,13 @@ +load("@io_bazel_rules_go//go:def.bzl", "go_library") + +go_library( + name = "sa4000", + srcs = ["analyzer.go"], + importpath = "github.com/cockroachdb/cockroach/build/bazelutil/staticcheckanalyzers/sa4000", + visibility = ["//visibility:public"], + deps = [ + "//pkg/testutils/lint/passes/staticcheck", + "@co_honnef_go_tools//staticcheck", + "@org_golang_x_tools//go/analysis", + ], +) diff --git a/build/bazelutil/staticcheckanalyzers/sa4000/analyzer.go b/build/bazelutil/staticcheckanalyzers/sa4000/analyzer.go new file mode 100644 index 000000000000..1ab514adefa6 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa4000/analyzer.go @@ -0,0 +1,24 @@ +// Code generated by generate-staticcheck; DO NOT EDIT. + +//go:build bazel +// +build bazel + +package sa4000 + +import ( + util "github.com/cockroachdb/cockroach/pkg/testutils/lint/passes/staticcheck" + "golang.org/x/tools/go/analysis" + "honnef.co/go/tools/staticcheck" +) + +var Analyzer *analysis.Analyzer + +func init() { + for _, analyzer := range staticcheck.Analyzers { + if analyzer.Analyzer.Name == "SA4000" { + Analyzer = analyzer.Analyzer + break + } + } + util.MungeAnalyzer(Analyzer) +} diff --git a/build/bazelutil/staticcheckanalyzers/sa4001/BUILD.bazel b/build/bazelutil/staticcheckanalyzers/sa4001/BUILD.bazel new file mode 100644 index 000000000000..35e7db70a04a --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa4001/BUILD.bazel @@ -0,0 +1,13 @@ +load("@io_bazel_rules_go//go:def.bzl", "go_library") + +go_library( + name = "sa4001", + srcs = ["analyzer.go"], + importpath = "github.com/cockroachdb/cockroach/build/bazelutil/staticcheckanalyzers/sa4001", + visibility = ["//visibility:public"], + deps = [ + "//pkg/testutils/lint/passes/staticcheck", + "@co_honnef_go_tools//staticcheck", + "@org_golang_x_tools//go/analysis", + ], +) diff --git a/build/bazelutil/staticcheckanalyzers/sa4001/analyzer.go b/build/bazelutil/staticcheckanalyzers/sa4001/analyzer.go new file mode 100644 index 000000000000..105b83d45636 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa4001/analyzer.go @@ -0,0 +1,24 @@ +// Code generated by generate-staticcheck; DO NOT EDIT. + +//go:build bazel +// +build bazel + +package sa4001 + +import ( + util "github.com/cockroachdb/cockroach/pkg/testutils/lint/passes/staticcheck" + "golang.org/x/tools/go/analysis" + "honnef.co/go/tools/staticcheck" +) + +var Analyzer *analysis.Analyzer + +func init() { + for _, analyzer := range staticcheck.Analyzers { + if analyzer.Analyzer.Name == "SA4001" { + Analyzer = analyzer.Analyzer + break + } + } + util.MungeAnalyzer(Analyzer) +} diff --git a/build/bazelutil/staticcheckanalyzers/sa4003/BUILD.bazel b/build/bazelutil/staticcheckanalyzers/sa4003/BUILD.bazel new file mode 100644 index 000000000000..127c3f9b706c --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa4003/BUILD.bazel @@ -0,0 +1,13 @@ +load("@io_bazel_rules_go//go:def.bzl", "go_library") + +go_library( + name = "sa4003", + srcs = ["analyzer.go"], + importpath = "github.com/cockroachdb/cockroach/build/bazelutil/staticcheckanalyzers/sa4003", + visibility = ["//visibility:public"], + deps = [ + "//pkg/testutils/lint/passes/staticcheck", + "@co_honnef_go_tools//staticcheck", + "@org_golang_x_tools//go/analysis", + ], +) diff --git a/build/bazelutil/staticcheckanalyzers/sa4003/analyzer.go b/build/bazelutil/staticcheckanalyzers/sa4003/analyzer.go new file mode 100644 index 000000000000..9115abb4a4c9 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa4003/analyzer.go @@ -0,0 +1,24 @@ +// Code generated by generate-staticcheck; DO NOT EDIT. + +//go:build bazel +// +build bazel + +package sa4003 + +import ( + util "github.com/cockroachdb/cockroach/pkg/testutils/lint/passes/staticcheck" + "golang.org/x/tools/go/analysis" + "honnef.co/go/tools/staticcheck" +) + +var Analyzer *analysis.Analyzer + +func init() { + for _, analyzer := range staticcheck.Analyzers { + if analyzer.Analyzer.Name == "SA4003" { + Analyzer = analyzer.Analyzer + break + } + } + util.MungeAnalyzer(Analyzer) +} diff --git a/build/bazelutil/staticcheckanalyzers/sa4004/BUILD.bazel b/build/bazelutil/staticcheckanalyzers/sa4004/BUILD.bazel new file mode 100644 index 000000000000..684cf396ce8d --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa4004/BUILD.bazel @@ -0,0 +1,13 @@ +load("@io_bazel_rules_go//go:def.bzl", "go_library") + +go_library( + name = "sa4004", + srcs = ["analyzer.go"], + importpath = "github.com/cockroachdb/cockroach/build/bazelutil/staticcheckanalyzers/sa4004", + visibility = ["//visibility:public"], + deps = [ + "//pkg/testutils/lint/passes/staticcheck", + "@co_honnef_go_tools//staticcheck", + "@org_golang_x_tools//go/analysis", + ], +) diff --git a/build/bazelutil/staticcheckanalyzers/sa4004/analyzer.go b/build/bazelutil/staticcheckanalyzers/sa4004/analyzer.go new file mode 100644 index 000000000000..ec53254a17a3 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa4004/analyzer.go @@ -0,0 +1,24 @@ +// Code generated by generate-staticcheck; DO NOT EDIT. + +//go:build bazel +// +build bazel + +package sa4004 + +import ( + util "github.com/cockroachdb/cockroach/pkg/testutils/lint/passes/staticcheck" + "golang.org/x/tools/go/analysis" + "honnef.co/go/tools/staticcheck" +) + +var Analyzer *analysis.Analyzer + +func init() { + for _, analyzer := range staticcheck.Analyzers { + if analyzer.Analyzer.Name == "SA4004" { + Analyzer = analyzer.Analyzer + break + } + } + util.MungeAnalyzer(Analyzer) +} diff --git a/build/bazelutil/staticcheckanalyzers/sa4005/BUILD.bazel b/build/bazelutil/staticcheckanalyzers/sa4005/BUILD.bazel new file mode 100644 index 000000000000..ea32c507c055 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa4005/BUILD.bazel @@ -0,0 +1,13 @@ +load("@io_bazel_rules_go//go:def.bzl", "go_library") + +go_library( + name = "sa4005", + srcs = ["analyzer.go"], + importpath = "github.com/cockroachdb/cockroach/build/bazelutil/staticcheckanalyzers/sa4005", + visibility = ["//visibility:public"], + deps = [ + "//pkg/testutils/lint/passes/staticcheck", + "@co_honnef_go_tools//staticcheck", + "@org_golang_x_tools//go/analysis", + ], +) diff --git a/build/bazelutil/staticcheckanalyzers/sa4005/analyzer.go b/build/bazelutil/staticcheckanalyzers/sa4005/analyzer.go new file mode 100644 index 000000000000..161554e3eb95 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa4005/analyzer.go @@ -0,0 +1,24 @@ +// Code generated by generate-staticcheck; DO NOT EDIT. + +//go:build bazel +// +build bazel + +package sa4005 + +import ( + util "github.com/cockroachdb/cockroach/pkg/testutils/lint/passes/staticcheck" + "golang.org/x/tools/go/analysis" + "honnef.co/go/tools/staticcheck" +) + +var Analyzer *analysis.Analyzer + +func init() { + for _, analyzer := range staticcheck.Analyzers { + if analyzer.Analyzer.Name == "SA4005" { + Analyzer = analyzer.Analyzer + break + } + } + util.MungeAnalyzer(Analyzer) +} diff --git a/build/bazelutil/staticcheckanalyzers/sa4006/BUILD.bazel b/build/bazelutil/staticcheckanalyzers/sa4006/BUILD.bazel new file mode 100644 index 000000000000..a2644ec7db92 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa4006/BUILD.bazel @@ -0,0 +1,13 @@ +load("@io_bazel_rules_go//go:def.bzl", "go_library") + +go_library( + name = "sa4006", + srcs = ["analyzer.go"], + importpath = "github.com/cockroachdb/cockroach/build/bazelutil/staticcheckanalyzers/sa4006", + visibility = ["//visibility:public"], + deps = [ + "//pkg/testutils/lint/passes/staticcheck", + "@co_honnef_go_tools//staticcheck", + "@org_golang_x_tools//go/analysis", + ], +) diff --git a/build/bazelutil/staticcheckanalyzers/sa4006/analyzer.go b/build/bazelutil/staticcheckanalyzers/sa4006/analyzer.go new file mode 100644 index 000000000000..1d1d731d7330 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa4006/analyzer.go @@ -0,0 +1,24 @@ +// Code generated by generate-staticcheck; DO NOT EDIT. + +//go:build bazel +// +build bazel + +package sa4006 + +import ( + util "github.com/cockroachdb/cockroach/pkg/testutils/lint/passes/staticcheck" + "golang.org/x/tools/go/analysis" + "honnef.co/go/tools/staticcheck" +) + +var Analyzer *analysis.Analyzer + +func init() { + for _, analyzer := range staticcheck.Analyzers { + if analyzer.Analyzer.Name == "SA4006" { + Analyzer = analyzer.Analyzer + break + } + } + util.MungeAnalyzer(Analyzer) +} diff --git a/build/bazelutil/staticcheckanalyzers/sa4008/BUILD.bazel b/build/bazelutil/staticcheckanalyzers/sa4008/BUILD.bazel new file mode 100644 index 000000000000..5d6b9f2a8dd0 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa4008/BUILD.bazel @@ -0,0 +1,13 @@ +load("@io_bazel_rules_go//go:def.bzl", "go_library") + +go_library( + name = "sa4008", + srcs = ["analyzer.go"], + importpath = "github.com/cockroachdb/cockroach/build/bazelutil/staticcheckanalyzers/sa4008", + visibility = ["//visibility:public"], + deps = [ + "//pkg/testutils/lint/passes/staticcheck", + "@co_honnef_go_tools//staticcheck", + "@org_golang_x_tools//go/analysis", + ], +) diff --git a/build/bazelutil/staticcheckanalyzers/sa4008/analyzer.go b/build/bazelutil/staticcheckanalyzers/sa4008/analyzer.go new file mode 100644 index 000000000000..e83512b92511 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa4008/analyzer.go @@ -0,0 +1,24 @@ +// Code generated by generate-staticcheck; DO NOT EDIT. + +//go:build bazel +// +build bazel + +package sa4008 + +import ( + util "github.com/cockroachdb/cockroach/pkg/testutils/lint/passes/staticcheck" + "golang.org/x/tools/go/analysis" + "honnef.co/go/tools/staticcheck" +) + +var Analyzer *analysis.Analyzer + +func init() { + for _, analyzer := range staticcheck.Analyzers { + if analyzer.Analyzer.Name == "SA4008" { + Analyzer = analyzer.Analyzer + break + } + } + util.MungeAnalyzer(Analyzer) +} diff --git a/build/bazelutil/staticcheckanalyzers/sa4009/BUILD.bazel b/build/bazelutil/staticcheckanalyzers/sa4009/BUILD.bazel new file mode 100644 index 000000000000..644a0b1bda72 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa4009/BUILD.bazel @@ -0,0 +1,13 @@ +load("@io_bazel_rules_go//go:def.bzl", "go_library") + +go_library( + name = "sa4009", + srcs = ["analyzer.go"], + importpath = "github.com/cockroachdb/cockroach/build/bazelutil/staticcheckanalyzers/sa4009", + visibility = ["//visibility:public"], + deps = [ + "//pkg/testutils/lint/passes/staticcheck", + "@co_honnef_go_tools//staticcheck", + "@org_golang_x_tools//go/analysis", + ], +) diff --git a/build/bazelutil/staticcheckanalyzers/sa4009/analyzer.go b/build/bazelutil/staticcheckanalyzers/sa4009/analyzer.go new file mode 100644 index 000000000000..2673353cd397 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa4009/analyzer.go @@ -0,0 +1,24 @@ +// Code generated by generate-staticcheck; DO NOT EDIT. + +//go:build bazel +// +build bazel + +package sa4009 + +import ( + util "github.com/cockroachdb/cockroach/pkg/testutils/lint/passes/staticcheck" + "golang.org/x/tools/go/analysis" + "honnef.co/go/tools/staticcheck" +) + +var Analyzer *analysis.Analyzer + +func init() { + for _, analyzer := range staticcheck.Analyzers { + if analyzer.Analyzer.Name == "SA4009" { + Analyzer = analyzer.Analyzer + break + } + } + util.MungeAnalyzer(Analyzer) +} diff --git a/build/bazelutil/staticcheckanalyzers/sa4010/BUILD.bazel b/build/bazelutil/staticcheckanalyzers/sa4010/BUILD.bazel new file mode 100644 index 000000000000..5fad734b6f17 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa4010/BUILD.bazel @@ -0,0 +1,13 @@ +load("@io_bazel_rules_go//go:def.bzl", "go_library") + +go_library( + name = "sa4010", + srcs = ["analyzer.go"], + importpath = "github.com/cockroachdb/cockroach/build/bazelutil/staticcheckanalyzers/sa4010", + visibility = ["//visibility:public"], + deps = [ + "//pkg/testutils/lint/passes/staticcheck", + "@co_honnef_go_tools//staticcheck", + "@org_golang_x_tools//go/analysis", + ], +) diff --git a/build/bazelutil/staticcheckanalyzers/sa4010/analyzer.go b/build/bazelutil/staticcheckanalyzers/sa4010/analyzer.go new file mode 100644 index 000000000000..0b86fe4c1b35 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa4010/analyzer.go @@ -0,0 +1,24 @@ +// Code generated by generate-staticcheck; DO NOT EDIT. + +//go:build bazel +// +build bazel + +package sa4010 + +import ( + util "github.com/cockroachdb/cockroach/pkg/testutils/lint/passes/staticcheck" + "golang.org/x/tools/go/analysis" + "honnef.co/go/tools/staticcheck" +) + +var Analyzer *analysis.Analyzer + +func init() { + for _, analyzer := range staticcheck.Analyzers { + if analyzer.Analyzer.Name == "SA4010" { + Analyzer = analyzer.Analyzer + break + } + } + util.MungeAnalyzer(Analyzer) +} diff --git a/build/bazelutil/staticcheckanalyzers/sa4011/BUILD.bazel b/build/bazelutil/staticcheckanalyzers/sa4011/BUILD.bazel new file mode 100644 index 000000000000..08ea9aae1d16 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa4011/BUILD.bazel @@ -0,0 +1,13 @@ +load("@io_bazel_rules_go//go:def.bzl", "go_library") + +go_library( + name = "sa4011", + srcs = ["analyzer.go"], + importpath = "github.com/cockroachdb/cockroach/build/bazelutil/staticcheckanalyzers/sa4011", + visibility = ["//visibility:public"], + deps = [ + "//pkg/testutils/lint/passes/staticcheck", + "@co_honnef_go_tools//staticcheck", + "@org_golang_x_tools//go/analysis", + ], +) diff --git a/build/bazelutil/staticcheckanalyzers/sa4011/analyzer.go b/build/bazelutil/staticcheckanalyzers/sa4011/analyzer.go new file mode 100644 index 000000000000..5680657b9868 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa4011/analyzer.go @@ -0,0 +1,24 @@ +// Code generated by generate-staticcheck; DO NOT EDIT. + +//go:build bazel +// +build bazel + +package sa4011 + +import ( + util "github.com/cockroachdb/cockroach/pkg/testutils/lint/passes/staticcheck" + "golang.org/x/tools/go/analysis" + "honnef.co/go/tools/staticcheck" +) + +var Analyzer *analysis.Analyzer + +func init() { + for _, analyzer := range staticcheck.Analyzers { + if analyzer.Analyzer.Name == "SA4011" { + Analyzer = analyzer.Analyzer + break + } + } + util.MungeAnalyzer(Analyzer) +} diff --git a/build/bazelutil/staticcheckanalyzers/sa4012/BUILD.bazel b/build/bazelutil/staticcheckanalyzers/sa4012/BUILD.bazel new file mode 100644 index 000000000000..2fa64101635f --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa4012/BUILD.bazel @@ -0,0 +1,13 @@ +load("@io_bazel_rules_go//go:def.bzl", "go_library") + +go_library( + name = "sa4012", + srcs = ["analyzer.go"], + importpath = "github.com/cockroachdb/cockroach/build/bazelutil/staticcheckanalyzers/sa4012", + visibility = ["//visibility:public"], + deps = [ + "//pkg/testutils/lint/passes/staticcheck", + "@co_honnef_go_tools//staticcheck", + "@org_golang_x_tools//go/analysis", + ], +) diff --git a/build/bazelutil/staticcheckanalyzers/sa4012/analyzer.go b/build/bazelutil/staticcheckanalyzers/sa4012/analyzer.go new file mode 100644 index 000000000000..d15203d63261 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa4012/analyzer.go @@ -0,0 +1,24 @@ +// Code generated by generate-staticcheck; DO NOT EDIT. + +//go:build bazel +// +build bazel + +package sa4012 + +import ( + util "github.com/cockroachdb/cockroach/pkg/testutils/lint/passes/staticcheck" + "golang.org/x/tools/go/analysis" + "honnef.co/go/tools/staticcheck" +) + +var Analyzer *analysis.Analyzer + +func init() { + for _, analyzer := range staticcheck.Analyzers { + if analyzer.Analyzer.Name == "SA4012" { + Analyzer = analyzer.Analyzer + break + } + } + util.MungeAnalyzer(Analyzer) +} diff --git a/build/bazelutil/staticcheckanalyzers/sa4013/BUILD.bazel b/build/bazelutil/staticcheckanalyzers/sa4013/BUILD.bazel new file mode 100644 index 000000000000..12cbe3119a38 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa4013/BUILD.bazel @@ -0,0 +1,13 @@ +load("@io_bazel_rules_go//go:def.bzl", "go_library") + +go_library( + name = "sa4013", + srcs = ["analyzer.go"], + importpath = "github.com/cockroachdb/cockroach/build/bazelutil/staticcheckanalyzers/sa4013", + visibility = ["//visibility:public"], + deps = [ + "//pkg/testutils/lint/passes/staticcheck", + "@co_honnef_go_tools//staticcheck", + "@org_golang_x_tools//go/analysis", + ], +) diff --git a/build/bazelutil/staticcheckanalyzers/sa4013/analyzer.go b/build/bazelutil/staticcheckanalyzers/sa4013/analyzer.go new file mode 100644 index 000000000000..814b5f01bc9a --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa4013/analyzer.go @@ -0,0 +1,24 @@ +// Code generated by generate-staticcheck; DO NOT EDIT. + +//go:build bazel +// +build bazel + +package sa4013 + +import ( + util "github.com/cockroachdb/cockroach/pkg/testutils/lint/passes/staticcheck" + "golang.org/x/tools/go/analysis" + "honnef.co/go/tools/staticcheck" +) + +var Analyzer *analysis.Analyzer + +func init() { + for _, analyzer := range staticcheck.Analyzers { + if analyzer.Analyzer.Name == "SA4013" { + Analyzer = analyzer.Analyzer + break + } + } + util.MungeAnalyzer(Analyzer) +} diff --git a/build/bazelutil/staticcheckanalyzers/sa4014/BUILD.bazel b/build/bazelutil/staticcheckanalyzers/sa4014/BUILD.bazel new file mode 100644 index 000000000000..dda44a6b23d1 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa4014/BUILD.bazel @@ -0,0 +1,13 @@ +load("@io_bazel_rules_go//go:def.bzl", "go_library") + +go_library( + name = "sa4014", + srcs = ["analyzer.go"], + importpath = "github.com/cockroachdb/cockroach/build/bazelutil/staticcheckanalyzers/sa4014", + visibility = ["//visibility:public"], + deps = [ + "//pkg/testutils/lint/passes/staticcheck", + "@co_honnef_go_tools//staticcheck", + "@org_golang_x_tools//go/analysis", + ], +) diff --git a/build/bazelutil/staticcheckanalyzers/sa4014/analyzer.go b/build/bazelutil/staticcheckanalyzers/sa4014/analyzer.go new file mode 100644 index 000000000000..9157ecb401d7 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa4014/analyzer.go @@ -0,0 +1,24 @@ +// Code generated by generate-staticcheck; DO NOT EDIT. + +//go:build bazel +// +build bazel + +package sa4014 + +import ( + util "github.com/cockroachdb/cockroach/pkg/testutils/lint/passes/staticcheck" + "golang.org/x/tools/go/analysis" + "honnef.co/go/tools/staticcheck" +) + +var Analyzer *analysis.Analyzer + +func init() { + for _, analyzer := range staticcheck.Analyzers { + if analyzer.Analyzer.Name == "SA4014" { + Analyzer = analyzer.Analyzer + break + } + } + util.MungeAnalyzer(Analyzer) +} diff --git a/build/bazelutil/staticcheckanalyzers/sa4015/BUILD.bazel b/build/bazelutil/staticcheckanalyzers/sa4015/BUILD.bazel new file mode 100644 index 000000000000..701a6d3f7ced --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa4015/BUILD.bazel @@ -0,0 +1,13 @@ +load("@io_bazel_rules_go//go:def.bzl", "go_library") + +go_library( + name = "sa4015", + srcs = ["analyzer.go"], + importpath = "github.com/cockroachdb/cockroach/build/bazelutil/staticcheckanalyzers/sa4015", + visibility = ["//visibility:public"], + deps = [ + "//pkg/testutils/lint/passes/staticcheck", + "@co_honnef_go_tools//staticcheck", + "@org_golang_x_tools//go/analysis", + ], +) diff --git a/build/bazelutil/staticcheckanalyzers/sa4015/analyzer.go b/build/bazelutil/staticcheckanalyzers/sa4015/analyzer.go new file mode 100644 index 000000000000..027b4ea93c3f --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa4015/analyzer.go @@ -0,0 +1,24 @@ +// Code generated by generate-staticcheck; DO NOT EDIT. + +//go:build bazel +// +build bazel + +package sa4015 + +import ( + util "github.com/cockroachdb/cockroach/pkg/testutils/lint/passes/staticcheck" + "golang.org/x/tools/go/analysis" + "honnef.co/go/tools/staticcheck" +) + +var Analyzer *analysis.Analyzer + +func init() { + for _, analyzer := range staticcheck.Analyzers { + if analyzer.Analyzer.Name == "SA4015" { + Analyzer = analyzer.Analyzer + break + } + } + util.MungeAnalyzer(Analyzer) +} diff --git a/build/bazelutil/staticcheckanalyzers/sa4016/BUILD.bazel b/build/bazelutil/staticcheckanalyzers/sa4016/BUILD.bazel new file mode 100644 index 000000000000..0eb95bba1f24 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa4016/BUILD.bazel @@ -0,0 +1,13 @@ +load("@io_bazel_rules_go//go:def.bzl", "go_library") + +go_library( + name = "sa4016", + srcs = ["analyzer.go"], + importpath = "github.com/cockroachdb/cockroach/build/bazelutil/staticcheckanalyzers/sa4016", + visibility = ["//visibility:public"], + deps = [ + "//pkg/testutils/lint/passes/staticcheck", + "@co_honnef_go_tools//staticcheck", + "@org_golang_x_tools//go/analysis", + ], +) diff --git a/build/bazelutil/staticcheckanalyzers/sa4016/analyzer.go b/build/bazelutil/staticcheckanalyzers/sa4016/analyzer.go new file mode 100644 index 000000000000..74837ff4e2ac --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa4016/analyzer.go @@ -0,0 +1,24 @@ +// Code generated by generate-staticcheck; DO NOT EDIT. + +//go:build bazel +// +build bazel + +package sa4016 + +import ( + util "github.com/cockroachdb/cockroach/pkg/testutils/lint/passes/staticcheck" + "golang.org/x/tools/go/analysis" + "honnef.co/go/tools/staticcheck" +) + +var Analyzer *analysis.Analyzer + +func init() { + for _, analyzer := range staticcheck.Analyzers { + if analyzer.Analyzer.Name == "SA4016" { + Analyzer = analyzer.Analyzer + break + } + } + util.MungeAnalyzer(Analyzer) +} diff --git a/build/bazelutil/staticcheckanalyzers/sa4017/BUILD.bazel b/build/bazelutil/staticcheckanalyzers/sa4017/BUILD.bazel new file mode 100644 index 000000000000..b5b6c1a7f6ce --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa4017/BUILD.bazel @@ -0,0 +1,13 @@ +load("@io_bazel_rules_go//go:def.bzl", "go_library") + +go_library( + name = "sa4017", + srcs = ["analyzer.go"], + importpath = "github.com/cockroachdb/cockroach/build/bazelutil/staticcheckanalyzers/sa4017", + visibility = ["//visibility:public"], + deps = [ + "//pkg/testutils/lint/passes/staticcheck", + "@co_honnef_go_tools//staticcheck", + "@org_golang_x_tools//go/analysis", + ], +) diff --git a/build/bazelutil/staticcheckanalyzers/sa4017/analyzer.go b/build/bazelutil/staticcheckanalyzers/sa4017/analyzer.go new file mode 100644 index 000000000000..d58c6d9de808 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa4017/analyzer.go @@ -0,0 +1,24 @@ +// Code generated by generate-staticcheck; DO NOT EDIT. + +//go:build bazel +// +build bazel + +package sa4017 + +import ( + util "github.com/cockroachdb/cockroach/pkg/testutils/lint/passes/staticcheck" + "golang.org/x/tools/go/analysis" + "honnef.co/go/tools/staticcheck" +) + +var Analyzer *analysis.Analyzer + +func init() { + for _, analyzer := range staticcheck.Analyzers { + if analyzer.Analyzer.Name == "SA4017" { + Analyzer = analyzer.Analyzer + break + } + } + util.MungeAnalyzer(Analyzer) +} diff --git a/build/bazelutil/staticcheckanalyzers/sa4018/BUILD.bazel b/build/bazelutil/staticcheckanalyzers/sa4018/BUILD.bazel new file mode 100644 index 000000000000..b01a9dfbc5cc --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa4018/BUILD.bazel @@ -0,0 +1,13 @@ +load("@io_bazel_rules_go//go:def.bzl", "go_library") + +go_library( + name = "sa4018", + srcs = ["analyzer.go"], + importpath = "github.com/cockroachdb/cockroach/build/bazelutil/staticcheckanalyzers/sa4018", + visibility = ["//visibility:public"], + deps = [ + "//pkg/testutils/lint/passes/staticcheck", + "@co_honnef_go_tools//staticcheck", + "@org_golang_x_tools//go/analysis", + ], +) diff --git a/build/bazelutil/staticcheckanalyzers/sa4018/analyzer.go b/build/bazelutil/staticcheckanalyzers/sa4018/analyzer.go new file mode 100644 index 000000000000..30d2d34669ed --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa4018/analyzer.go @@ -0,0 +1,24 @@ +// Code generated by generate-staticcheck; DO NOT EDIT. + +//go:build bazel +// +build bazel + +package sa4018 + +import ( + util "github.com/cockroachdb/cockroach/pkg/testutils/lint/passes/staticcheck" + "golang.org/x/tools/go/analysis" + "honnef.co/go/tools/staticcheck" +) + +var Analyzer *analysis.Analyzer + +func init() { + for _, analyzer := range staticcheck.Analyzers { + if analyzer.Analyzer.Name == "SA4018" { + Analyzer = analyzer.Analyzer + break + } + } + util.MungeAnalyzer(Analyzer) +} diff --git a/build/bazelutil/staticcheckanalyzers/sa4019/BUILD.bazel b/build/bazelutil/staticcheckanalyzers/sa4019/BUILD.bazel new file mode 100644 index 000000000000..6b9a3e775e61 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa4019/BUILD.bazel @@ -0,0 +1,13 @@ +load("@io_bazel_rules_go//go:def.bzl", "go_library") + +go_library( + name = "sa4019", + srcs = ["analyzer.go"], + importpath = "github.com/cockroachdb/cockroach/build/bazelutil/staticcheckanalyzers/sa4019", + visibility = ["//visibility:public"], + deps = [ + "//pkg/testutils/lint/passes/staticcheck", + "@co_honnef_go_tools//staticcheck", + "@org_golang_x_tools//go/analysis", + ], +) diff --git a/build/bazelutil/staticcheckanalyzers/sa4019/analyzer.go b/build/bazelutil/staticcheckanalyzers/sa4019/analyzer.go new file mode 100644 index 000000000000..adf338470cfe --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa4019/analyzer.go @@ -0,0 +1,24 @@ +// Code generated by generate-staticcheck; DO NOT EDIT. + +//go:build bazel +// +build bazel + +package sa4019 + +import ( + util "github.com/cockroachdb/cockroach/pkg/testutils/lint/passes/staticcheck" + "golang.org/x/tools/go/analysis" + "honnef.co/go/tools/staticcheck" +) + +var Analyzer *analysis.Analyzer + +func init() { + for _, analyzer := range staticcheck.Analyzers { + if analyzer.Analyzer.Name == "SA4019" { + Analyzer = analyzer.Analyzer + break + } + } + util.MungeAnalyzer(Analyzer) +} diff --git a/build/bazelutil/staticcheckanalyzers/sa4020/BUILD.bazel b/build/bazelutil/staticcheckanalyzers/sa4020/BUILD.bazel new file mode 100644 index 000000000000..08676aa28a83 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa4020/BUILD.bazel @@ -0,0 +1,13 @@ +load("@io_bazel_rules_go//go:def.bzl", "go_library") + +go_library( + name = "sa4020", + srcs = ["analyzer.go"], + importpath = "github.com/cockroachdb/cockroach/build/bazelutil/staticcheckanalyzers/sa4020", + visibility = ["//visibility:public"], + deps = [ + "//pkg/testutils/lint/passes/staticcheck", + "@co_honnef_go_tools//staticcheck", + "@org_golang_x_tools//go/analysis", + ], +) diff --git a/build/bazelutil/staticcheckanalyzers/sa4020/analyzer.go b/build/bazelutil/staticcheckanalyzers/sa4020/analyzer.go new file mode 100644 index 000000000000..71e03f18d51e --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa4020/analyzer.go @@ -0,0 +1,24 @@ +// Code generated by generate-staticcheck; DO NOT EDIT. + +//go:build bazel +// +build bazel + +package sa4020 + +import ( + util "github.com/cockroachdb/cockroach/pkg/testutils/lint/passes/staticcheck" + "golang.org/x/tools/go/analysis" + "honnef.co/go/tools/staticcheck" +) + +var Analyzer *analysis.Analyzer + +func init() { + for _, analyzer := range staticcheck.Analyzers { + if analyzer.Analyzer.Name == "SA4020" { + Analyzer = analyzer.Analyzer + break + } + } + util.MungeAnalyzer(Analyzer) +} diff --git a/build/bazelutil/staticcheckanalyzers/sa4021/BUILD.bazel b/build/bazelutil/staticcheckanalyzers/sa4021/BUILD.bazel new file mode 100644 index 000000000000..eadd8ad38081 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa4021/BUILD.bazel @@ -0,0 +1,13 @@ +load("@io_bazel_rules_go//go:def.bzl", "go_library") + +go_library( + name = "sa4021", + srcs = ["analyzer.go"], + importpath = "github.com/cockroachdb/cockroach/build/bazelutil/staticcheckanalyzers/sa4021", + visibility = ["//visibility:public"], + deps = [ + "//pkg/testutils/lint/passes/staticcheck", + "@co_honnef_go_tools//staticcheck", + "@org_golang_x_tools//go/analysis", + ], +) diff --git a/build/bazelutil/staticcheckanalyzers/sa4021/analyzer.go b/build/bazelutil/staticcheckanalyzers/sa4021/analyzer.go new file mode 100644 index 000000000000..cb243bedb81c --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa4021/analyzer.go @@ -0,0 +1,24 @@ +// Code generated by generate-staticcheck; DO NOT EDIT. + +//go:build bazel +// +build bazel + +package sa4021 + +import ( + util "github.com/cockroachdb/cockroach/pkg/testutils/lint/passes/staticcheck" + "golang.org/x/tools/go/analysis" + "honnef.co/go/tools/staticcheck" +) + +var Analyzer *analysis.Analyzer + +func init() { + for _, analyzer := range staticcheck.Analyzers { + if analyzer.Analyzer.Name == "SA4021" { + Analyzer = analyzer.Analyzer + break + } + } + util.MungeAnalyzer(Analyzer) +} diff --git a/build/bazelutil/staticcheckanalyzers/sa4022/BUILD.bazel b/build/bazelutil/staticcheckanalyzers/sa4022/BUILD.bazel new file mode 100644 index 000000000000..4191889382c4 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa4022/BUILD.bazel @@ -0,0 +1,13 @@ +load("@io_bazel_rules_go//go:def.bzl", "go_library") + +go_library( + name = "sa4022", + srcs = ["analyzer.go"], + importpath = "github.com/cockroachdb/cockroach/build/bazelutil/staticcheckanalyzers/sa4022", + visibility = ["//visibility:public"], + deps = [ + "//pkg/testutils/lint/passes/staticcheck", + "@co_honnef_go_tools//staticcheck", + "@org_golang_x_tools//go/analysis", + ], +) diff --git a/build/bazelutil/staticcheckanalyzers/sa4022/analyzer.go b/build/bazelutil/staticcheckanalyzers/sa4022/analyzer.go new file mode 100644 index 000000000000..8ceda68bfd7e --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa4022/analyzer.go @@ -0,0 +1,24 @@ +// Code generated by generate-staticcheck; DO NOT EDIT. + +//go:build bazel +// +build bazel + +package sa4022 + +import ( + util "github.com/cockroachdb/cockroach/pkg/testutils/lint/passes/staticcheck" + "golang.org/x/tools/go/analysis" + "honnef.co/go/tools/staticcheck" +) + +var Analyzer *analysis.Analyzer + +func init() { + for _, analyzer := range staticcheck.Analyzers { + if analyzer.Analyzer.Name == "SA4022" { + Analyzer = analyzer.Analyzer + break + } + } + util.MungeAnalyzer(Analyzer) +} diff --git a/build/bazelutil/staticcheckanalyzers/sa4023/BUILD.bazel b/build/bazelutil/staticcheckanalyzers/sa4023/BUILD.bazel new file mode 100644 index 000000000000..5147d9be863d --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa4023/BUILD.bazel @@ -0,0 +1,13 @@ +load("@io_bazel_rules_go//go:def.bzl", "go_library") + +go_library( + name = "sa4023", + srcs = ["analyzer.go"], + importpath = "github.com/cockroachdb/cockroach/build/bazelutil/staticcheckanalyzers/sa4023", + visibility = ["//visibility:public"], + deps = [ + "//pkg/testutils/lint/passes/staticcheck", + "@co_honnef_go_tools//staticcheck", + "@org_golang_x_tools//go/analysis", + ], +) diff --git a/build/bazelutil/staticcheckanalyzers/sa4023/analyzer.go b/build/bazelutil/staticcheckanalyzers/sa4023/analyzer.go new file mode 100644 index 000000000000..c0d08c712cf4 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa4023/analyzer.go @@ -0,0 +1,24 @@ +// Code generated by generate-staticcheck; DO NOT EDIT. + +//go:build bazel +// +build bazel + +package sa4023 + +import ( + util "github.com/cockroachdb/cockroach/pkg/testutils/lint/passes/staticcheck" + "golang.org/x/tools/go/analysis" + "honnef.co/go/tools/staticcheck" +) + +var Analyzer *analysis.Analyzer + +func init() { + for _, analyzer := range staticcheck.Analyzers { + if analyzer.Analyzer.Name == "SA4023" { + Analyzer = analyzer.Analyzer + break + } + } + util.MungeAnalyzer(Analyzer) +} diff --git a/build/bazelutil/staticcheckanalyzers/sa4024/BUILD.bazel b/build/bazelutil/staticcheckanalyzers/sa4024/BUILD.bazel new file mode 100644 index 000000000000..d2b9232848db --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa4024/BUILD.bazel @@ -0,0 +1,13 @@ +load("@io_bazel_rules_go//go:def.bzl", "go_library") + +go_library( + name = "sa4024", + srcs = ["analyzer.go"], + importpath = "github.com/cockroachdb/cockroach/build/bazelutil/staticcheckanalyzers/sa4024", + visibility = ["//visibility:public"], + deps = [ + "//pkg/testutils/lint/passes/staticcheck", + "@co_honnef_go_tools//staticcheck", + "@org_golang_x_tools//go/analysis", + ], +) diff --git a/build/bazelutil/staticcheckanalyzers/sa4024/analyzer.go b/build/bazelutil/staticcheckanalyzers/sa4024/analyzer.go new file mode 100644 index 000000000000..441c84857bb9 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa4024/analyzer.go @@ -0,0 +1,24 @@ +// Code generated by generate-staticcheck; DO NOT EDIT. + +//go:build bazel +// +build bazel + +package sa4024 + +import ( + util "github.com/cockroachdb/cockroach/pkg/testutils/lint/passes/staticcheck" + "golang.org/x/tools/go/analysis" + "honnef.co/go/tools/staticcheck" +) + +var Analyzer *analysis.Analyzer + +func init() { + for _, analyzer := range staticcheck.Analyzers { + if analyzer.Analyzer.Name == "SA4024" { + Analyzer = analyzer.Analyzer + break + } + } + util.MungeAnalyzer(Analyzer) +} diff --git a/build/bazelutil/staticcheckanalyzers/sa4025/BUILD.bazel b/build/bazelutil/staticcheckanalyzers/sa4025/BUILD.bazel new file mode 100644 index 000000000000..0313b03a0e1f --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa4025/BUILD.bazel @@ -0,0 +1,13 @@ +load("@io_bazel_rules_go//go:def.bzl", "go_library") + +go_library( + name = "sa4025", + srcs = ["analyzer.go"], + importpath = "github.com/cockroachdb/cockroach/build/bazelutil/staticcheckanalyzers/sa4025", + visibility = ["//visibility:public"], + deps = [ + "//pkg/testutils/lint/passes/staticcheck", + "@co_honnef_go_tools//staticcheck", + "@org_golang_x_tools//go/analysis", + ], +) diff --git a/build/bazelutil/staticcheckanalyzers/sa4025/analyzer.go b/build/bazelutil/staticcheckanalyzers/sa4025/analyzer.go new file mode 100644 index 000000000000..00cbe6e72a2c --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa4025/analyzer.go @@ -0,0 +1,24 @@ +// Code generated by generate-staticcheck; DO NOT EDIT. + +//go:build bazel +// +build bazel + +package sa4025 + +import ( + util "github.com/cockroachdb/cockroach/pkg/testutils/lint/passes/staticcheck" + "golang.org/x/tools/go/analysis" + "honnef.co/go/tools/staticcheck" +) + +var Analyzer *analysis.Analyzer + +func init() { + for _, analyzer := range staticcheck.Analyzers { + if analyzer.Analyzer.Name == "SA4025" { + Analyzer = analyzer.Analyzer + break + } + } + util.MungeAnalyzer(Analyzer) +} diff --git a/build/bazelutil/staticcheckanalyzers/sa4026/BUILD.bazel b/build/bazelutil/staticcheckanalyzers/sa4026/BUILD.bazel new file mode 100644 index 000000000000..5a1128723273 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa4026/BUILD.bazel @@ -0,0 +1,13 @@ +load("@io_bazel_rules_go//go:def.bzl", "go_library") + +go_library( + name = "sa4026", + srcs = ["analyzer.go"], + importpath = "github.com/cockroachdb/cockroach/build/bazelutil/staticcheckanalyzers/sa4026", + visibility = ["//visibility:public"], + deps = [ + "//pkg/testutils/lint/passes/staticcheck", + "@co_honnef_go_tools//staticcheck", + "@org_golang_x_tools//go/analysis", + ], +) diff --git a/build/bazelutil/staticcheckanalyzers/sa4026/analyzer.go b/build/bazelutil/staticcheckanalyzers/sa4026/analyzer.go new file mode 100644 index 000000000000..59532b1f7fcc --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa4026/analyzer.go @@ -0,0 +1,24 @@ +// Code generated by generate-staticcheck; DO NOT EDIT. + +//go:build bazel +// +build bazel + +package sa4026 + +import ( + util "github.com/cockroachdb/cockroach/pkg/testutils/lint/passes/staticcheck" + "golang.org/x/tools/go/analysis" + "honnef.co/go/tools/staticcheck" +) + +var Analyzer *analysis.Analyzer + +func init() { + for _, analyzer := range staticcheck.Analyzers { + if analyzer.Analyzer.Name == "SA4026" { + Analyzer = analyzer.Analyzer + break + } + } + util.MungeAnalyzer(Analyzer) +} diff --git a/build/bazelutil/staticcheckanalyzers/sa4027/BUILD.bazel b/build/bazelutil/staticcheckanalyzers/sa4027/BUILD.bazel new file mode 100644 index 000000000000..c75477192724 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa4027/BUILD.bazel @@ -0,0 +1,13 @@ +load("@io_bazel_rules_go//go:def.bzl", "go_library") + +go_library( + name = "sa4027", + srcs = ["analyzer.go"], + importpath = "github.com/cockroachdb/cockroach/build/bazelutil/staticcheckanalyzers/sa4027", + visibility = ["//visibility:public"], + deps = [ + "//pkg/testutils/lint/passes/staticcheck", + "@co_honnef_go_tools//staticcheck", + "@org_golang_x_tools//go/analysis", + ], +) diff --git a/build/bazelutil/staticcheckanalyzers/sa4027/analyzer.go b/build/bazelutil/staticcheckanalyzers/sa4027/analyzer.go new file mode 100644 index 000000000000..f7228c98dcbf --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa4027/analyzer.go @@ -0,0 +1,24 @@ +// Code generated by generate-staticcheck; DO NOT EDIT. + +//go:build bazel +// +build bazel + +package sa4027 + +import ( + util "github.com/cockroachdb/cockroach/pkg/testutils/lint/passes/staticcheck" + "golang.org/x/tools/go/analysis" + "honnef.co/go/tools/staticcheck" +) + +var Analyzer *analysis.Analyzer + +func init() { + for _, analyzer := range staticcheck.Analyzers { + if analyzer.Analyzer.Name == "SA4027" { + Analyzer = analyzer.Analyzer + break + } + } + util.MungeAnalyzer(Analyzer) +} diff --git a/build/bazelutil/staticcheckanalyzers/sa5000/BUILD.bazel b/build/bazelutil/staticcheckanalyzers/sa5000/BUILD.bazel new file mode 100644 index 000000000000..9bd11d66c03e --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa5000/BUILD.bazel @@ -0,0 +1,13 @@ +load("@io_bazel_rules_go//go:def.bzl", "go_library") + +go_library( + name = "sa5000", + srcs = ["analyzer.go"], + importpath = "github.com/cockroachdb/cockroach/build/bazelutil/staticcheckanalyzers/sa5000", + visibility = ["//visibility:public"], + deps = [ + "//pkg/testutils/lint/passes/staticcheck", + "@co_honnef_go_tools//staticcheck", + "@org_golang_x_tools//go/analysis", + ], +) diff --git a/build/bazelutil/staticcheckanalyzers/sa5000/analyzer.go b/build/bazelutil/staticcheckanalyzers/sa5000/analyzer.go new file mode 100644 index 000000000000..a4ab71fc5e6c --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa5000/analyzer.go @@ -0,0 +1,24 @@ +// Code generated by generate-staticcheck; DO NOT EDIT. + +//go:build bazel +// +build bazel + +package sa5000 + +import ( + util "github.com/cockroachdb/cockroach/pkg/testutils/lint/passes/staticcheck" + "golang.org/x/tools/go/analysis" + "honnef.co/go/tools/staticcheck" +) + +var Analyzer *analysis.Analyzer + +func init() { + for _, analyzer := range staticcheck.Analyzers { + if analyzer.Analyzer.Name == "SA5000" { + Analyzer = analyzer.Analyzer + break + } + } + util.MungeAnalyzer(Analyzer) +} diff --git a/build/bazelutil/staticcheckanalyzers/sa5001/BUILD.bazel b/build/bazelutil/staticcheckanalyzers/sa5001/BUILD.bazel new file mode 100644 index 000000000000..ce3e4b979fc8 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa5001/BUILD.bazel @@ -0,0 +1,13 @@ +load("@io_bazel_rules_go//go:def.bzl", "go_library") + +go_library( + name = "sa5001", + srcs = ["analyzer.go"], + importpath = "github.com/cockroachdb/cockroach/build/bazelutil/staticcheckanalyzers/sa5001", + visibility = ["//visibility:public"], + deps = [ + "//pkg/testutils/lint/passes/staticcheck", + "@co_honnef_go_tools//staticcheck", + "@org_golang_x_tools//go/analysis", + ], +) diff --git a/build/bazelutil/staticcheckanalyzers/sa5001/analyzer.go b/build/bazelutil/staticcheckanalyzers/sa5001/analyzer.go new file mode 100644 index 000000000000..aa63064b122b --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa5001/analyzer.go @@ -0,0 +1,24 @@ +// Code generated by generate-staticcheck; DO NOT EDIT. + +//go:build bazel +// +build bazel + +package sa5001 + +import ( + util "github.com/cockroachdb/cockroach/pkg/testutils/lint/passes/staticcheck" + "golang.org/x/tools/go/analysis" + "honnef.co/go/tools/staticcheck" +) + +var Analyzer *analysis.Analyzer + +func init() { + for _, analyzer := range staticcheck.Analyzers { + if analyzer.Analyzer.Name == "SA5001" { + Analyzer = analyzer.Analyzer + break + } + } + util.MungeAnalyzer(Analyzer) +} diff --git a/build/bazelutil/staticcheckanalyzers/sa5002/BUILD.bazel b/build/bazelutil/staticcheckanalyzers/sa5002/BUILD.bazel new file mode 100644 index 000000000000..b06e3a2878d9 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa5002/BUILD.bazel @@ -0,0 +1,13 @@ +load("@io_bazel_rules_go//go:def.bzl", "go_library") + +go_library( + name = "sa5002", + srcs = ["analyzer.go"], + importpath = "github.com/cockroachdb/cockroach/build/bazelutil/staticcheckanalyzers/sa5002", + visibility = ["//visibility:public"], + deps = [ + "//pkg/testutils/lint/passes/staticcheck", + "@co_honnef_go_tools//staticcheck", + "@org_golang_x_tools//go/analysis", + ], +) diff --git a/build/bazelutil/staticcheckanalyzers/sa5002/analyzer.go b/build/bazelutil/staticcheckanalyzers/sa5002/analyzer.go new file mode 100644 index 000000000000..7f0ff01454cf --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa5002/analyzer.go @@ -0,0 +1,24 @@ +// Code generated by generate-staticcheck; DO NOT EDIT. + +//go:build bazel +// +build bazel + +package sa5002 + +import ( + util "github.com/cockroachdb/cockroach/pkg/testutils/lint/passes/staticcheck" + "golang.org/x/tools/go/analysis" + "honnef.co/go/tools/staticcheck" +) + +var Analyzer *analysis.Analyzer + +func init() { + for _, analyzer := range staticcheck.Analyzers { + if analyzer.Analyzer.Name == "SA5002" { + Analyzer = analyzer.Analyzer + break + } + } + util.MungeAnalyzer(Analyzer) +} diff --git a/build/bazelutil/staticcheckanalyzers/sa5003/BUILD.bazel b/build/bazelutil/staticcheckanalyzers/sa5003/BUILD.bazel new file mode 100644 index 000000000000..7711fa64ce54 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa5003/BUILD.bazel @@ -0,0 +1,13 @@ +load("@io_bazel_rules_go//go:def.bzl", "go_library") + +go_library( + name = "sa5003", + srcs = ["analyzer.go"], + importpath = "github.com/cockroachdb/cockroach/build/bazelutil/staticcheckanalyzers/sa5003", + visibility = ["//visibility:public"], + deps = [ + "//pkg/testutils/lint/passes/staticcheck", + "@co_honnef_go_tools//staticcheck", + "@org_golang_x_tools//go/analysis", + ], +) diff --git a/build/bazelutil/staticcheckanalyzers/sa5003/analyzer.go b/build/bazelutil/staticcheckanalyzers/sa5003/analyzer.go new file mode 100644 index 000000000000..bed4a625cfcb --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa5003/analyzer.go @@ -0,0 +1,24 @@ +// Code generated by generate-staticcheck; DO NOT EDIT. + +//go:build bazel +// +build bazel + +package sa5003 + +import ( + util "github.com/cockroachdb/cockroach/pkg/testutils/lint/passes/staticcheck" + "golang.org/x/tools/go/analysis" + "honnef.co/go/tools/staticcheck" +) + +var Analyzer *analysis.Analyzer + +func init() { + for _, analyzer := range staticcheck.Analyzers { + if analyzer.Analyzer.Name == "SA5003" { + Analyzer = analyzer.Analyzer + break + } + } + util.MungeAnalyzer(Analyzer) +} diff --git a/build/bazelutil/staticcheckanalyzers/sa5004/BUILD.bazel b/build/bazelutil/staticcheckanalyzers/sa5004/BUILD.bazel new file mode 100644 index 000000000000..00035e5b6793 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa5004/BUILD.bazel @@ -0,0 +1,13 @@ +load("@io_bazel_rules_go//go:def.bzl", "go_library") + +go_library( + name = "sa5004", + srcs = ["analyzer.go"], + importpath = "github.com/cockroachdb/cockroach/build/bazelutil/staticcheckanalyzers/sa5004", + visibility = ["//visibility:public"], + deps = [ + "//pkg/testutils/lint/passes/staticcheck", + "@co_honnef_go_tools//staticcheck", + "@org_golang_x_tools//go/analysis", + ], +) diff --git a/build/bazelutil/staticcheckanalyzers/sa5004/analyzer.go b/build/bazelutil/staticcheckanalyzers/sa5004/analyzer.go new file mode 100644 index 000000000000..20b7b80074de --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa5004/analyzer.go @@ -0,0 +1,24 @@ +// Code generated by generate-staticcheck; DO NOT EDIT. + +//go:build bazel +// +build bazel + +package sa5004 + +import ( + util "github.com/cockroachdb/cockroach/pkg/testutils/lint/passes/staticcheck" + "golang.org/x/tools/go/analysis" + "honnef.co/go/tools/staticcheck" +) + +var Analyzer *analysis.Analyzer + +func init() { + for _, analyzer := range staticcheck.Analyzers { + if analyzer.Analyzer.Name == "SA5004" { + Analyzer = analyzer.Analyzer + break + } + } + util.MungeAnalyzer(Analyzer) +} diff --git a/build/bazelutil/staticcheckanalyzers/sa5005/BUILD.bazel b/build/bazelutil/staticcheckanalyzers/sa5005/BUILD.bazel new file mode 100644 index 000000000000..07b6f9f147cb --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa5005/BUILD.bazel @@ -0,0 +1,13 @@ +load("@io_bazel_rules_go//go:def.bzl", "go_library") + +go_library( + name = "sa5005", + srcs = ["analyzer.go"], + importpath = "github.com/cockroachdb/cockroach/build/bazelutil/staticcheckanalyzers/sa5005", + visibility = ["//visibility:public"], + deps = [ + "//pkg/testutils/lint/passes/staticcheck", + "@co_honnef_go_tools//staticcheck", + "@org_golang_x_tools//go/analysis", + ], +) diff --git a/build/bazelutil/staticcheckanalyzers/sa5005/analyzer.go b/build/bazelutil/staticcheckanalyzers/sa5005/analyzer.go new file mode 100644 index 000000000000..97ec6ac00393 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa5005/analyzer.go @@ -0,0 +1,24 @@ +// Code generated by generate-staticcheck; DO NOT EDIT. + +//go:build bazel +// +build bazel + +package sa5005 + +import ( + util "github.com/cockroachdb/cockroach/pkg/testutils/lint/passes/staticcheck" + "golang.org/x/tools/go/analysis" + "honnef.co/go/tools/staticcheck" +) + +var Analyzer *analysis.Analyzer + +func init() { + for _, analyzer := range staticcheck.Analyzers { + if analyzer.Analyzer.Name == "SA5005" { + Analyzer = analyzer.Analyzer + break + } + } + util.MungeAnalyzer(Analyzer) +} diff --git a/build/bazelutil/staticcheckanalyzers/sa5007/BUILD.bazel b/build/bazelutil/staticcheckanalyzers/sa5007/BUILD.bazel new file mode 100644 index 000000000000..4cd2ce90c7da --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa5007/BUILD.bazel @@ -0,0 +1,13 @@ +load("@io_bazel_rules_go//go:def.bzl", "go_library") + +go_library( + name = "sa5007", + srcs = ["analyzer.go"], + importpath = "github.com/cockroachdb/cockroach/build/bazelutil/staticcheckanalyzers/sa5007", + visibility = ["//visibility:public"], + deps = [ + "//pkg/testutils/lint/passes/staticcheck", + "@co_honnef_go_tools//staticcheck", + "@org_golang_x_tools//go/analysis", + ], +) diff --git a/build/bazelutil/staticcheckanalyzers/sa5007/analyzer.go b/build/bazelutil/staticcheckanalyzers/sa5007/analyzer.go new file mode 100644 index 000000000000..1d7adcd2508b --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa5007/analyzer.go @@ -0,0 +1,24 @@ +// Code generated by generate-staticcheck; DO NOT EDIT. + +//go:build bazel +// +build bazel + +package sa5007 + +import ( + util "github.com/cockroachdb/cockroach/pkg/testutils/lint/passes/staticcheck" + "golang.org/x/tools/go/analysis" + "honnef.co/go/tools/staticcheck" +) + +var Analyzer *analysis.Analyzer + +func init() { + for _, analyzer := range staticcheck.Analyzers { + if analyzer.Analyzer.Name == "SA5007" { + Analyzer = analyzer.Analyzer + break + } + } + util.MungeAnalyzer(Analyzer) +} diff --git a/build/bazelutil/staticcheckanalyzers/sa5008/BUILD.bazel b/build/bazelutil/staticcheckanalyzers/sa5008/BUILD.bazel new file mode 100644 index 000000000000..fb2f439951fd --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa5008/BUILD.bazel @@ -0,0 +1,13 @@ +load("@io_bazel_rules_go//go:def.bzl", "go_library") + +go_library( + name = "sa5008", + srcs = ["analyzer.go"], + importpath = "github.com/cockroachdb/cockroach/build/bazelutil/staticcheckanalyzers/sa5008", + visibility = ["//visibility:public"], + deps = [ + "//pkg/testutils/lint/passes/staticcheck", + "@co_honnef_go_tools//staticcheck", + "@org_golang_x_tools//go/analysis", + ], +) diff --git a/build/bazelutil/staticcheckanalyzers/sa5008/analyzer.go b/build/bazelutil/staticcheckanalyzers/sa5008/analyzer.go new file mode 100644 index 000000000000..f8e8af46cfda --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa5008/analyzer.go @@ -0,0 +1,24 @@ +// Code generated by generate-staticcheck; DO NOT EDIT. + +//go:build bazel +// +build bazel + +package sa5008 + +import ( + util "github.com/cockroachdb/cockroach/pkg/testutils/lint/passes/staticcheck" + "golang.org/x/tools/go/analysis" + "honnef.co/go/tools/staticcheck" +) + +var Analyzer *analysis.Analyzer + +func init() { + for _, analyzer := range staticcheck.Analyzers { + if analyzer.Analyzer.Name == "SA5008" { + Analyzer = analyzer.Analyzer + break + } + } + util.MungeAnalyzer(Analyzer) +} diff --git a/build/bazelutil/staticcheckanalyzers/sa5009/BUILD.bazel b/build/bazelutil/staticcheckanalyzers/sa5009/BUILD.bazel new file mode 100644 index 000000000000..34535fe68c34 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa5009/BUILD.bazel @@ -0,0 +1,13 @@ +load("@io_bazel_rules_go//go:def.bzl", "go_library") + +go_library( + name = "sa5009", + srcs = ["analyzer.go"], + importpath = "github.com/cockroachdb/cockroach/build/bazelutil/staticcheckanalyzers/sa5009", + visibility = ["//visibility:public"], + deps = [ + "//pkg/testutils/lint/passes/staticcheck", + "@co_honnef_go_tools//staticcheck", + "@org_golang_x_tools//go/analysis", + ], +) diff --git a/build/bazelutil/staticcheckanalyzers/sa5009/analyzer.go b/build/bazelutil/staticcheckanalyzers/sa5009/analyzer.go new file mode 100644 index 000000000000..3bc0b95c36fc --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa5009/analyzer.go @@ -0,0 +1,24 @@ +// Code generated by generate-staticcheck; DO NOT EDIT. + +//go:build bazel +// +build bazel + +package sa5009 + +import ( + util "github.com/cockroachdb/cockroach/pkg/testutils/lint/passes/staticcheck" + "golang.org/x/tools/go/analysis" + "honnef.co/go/tools/staticcheck" +) + +var Analyzer *analysis.Analyzer + +func init() { + for _, analyzer := range staticcheck.Analyzers { + if analyzer.Analyzer.Name == "SA5009" { + Analyzer = analyzer.Analyzer + break + } + } + util.MungeAnalyzer(Analyzer) +} diff --git a/build/bazelutil/staticcheckanalyzers/sa5010/BUILD.bazel b/build/bazelutil/staticcheckanalyzers/sa5010/BUILD.bazel new file mode 100644 index 000000000000..8f488c21e6f1 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa5010/BUILD.bazel @@ -0,0 +1,13 @@ +load("@io_bazel_rules_go//go:def.bzl", "go_library") + +go_library( + name = "sa5010", + srcs = ["analyzer.go"], + importpath = "github.com/cockroachdb/cockroach/build/bazelutil/staticcheckanalyzers/sa5010", + visibility = ["//visibility:public"], + deps = [ + "//pkg/testutils/lint/passes/staticcheck", + "@co_honnef_go_tools//staticcheck", + "@org_golang_x_tools//go/analysis", + ], +) diff --git a/build/bazelutil/staticcheckanalyzers/sa5010/analyzer.go b/build/bazelutil/staticcheckanalyzers/sa5010/analyzer.go new file mode 100644 index 000000000000..820333f15957 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa5010/analyzer.go @@ -0,0 +1,24 @@ +// Code generated by generate-staticcheck; DO NOT EDIT. + +//go:build bazel +// +build bazel + +package sa5010 + +import ( + util "github.com/cockroachdb/cockroach/pkg/testutils/lint/passes/staticcheck" + "golang.org/x/tools/go/analysis" + "honnef.co/go/tools/staticcheck" +) + +var Analyzer *analysis.Analyzer + +func init() { + for _, analyzer := range staticcheck.Analyzers { + if analyzer.Analyzer.Name == "SA5010" { + Analyzer = analyzer.Analyzer + break + } + } + util.MungeAnalyzer(Analyzer) +} diff --git a/build/bazelutil/staticcheckanalyzers/sa5011/BUILD.bazel b/build/bazelutil/staticcheckanalyzers/sa5011/BUILD.bazel new file mode 100644 index 000000000000..43d6d06916b4 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa5011/BUILD.bazel @@ -0,0 +1,13 @@ +load("@io_bazel_rules_go//go:def.bzl", "go_library") + +go_library( + name = "sa5011", + srcs = ["analyzer.go"], + importpath = "github.com/cockroachdb/cockroach/build/bazelutil/staticcheckanalyzers/sa5011", + visibility = ["//visibility:public"], + deps = [ + "//pkg/testutils/lint/passes/staticcheck", + "@co_honnef_go_tools//staticcheck", + "@org_golang_x_tools//go/analysis", + ], +) diff --git a/build/bazelutil/staticcheckanalyzers/sa5011/analyzer.go b/build/bazelutil/staticcheckanalyzers/sa5011/analyzer.go new file mode 100644 index 000000000000..ca780c70a364 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa5011/analyzer.go @@ -0,0 +1,24 @@ +// Code generated by generate-staticcheck; DO NOT EDIT. + +//go:build bazel +// +build bazel + +package sa5011 + +import ( + util "github.com/cockroachdb/cockroach/pkg/testutils/lint/passes/staticcheck" + "golang.org/x/tools/go/analysis" + "honnef.co/go/tools/staticcheck" +) + +var Analyzer *analysis.Analyzer + +func init() { + for _, analyzer := range staticcheck.Analyzers { + if analyzer.Analyzer.Name == "SA5011" { + Analyzer = analyzer.Analyzer + break + } + } + util.MungeAnalyzer(Analyzer) +} diff --git a/build/bazelutil/staticcheckanalyzers/sa5012/BUILD.bazel b/build/bazelutil/staticcheckanalyzers/sa5012/BUILD.bazel new file mode 100644 index 000000000000..a0a2176b64d8 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa5012/BUILD.bazel @@ -0,0 +1,13 @@ +load("@io_bazel_rules_go//go:def.bzl", "go_library") + +go_library( + name = "sa5012", + srcs = ["analyzer.go"], + importpath = "github.com/cockroachdb/cockroach/build/bazelutil/staticcheckanalyzers/sa5012", + visibility = ["//visibility:public"], + deps = [ + "//pkg/testutils/lint/passes/staticcheck", + "@co_honnef_go_tools//staticcheck", + "@org_golang_x_tools//go/analysis", + ], +) diff --git a/build/bazelutil/staticcheckanalyzers/sa5012/analyzer.go b/build/bazelutil/staticcheckanalyzers/sa5012/analyzer.go new file mode 100644 index 000000000000..c78d520c3696 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa5012/analyzer.go @@ -0,0 +1,24 @@ +// Code generated by generate-staticcheck; DO NOT EDIT. + +//go:build bazel +// +build bazel + +package sa5012 + +import ( + util "github.com/cockroachdb/cockroach/pkg/testutils/lint/passes/staticcheck" + "golang.org/x/tools/go/analysis" + "honnef.co/go/tools/staticcheck" +) + +var Analyzer *analysis.Analyzer + +func init() { + for _, analyzer := range staticcheck.Analyzers { + if analyzer.Analyzer.Name == "SA5012" { + Analyzer = analyzer.Analyzer + break + } + } + util.MungeAnalyzer(Analyzer) +} diff --git a/build/bazelutil/staticcheckanalyzers/sa6000/BUILD.bazel b/build/bazelutil/staticcheckanalyzers/sa6000/BUILD.bazel new file mode 100644 index 000000000000..6b3ecfd8a0b2 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa6000/BUILD.bazel @@ -0,0 +1,13 @@ +load("@io_bazel_rules_go//go:def.bzl", "go_library") + +go_library( + name = "sa6000", + srcs = ["analyzer.go"], + importpath = "github.com/cockroachdb/cockroach/build/bazelutil/staticcheckanalyzers/sa6000", + visibility = ["//visibility:public"], + deps = [ + "//pkg/testutils/lint/passes/staticcheck", + "@co_honnef_go_tools//staticcheck", + "@org_golang_x_tools//go/analysis", + ], +) diff --git a/build/bazelutil/staticcheckanalyzers/sa6000/analyzer.go b/build/bazelutil/staticcheckanalyzers/sa6000/analyzer.go new file mode 100644 index 000000000000..4a9ecf23a703 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa6000/analyzer.go @@ -0,0 +1,24 @@ +// Code generated by generate-staticcheck; DO NOT EDIT. + +//go:build bazel +// +build bazel + +package sa6000 + +import ( + util "github.com/cockroachdb/cockroach/pkg/testutils/lint/passes/staticcheck" + "golang.org/x/tools/go/analysis" + "honnef.co/go/tools/staticcheck" +) + +var Analyzer *analysis.Analyzer + +func init() { + for _, analyzer := range staticcheck.Analyzers { + if analyzer.Analyzer.Name == "SA6000" { + Analyzer = analyzer.Analyzer + break + } + } + util.MungeAnalyzer(Analyzer) +} diff --git a/build/bazelutil/staticcheckanalyzers/sa6001/BUILD.bazel b/build/bazelutil/staticcheckanalyzers/sa6001/BUILD.bazel new file mode 100644 index 000000000000..639176223763 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa6001/BUILD.bazel @@ -0,0 +1,13 @@ +load("@io_bazel_rules_go//go:def.bzl", "go_library") + +go_library( + name = "sa6001", + srcs = ["analyzer.go"], + importpath = "github.com/cockroachdb/cockroach/build/bazelutil/staticcheckanalyzers/sa6001", + visibility = ["//visibility:public"], + deps = [ + "//pkg/testutils/lint/passes/staticcheck", + "@co_honnef_go_tools//staticcheck", + "@org_golang_x_tools//go/analysis", + ], +) diff --git a/build/bazelutil/staticcheckanalyzers/sa6001/analyzer.go b/build/bazelutil/staticcheckanalyzers/sa6001/analyzer.go new file mode 100644 index 000000000000..d0cfc7798348 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa6001/analyzer.go @@ -0,0 +1,24 @@ +// Code generated by generate-staticcheck; DO NOT EDIT. + +//go:build bazel +// +build bazel + +package sa6001 + +import ( + util "github.com/cockroachdb/cockroach/pkg/testutils/lint/passes/staticcheck" + "golang.org/x/tools/go/analysis" + "honnef.co/go/tools/staticcheck" +) + +var Analyzer *analysis.Analyzer + +func init() { + for _, analyzer := range staticcheck.Analyzers { + if analyzer.Analyzer.Name == "SA6001" { + Analyzer = analyzer.Analyzer + break + } + } + util.MungeAnalyzer(Analyzer) +} diff --git a/build/bazelutil/staticcheckanalyzers/sa6002/BUILD.bazel b/build/bazelutil/staticcheckanalyzers/sa6002/BUILD.bazel new file mode 100644 index 000000000000..2eb9dc1b6dba --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa6002/BUILD.bazel @@ -0,0 +1,13 @@ +load("@io_bazel_rules_go//go:def.bzl", "go_library") + +go_library( + name = "sa6002", + srcs = ["analyzer.go"], + importpath = "github.com/cockroachdb/cockroach/build/bazelutil/staticcheckanalyzers/sa6002", + visibility = ["//visibility:public"], + deps = [ + "//pkg/testutils/lint/passes/staticcheck", + "@co_honnef_go_tools//staticcheck", + "@org_golang_x_tools//go/analysis", + ], +) diff --git a/build/bazelutil/staticcheckanalyzers/sa6002/analyzer.go b/build/bazelutil/staticcheckanalyzers/sa6002/analyzer.go new file mode 100644 index 000000000000..051a222c03f5 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa6002/analyzer.go @@ -0,0 +1,24 @@ +// Code generated by generate-staticcheck; DO NOT EDIT. + +//go:build bazel +// +build bazel + +package sa6002 + +import ( + util "github.com/cockroachdb/cockroach/pkg/testutils/lint/passes/staticcheck" + "golang.org/x/tools/go/analysis" + "honnef.co/go/tools/staticcheck" +) + +var Analyzer *analysis.Analyzer + +func init() { + for _, analyzer := range staticcheck.Analyzers { + if analyzer.Analyzer.Name == "SA6002" { + Analyzer = analyzer.Analyzer + break + } + } + util.MungeAnalyzer(Analyzer) +} diff --git a/build/bazelutil/staticcheckanalyzers/sa6003/BUILD.bazel b/build/bazelutil/staticcheckanalyzers/sa6003/BUILD.bazel new file mode 100644 index 000000000000..205909c37885 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa6003/BUILD.bazel @@ -0,0 +1,13 @@ +load("@io_bazel_rules_go//go:def.bzl", "go_library") + +go_library( + name = "sa6003", + srcs = ["analyzer.go"], + importpath = "github.com/cockroachdb/cockroach/build/bazelutil/staticcheckanalyzers/sa6003", + visibility = ["//visibility:public"], + deps = [ + "//pkg/testutils/lint/passes/staticcheck", + "@co_honnef_go_tools//staticcheck", + "@org_golang_x_tools//go/analysis", + ], +) diff --git a/build/bazelutil/staticcheckanalyzers/sa6003/analyzer.go b/build/bazelutil/staticcheckanalyzers/sa6003/analyzer.go new file mode 100644 index 000000000000..aec9a5c23582 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa6003/analyzer.go @@ -0,0 +1,24 @@ +// Code generated by generate-staticcheck; DO NOT EDIT. + +//go:build bazel +// +build bazel + +package sa6003 + +import ( + util "github.com/cockroachdb/cockroach/pkg/testutils/lint/passes/staticcheck" + "golang.org/x/tools/go/analysis" + "honnef.co/go/tools/staticcheck" +) + +var Analyzer *analysis.Analyzer + +func init() { + for _, analyzer := range staticcheck.Analyzers { + if analyzer.Analyzer.Name == "SA6003" { + Analyzer = analyzer.Analyzer + break + } + } + util.MungeAnalyzer(Analyzer) +} diff --git a/build/bazelutil/staticcheckanalyzers/sa6005/BUILD.bazel b/build/bazelutil/staticcheckanalyzers/sa6005/BUILD.bazel new file mode 100644 index 000000000000..f787eb3c5a14 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa6005/BUILD.bazel @@ -0,0 +1,13 @@ +load("@io_bazel_rules_go//go:def.bzl", "go_library") + +go_library( + name = "sa6005", + srcs = ["analyzer.go"], + importpath = "github.com/cockroachdb/cockroach/build/bazelutil/staticcheckanalyzers/sa6005", + visibility = ["//visibility:public"], + deps = [ + "//pkg/testutils/lint/passes/staticcheck", + "@co_honnef_go_tools//staticcheck", + "@org_golang_x_tools//go/analysis", + ], +) diff --git a/build/bazelutil/staticcheckanalyzers/sa6005/analyzer.go b/build/bazelutil/staticcheckanalyzers/sa6005/analyzer.go new file mode 100644 index 000000000000..a2d926d07c03 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa6005/analyzer.go @@ -0,0 +1,24 @@ +// Code generated by generate-staticcheck; DO NOT EDIT. + +//go:build bazel +// +build bazel + +package sa6005 + +import ( + util "github.com/cockroachdb/cockroach/pkg/testutils/lint/passes/staticcheck" + "golang.org/x/tools/go/analysis" + "honnef.co/go/tools/staticcheck" +) + +var Analyzer *analysis.Analyzer + +func init() { + for _, analyzer := range staticcheck.Analyzers { + if analyzer.Analyzer.Name == "SA6005" { + Analyzer = analyzer.Analyzer + break + } + } + util.MungeAnalyzer(Analyzer) +} diff --git a/build/bazelutil/staticcheckanalyzers/sa9001/BUILD.bazel b/build/bazelutil/staticcheckanalyzers/sa9001/BUILD.bazel new file mode 100644 index 000000000000..fe11aa9c904c --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa9001/BUILD.bazel @@ -0,0 +1,13 @@ +load("@io_bazel_rules_go//go:def.bzl", "go_library") + +go_library( + name = "sa9001", + srcs = ["analyzer.go"], + importpath = "github.com/cockroachdb/cockroach/build/bazelutil/staticcheckanalyzers/sa9001", + visibility = ["//visibility:public"], + deps = [ + "//pkg/testutils/lint/passes/staticcheck", + "@co_honnef_go_tools//staticcheck", + "@org_golang_x_tools//go/analysis", + ], +) diff --git a/build/bazelutil/staticcheckanalyzers/sa9001/analyzer.go b/build/bazelutil/staticcheckanalyzers/sa9001/analyzer.go new file mode 100644 index 000000000000..b37c41676a0a --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa9001/analyzer.go @@ -0,0 +1,24 @@ +// Code generated by generate-staticcheck; DO NOT EDIT. + +//go:build bazel +// +build bazel + +package sa9001 + +import ( + util "github.com/cockroachdb/cockroach/pkg/testutils/lint/passes/staticcheck" + "golang.org/x/tools/go/analysis" + "honnef.co/go/tools/staticcheck" +) + +var Analyzer *analysis.Analyzer + +func init() { + for _, analyzer := range staticcheck.Analyzers { + if analyzer.Analyzer.Name == "SA9001" { + Analyzer = analyzer.Analyzer + break + } + } + util.MungeAnalyzer(Analyzer) +} diff --git a/build/bazelutil/staticcheckanalyzers/sa9002/BUILD.bazel b/build/bazelutil/staticcheckanalyzers/sa9002/BUILD.bazel new file mode 100644 index 000000000000..a53e4656472f --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa9002/BUILD.bazel @@ -0,0 +1,13 @@ +load("@io_bazel_rules_go//go:def.bzl", "go_library") + +go_library( + name = "sa9002", + srcs = ["analyzer.go"], + importpath = "github.com/cockroachdb/cockroach/build/bazelutil/staticcheckanalyzers/sa9002", + visibility = ["//visibility:public"], + deps = [ + "//pkg/testutils/lint/passes/staticcheck", + "@co_honnef_go_tools//staticcheck", + "@org_golang_x_tools//go/analysis", + ], +) diff --git a/build/bazelutil/staticcheckanalyzers/sa9002/analyzer.go b/build/bazelutil/staticcheckanalyzers/sa9002/analyzer.go new file mode 100644 index 000000000000..e8e47a2459ca --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa9002/analyzer.go @@ -0,0 +1,24 @@ +// Code generated by generate-staticcheck; DO NOT EDIT. + +//go:build bazel +// +build bazel + +package sa9002 + +import ( + util "github.com/cockroachdb/cockroach/pkg/testutils/lint/passes/staticcheck" + "golang.org/x/tools/go/analysis" + "honnef.co/go/tools/staticcheck" +) + +var Analyzer *analysis.Analyzer + +func init() { + for _, analyzer := range staticcheck.Analyzers { + if analyzer.Analyzer.Name == "SA9002" { + Analyzer = analyzer.Analyzer + break + } + } + util.MungeAnalyzer(Analyzer) +} diff --git a/build/bazelutil/staticcheckanalyzers/sa9003/BUILD.bazel b/build/bazelutil/staticcheckanalyzers/sa9003/BUILD.bazel new file mode 100644 index 000000000000..115522d025e8 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa9003/BUILD.bazel @@ -0,0 +1,13 @@ +load("@io_bazel_rules_go//go:def.bzl", "go_library") + +go_library( + name = "sa9003", + srcs = ["analyzer.go"], + importpath = "github.com/cockroachdb/cockroach/build/bazelutil/staticcheckanalyzers/sa9003", + visibility = ["//visibility:public"], + deps = [ + "//pkg/testutils/lint/passes/staticcheck", + "@co_honnef_go_tools//staticcheck", + "@org_golang_x_tools//go/analysis", + ], +) diff --git a/build/bazelutil/staticcheckanalyzers/sa9003/analyzer.go b/build/bazelutil/staticcheckanalyzers/sa9003/analyzer.go new file mode 100644 index 000000000000..fefe90bcfe50 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa9003/analyzer.go @@ -0,0 +1,24 @@ +// Code generated by generate-staticcheck; DO NOT EDIT. + +//go:build bazel +// +build bazel + +package sa9003 + +import ( + util "github.com/cockroachdb/cockroach/pkg/testutils/lint/passes/staticcheck" + "golang.org/x/tools/go/analysis" + "honnef.co/go/tools/staticcheck" +) + +var Analyzer *analysis.Analyzer + +func init() { + for _, analyzer := range staticcheck.Analyzers { + if analyzer.Analyzer.Name == "SA9003" { + Analyzer = analyzer.Analyzer + break + } + } + util.MungeAnalyzer(Analyzer) +} diff --git a/build/bazelutil/staticcheckanalyzers/sa9004/BUILD.bazel b/build/bazelutil/staticcheckanalyzers/sa9004/BUILD.bazel new file mode 100644 index 000000000000..8f5f06130b64 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa9004/BUILD.bazel @@ -0,0 +1,13 @@ +load("@io_bazel_rules_go//go:def.bzl", "go_library") + +go_library( + name = "sa9004", + srcs = ["analyzer.go"], + importpath = "github.com/cockroachdb/cockroach/build/bazelutil/staticcheckanalyzers/sa9004", + visibility = ["//visibility:public"], + deps = [ + "//pkg/testutils/lint/passes/staticcheck", + "@co_honnef_go_tools//staticcheck", + "@org_golang_x_tools//go/analysis", + ], +) diff --git a/build/bazelutil/staticcheckanalyzers/sa9004/analyzer.go b/build/bazelutil/staticcheckanalyzers/sa9004/analyzer.go new file mode 100644 index 000000000000..cbc10f953f2d --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa9004/analyzer.go @@ -0,0 +1,24 @@ +// Code generated by generate-staticcheck; DO NOT EDIT. + +//go:build bazel +// +build bazel + +package sa9004 + +import ( + util "github.com/cockroachdb/cockroach/pkg/testutils/lint/passes/staticcheck" + "golang.org/x/tools/go/analysis" + "honnef.co/go/tools/staticcheck" +) + +var Analyzer *analysis.Analyzer + +func init() { + for _, analyzer := range staticcheck.Analyzers { + if analyzer.Analyzer.Name == "SA9004" { + Analyzer = analyzer.Analyzer + break + } + } + util.MungeAnalyzer(Analyzer) +} diff --git a/build/bazelutil/staticcheckanalyzers/sa9005/BUILD.bazel b/build/bazelutil/staticcheckanalyzers/sa9005/BUILD.bazel new file mode 100644 index 000000000000..769e66abca0c --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa9005/BUILD.bazel @@ -0,0 +1,13 @@ +load("@io_bazel_rules_go//go:def.bzl", "go_library") + +go_library( + name = "sa9005", + srcs = ["analyzer.go"], + importpath = "github.com/cockroachdb/cockroach/build/bazelutil/staticcheckanalyzers/sa9005", + visibility = ["//visibility:public"], + deps = [ + "//pkg/testutils/lint/passes/staticcheck", + "@co_honnef_go_tools//staticcheck", + "@org_golang_x_tools//go/analysis", + ], +) diff --git a/build/bazelutil/staticcheckanalyzers/sa9005/analyzer.go b/build/bazelutil/staticcheckanalyzers/sa9005/analyzer.go new file mode 100644 index 000000000000..ff4415e4e09a --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa9005/analyzer.go @@ -0,0 +1,24 @@ +// Code generated by generate-staticcheck; DO NOT EDIT. + +//go:build bazel +// +build bazel + +package sa9005 + +import ( + util "github.com/cockroachdb/cockroach/pkg/testutils/lint/passes/staticcheck" + "golang.org/x/tools/go/analysis" + "honnef.co/go/tools/staticcheck" +) + +var Analyzer *analysis.Analyzer + +func init() { + for _, analyzer := range staticcheck.Analyzers { + if analyzer.Analyzer.Name == "SA9005" { + Analyzer = analyzer.Analyzer + break + } + } + util.MungeAnalyzer(Analyzer) +} diff --git a/build/bazelutil/staticcheckanalyzers/sa9006/BUILD.bazel b/build/bazelutil/staticcheckanalyzers/sa9006/BUILD.bazel new file mode 100644 index 000000000000..46961b271f43 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa9006/BUILD.bazel @@ -0,0 +1,13 @@ +load("@io_bazel_rules_go//go:def.bzl", "go_library") + +go_library( + name = "sa9006", + srcs = ["analyzer.go"], + importpath = "github.com/cockroachdb/cockroach/build/bazelutil/staticcheckanalyzers/sa9006", + visibility = ["//visibility:public"], + deps = [ + "//pkg/testutils/lint/passes/staticcheck", + "@co_honnef_go_tools//staticcheck", + "@org_golang_x_tools//go/analysis", + ], +) diff --git a/build/bazelutil/staticcheckanalyzers/sa9006/analyzer.go b/build/bazelutil/staticcheckanalyzers/sa9006/analyzer.go new file mode 100644 index 000000000000..9fb3e7fc64a6 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/sa9006/analyzer.go @@ -0,0 +1,24 @@ +// Code generated by generate-staticcheck; DO NOT EDIT. + +//go:build bazel +// +build bazel + +package sa9006 + +import ( + util "github.com/cockroachdb/cockroach/pkg/testutils/lint/passes/staticcheck" + "golang.org/x/tools/go/analysis" + "honnef.co/go/tools/staticcheck" +) + +var Analyzer *analysis.Analyzer + +func init() { + for _, analyzer := range staticcheck.Analyzers { + if analyzer.Analyzer.Name == "SA9006" { + Analyzer = analyzer.Analyzer + break + } + } + util.MungeAnalyzer(Analyzer) +} diff --git a/build/bazelutil/staticcheckanalyzers/st1000/BUILD.bazel b/build/bazelutil/staticcheckanalyzers/st1000/BUILD.bazel new file mode 100644 index 000000000000..2da5193c6403 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/st1000/BUILD.bazel @@ -0,0 +1,13 @@ +load("@io_bazel_rules_go//go:def.bzl", "go_library") + +go_library( + name = "st1000", + srcs = ["analyzer.go"], + importpath = "github.com/cockroachdb/cockroach/build/bazelutil/staticcheckanalyzers/st1000", + visibility = ["//visibility:public"], + deps = [ + "//pkg/testutils/lint/passes/staticcheck", + "@co_honnef_go_tools//stylecheck", + "@org_golang_x_tools//go/analysis", + ], +) diff --git a/build/bazelutil/staticcheckanalyzers/st1000/analyzer.go b/build/bazelutil/staticcheckanalyzers/st1000/analyzer.go new file mode 100644 index 000000000000..005195186221 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/st1000/analyzer.go @@ -0,0 +1,24 @@ +// Code generated by generate-staticcheck; DO NOT EDIT. + +//go:build bazel +// +build bazel + +package st1000 + +import ( + util "github.com/cockroachdb/cockroach/pkg/testutils/lint/passes/staticcheck" + "golang.org/x/tools/go/analysis" + "honnef.co/go/tools/stylecheck" +) + +var Analyzer *analysis.Analyzer + +func init() { + for _, analyzer := range stylecheck.Analyzers { + if analyzer.Analyzer.Name == "ST1000" { + Analyzer = analyzer.Analyzer + break + } + } + util.MungeAnalyzer(Analyzer) +} diff --git a/build/bazelutil/staticcheckanalyzers/st1001/BUILD.bazel b/build/bazelutil/staticcheckanalyzers/st1001/BUILD.bazel new file mode 100644 index 000000000000..81b60aa3fcba --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/st1001/BUILD.bazel @@ -0,0 +1,13 @@ +load("@io_bazel_rules_go//go:def.bzl", "go_library") + +go_library( + name = "st1001", + srcs = ["analyzer.go"], + importpath = "github.com/cockroachdb/cockroach/build/bazelutil/staticcheckanalyzers/st1001", + visibility = ["//visibility:public"], + deps = [ + "//pkg/testutils/lint/passes/staticcheck", + "@co_honnef_go_tools//stylecheck", + "@org_golang_x_tools//go/analysis", + ], +) diff --git a/build/bazelutil/staticcheckanalyzers/st1001/analyzer.go b/build/bazelutil/staticcheckanalyzers/st1001/analyzer.go new file mode 100644 index 000000000000..d9859b37748f --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/st1001/analyzer.go @@ -0,0 +1,24 @@ +// Code generated by generate-staticcheck; DO NOT EDIT. + +//go:build bazel +// +build bazel + +package st1001 + +import ( + util "github.com/cockroachdb/cockroach/pkg/testutils/lint/passes/staticcheck" + "golang.org/x/tools/go/analysis" + "honnef.co/go/tools/stylecheck" +) + +var Analyzer *analysis.Analyzer + +func init() { + for _, analyzer := range stylecheck.Analyzers { + if analyzer.Analyzer.Name == "ST1001" { + Analyzer = analyzer.Analyzer + break + } + } + util.MungeAnalyzer(Analyzer) +} diff --git a/build/bazelutil/staticcheckanalyzers/st1003/BUILD.bazel b/build/bazelutil/staticcheckanalyzers/st1003/BUILD.bazel new file mode 100644 index 000000000000..1df4b907b05c --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/st1003/BUILD.bazel @@ -0,0 +1,13 @@ +load("@io_bazel_rules_go//go:def.bzl", "go_library") + +go_library( + name = "st1003", + srcs = ["analyzer.go"], + importpath = "github.com/cockroachdb/cockroach/build/bazelutil/staticcheckanalyzers/st1003", + visibility = ["//visibility:public"], + deps = [ + "//pkg/testutils/lint/passes/staticcheck", + "@co_honnef_go_tools//stylecheck", + "@org_golang_x_tools//go/analysis", + ], +) diff --git a/build/bazelutil/staticcheckanalyzers/st1003/analyzer.go b/build/bazelutil/staticcheckanalyzers/st1003/analyzer.go new file mode 100644 index 000000000000..534ad2059baa --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/st1003/analyzer.go @@ -0,0 +1,24 @@ +// Code generated by generate-staticcheck; DO NOT EDIT. + +//go:build bazel +// +build bazel + +package st1003 + +import ( + util "github.com/cockroachdb/cockroach/pkg/testutils/lint/passes/staticcheck" + "golang.org/x/tools/go/analysis" + "honnef.co/go/tools/stylecheck" +) + +var Analyzer *analysis.Analyzer + +func init() { + for _, analyzer := range stylecheck.Analyzers { + if analyzer.Analyzer.Name == "ST1003" { + Analyzer = analyzer.Analyzer + break + } + } + util.MungeAnalyzer(Analyzer) +} diff --git a/build/bazelutil/staticcheckanalyzers/st1005/BUILD.bazel b/build/bazelutil/staticcheckanalyzers/st1005/BUILD.bazel new file mode 100644 index 000000000000..8fa410d2f575 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/st1005/BUILD.bazel @@ -0,0 +1,13 @@ +load("@io_bazel_rules_go//go:def.bzl", "go_library") + +go_library( + name = "st1005", + srcs = ["analyzer.go"], + importpath = "github.com/cockroachdb/cockroach/build/bazelutil/staticcheckanalyzers/st1005", + visibility = ["//visibility:public"], + deps = [ + "//pkg/testutils/lint/passes/staticcheck", + "@co_honnef_go_tools//stylecheck", + "@org_golang_x_tools//go/analysis", + ], +) diff --git a/build/bazelutil/staticcheckanalyzers/st1005/analyzer.go b/build/bazelutil/staticcheckanalyzers/st1005/analyzer.go new file mode 100644 index 000000000000..9d55265197e9 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/st1005/analyzer.go @@ -0,0 +1,24 @@ +// Code generated by generate-staticcheck; DO NOT EDIT. + +//go:build bazel +// +build bazel + +package st1005 + +import ( + util "github.com/cockroachdb/cockroach/pkg/testutils/lint/passes/staticcheck" + "golang.org/x/tools/go/analysis" + "honnef.co/go/tools/stylecheck" +) + +var Analyzer *analysis.Analyzer + +func init() { + for _, analyzer := range stylecheck.Analyzers { + if analyzer.Analyzer.Name == "ST1005" { + Analyzer = analyzer.Analyzer + break + } + } + util.MungeAnalyzer(Analyzer) +} diff --git a/build/bazelutil/staticcheckanalyzers/st1006/BUILD.bazel b/build/bazelutil/staticcheckanalyzers/st1006/BUILD.bazel new file mode 100644 index 000000000000..85a8441dfe5f --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/st1006/BUILD.bazel @@ -0,0 +1,13 @@ +load("@io_bazel_rules_go//go:def.bzl", "go_library") + +go_library( + name = "st1006", + srcs = ["analyzer.go"], + importpath = "github.com/cockroachdb/cockroach/build/bazelutil/staticcheckanalyzers/st1006", + visibility = ["//visibility:public"], + deps = [ + "//pkg/testutils/lint/passes/staticcheck", + "@co_honnef_go_tools//stylecheck", + "@org_golang_x_tools//go/analysis", + ], +) diff --git a/build/bazelutil/staticcheckanalyzers/st1006/analyzer.go b/build/bazelutil/staticcheckanalyzers/st1006/analyzer.go new file mode 100644 index 000000000000..3c8cfa9edf55 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/st1006/analyzer.go @@ -0,0 +1,24 @@ +// Code generated by generate-staticcheck; DO NOT EDIT. + +//go:build bazel +// +build bazel + +package st1006 + +import ( + util "github.com/cockroachdb/cockroach/pkg/testutils/lint/passes/staticcheck" + "golang.org/x/tools/go/analysis" + "honnef.co/go/tools/stylecheck" +) + +var Analyzer *analysis.Analyzer + +func init() { + for _, analyzer := range stylecheck.Analyzers { + if analyzer.Analyzer.Name == "ST1006" { + Analyzer = analyzer.Analyzer + break + } + } + util.MungeAnalyzer(Analyzer) +} diff --git a/build/bazelutil/staticcheckanalyzers/st1008/BUILD.bazel b/build/bazelutil/staticcheckanalyzers/st1008/BUILD.bazel new file mode 100644 index 000000000000..89385eaa7d40 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/st1008/BUILD.bazel @@ -0,0 +1,13 @@ +load("@io_bazel_rules_go//go:def.bzl", "go_library") + +go_library( + name = "st1008", + srcs = ["analyzer.go"], + importpath = "github.com/cockroachdb/cockroach/build/bazelutil/staticcheckanalyzers/st1008", + visibility = ["//visibility:public"], + deps = [ + "//pkg/testutils/lint/passes/staticcheck", + "@co_honnef_go_tools//stylecheck", + "@org_golang_x_tools//go/analysis", + ], +) diff --git a/build/bazelutil/staticcheckanalyzers/st1008/analyzer.go b/build/bazelutil/staticcheckanalyzers/st1008/analyzer.go new file mode 100644 index 000000000000..ce2806148690 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/st1008/analyzer.go @@ -0,0 +1,24 @@ +// Code generated by generate-staticcheck; DO NOT EDIT. + +//go:build bazel +// +build bazel + +package st1008 + +import ( + util "github.com/cockroachdb/cockroach/pkg/testutils/lint/passes/staticcheck" + "golang.org/x/tools/go/analysis" + "honnef.co/go/tools/stylecheck" +) + +var Analyzer *analysis.Analyzer + +func init() { + for _, analyzer := range stylecheck.Analyzers { + if analyzer.Analyzer.Name == "ST1008" { + Analyzer = analyzer.Analyzer + break + } + } + util.MungeAnalyzer(Analyzer) +} diff --git a/build/bazelutil/staticcheckanalyzers/st1011/BUILD.bazel b/build/bazelutil/staticcheckanalyzers/st1011/BUILD.bazel new file mode 100644 index 000000000000..74f4c9409727 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/st1011/BUILD.bazel @@ -0,0 +1,13 @@ +load("@io_bazel_rules_go//go:def.bzl", "go_library") + +go_library( + name = "st1011", + srcs = ["analyzer.go"], + importpath = "github.com/cockroachdb/cockroach/build/bazelutil/staticcheckanalyzers/st1011", + visibility = ["//visibility:public"], + deps = [ + "//pkg/testutils/lint/passes/staticcheck", + "@co_honnef_go_tools//stylecheck", + "@org_golang_x_tools//go/analysis", + ], +) diff --git a/build/bazelutil/staticcheckanalyzers/st1011/analyzer.go b/build/bazelutil/staticcheckanalyzers/st1011/analyzer.go new file mode 100644 index 000000000000..066d6a83f7e6 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/st1011/analyzer.go @@ -0,0 +1,24 @@ +// Code generated by generate-staticcheck; DO NOT EDIT. + +//go:build bazel +// +build bazel + +package st1011 + +import ( + util "github.com/cockroachdb/cockroach/pkg/testutils/lint/passes/staticcheck" + "golang.org/x/tools/go/analysis" + "honnef.co/go/tools/stylecheck" +) + +var Analyzer *analysis.Analyzer + +func init() { + for _, analyzer := range stylecheck.Analyzers { + if analyzer.Analyzer.Name == "ST1011" { + Analyzer = analyzer.Analyzer + break + } + } + util.MungeAnalyzer(Analyzer) +} diff --git a/build/bazelutil/staticcheckanalyzers/st1012/BUILD.bazel b/build/bazelutil/staticcheckanalyzers/st1012/BUILD.bazel new file mode 100644 index 000000000000..d77b49411815 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/st1012/BUILD.bazel @@ -0,0 +1,13 @@ +load("@io_bazel_rules_go//go:def.bzl", "go_library") + +go_library( + name = "st1012", + srcs = ["analyzer.go"], + importpath = "github.com/cockroachdb/cockroach/build/bazelutil/staticcheckanalyzers/st1012", + visibility = ["//visibility:public"], + deps = [ + "//pkg/testutils/lint/passes/staticcheck", + "@co_honnef_go_tools//stylecheck", + "@org_golang_x_tools//go/analysis", + ], +) diff --git a/build/bazelutil/staticcheckanalyzers/st1012/analyzer.go b/build/bazelutil/staticcheckanalyzers/st1012/analyzer.go new file mode 100644 index 000000000000..8f9b3808aafa --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/st1012/analyzer.go @@ -0,0 +1,24 @@ +// Code generated by generate-staticcheck; DO NOT EDIT. + +//go:build bazel +// +build bazel + +package st1012 + +import ( + util "github.com/cockroachdb/cockroach/pkg/testutils/lint/passes/staticcheck" + "golang.org/x/tools/go/analysis" + "honnef.co/go/tools/stylecheck" +) + +var Analyzer *analysis.Analyzer + +func init() { + for _, analyzer := range stylecheck.Analyzers { + if analyzer.Analyzer.Name == "ST1012" { + Analyzer = analyzer.Analyzer + break + } + } + util.MungeAnalyzer(Analyzer) +} diff --git a/build/bazelutil/staticcheckanalyzers/st1013/BUILD.bazel b/build/bazelutil/staticcheckanalyzers/st1013/BUILD.bazel new file mode 100644 index 000000000000..f4c920949a2f --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/st1013/BUILD.bazel @@ -0,0 +1,13 @@ +load("@io_bazel_rules_go//go:def.bzl", "go_library") + +go_library( + name = "st1013", + srcs = ["analyzer.go"], + importpath = "github.com/cockroachdb/cockroach/build/bazelutil/staticcheckanalyzers/st1013", + visibility = ["//visibility:public"], + deps = [ + "//pkg/testutils/lint/passes/staticcheck", + "@co_honnef_go_tools//stylecheck", + "@org_golang_x_tools//go/analysis", + ], +) diff --git a/build/bazelutil/staticcheckanalyzers/st1013/analyzer.go b/build/bazelutil/staticcheckanalyzers/st1013/analyzer.go new file mode 100644 index 000000000000..597d377dba68 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/st1013/analyzer.go @@ -0,0 +1,24 @@ +// Code generated by generate-staticcheck; DO NOT EDIT. + +//go:build bazel +// +build bazel + +package st1013 + +import ( + util "github.com/cockroachdb/cockroach/pkg/testutils/lint/passes/staticcheck" + "golang.org/x/tools/go/analysis" + "honnef.co/go/tools/stylecheck" +) + +var Analyzer *analysis.Analyzer + +func init() { + for _, analyzer := range stylecheck.Analyzers { + if analyzer.Analyzer.Name == "ST1013" { + Analyzer = analyzer.Analyzer + break + } + } + util.MungeAnalyzer(Analyzer) +} diff --git a/build/bazelutil/staticcheckanalyzers/st1015/BUILD.bazel b/build/bazelutil/staticcheckanalyzers/st1015/BUILD.bazel new file mode 100644 index 000000000000..fa9fbe0bd605 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/st1015/BUILD.bazel @@ -0,0 +1,13 @@ +load("@io_bazel_rules_go//go:def.bzl", "go_library") + +go_library( + name = "st1015", + srcs = ["analyzer.go"], + importpath = "github.com/cockroachdb/cockroach/build/bazelutil/staticcheckanalyzers/st1015", + visibility = ["//visibility:public"], + deps = [ + "//pkg/testutils/lint/passes/staticcheck", + "@co_honnef_go_tools//stylecheck", + "@org_golang_x_tools//go/analysis", + ], +) diff --git a/build/bazelutil/staticcheckanalyzers/st1015/analyzer.go b/build/bazelutil/staticcheckanalyzers/st1015/analyzer.go new file mode 100644 index 000000000000..2ce27a1d88da --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/st1015/analyzer.go @@ -0,0 +1,24 @@ +// Code generated by generate-staticcheck; DO NOT EDIT. + +//go:build bazel +// +build bazel + +package st1015 + +import ( + util "github.com/cockroachdb/cockroach/pkg/testutils/lint/passes/staticcheck" + "golang.org/x/tools/go/analysis" + "honnef.co/go/tools/stylecheck" +) + +var Analyzer *analysis.Analyzer + +func init() { + for _, analyzer := range stylecheck.Analyzers { + if analyzer.Analyzer.Name == "ST1015" { + Analyzer = analyzer.Analyzer + break + } + } + util.MungeAnalyzer(Analyzer) +} diff --git a/build/bazelutil/staticcheckanalyzers/st1016/BUILD.bazel b/build/bazelutil/staticcheckanalyzers/st1016/BUILD.bazel new file mode 100644 index 000000000000..50e86f495906 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/st1016/BUILD.bazel @@ -0,0 +1,13 @@ +load("@io_bazel_rules_go//go:def.bzl", "go_library") + +go_library( + name = "st1016", + srcs = ["analyzer.go"], + importpath = "github.com/cockroachdb/cockroach/build/bazelutil/staticcheckanalyzers/st1016", + visibility = ["//visibility:public"], + deps = [ + "//pkg/testutils/lint/passes/staticcheck", + "@co_honnef_go_tools//stylecheck", + "@org_golang_x_tools//go/analysis", + ], +) diff --git a/build/bazelutil/staticcheckanalyzers/st1016/analyzer.go b/build/bazelutil/staticcheckanalyzers/st1016/analyzer.go new file mode 100644 index 000000000000..4279dd090b6f --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/st1016/analyzer.go @@ -0,0 +1,24 @@ +// Code generated by generate-staticcheck; DO NOT EDIT. + +//go:build bazel +// +build bazel + +package st1016 + +import ( + util "github.com/cockroachdb/cockroach/pkg/testutils/lint/passes/staticcheck" + "golang.org/x/tools/go/analysis" + "honnef.co/go/tools/stylecheck" +) + +var Analyzer *analysis.Analyzer + +func init() { + for _, analyzer := range stylecheck.Analyzers { + if analyzer.Analyzer.Name == "ST1016" { + Analyzer = analyzer.Analyzer + break + } + } + util.MungeAnalyzer(Analyzer) +} diff --git a/build/bazelutil/staticcheckanalyzers/st1017/BUILD.bazel b/build/bazelutil/staticcheckanalyzers/st1017/BUILD.bazel new file mode 100644 index 000000000000..3f40a94402fa --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/st1017/BUILD.bazel @@ -0,0 +1,13 @@ +load("@io_bazel_rules_go//go:def.bzl", "go_library") + +go_library( + name = "st1017", + srcs = ["analyzer.go"], + importpath = "github.com/cockroachdb/cockroach/build/bazelutil/staticcheckanalyzers/st1017", + visibility = ["//visibility:public"], + deps = [ + "//pkg/testutils/lint/passes/staticcheck", + "@co_honnef_go_tools//stylecheck", + "@org_golang_x_tools//go/analysis", + ], +) diff --git a/build/bazelutil/staticcheckanalyzers/st1017/analyzer.go b/build/bazelutil/staticcheckanalyzers/st1017/analyzer.go new file mode 100644 index 000000000000..0cd3c9968ce9 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/st1017/analyzer.go @@ -0,0 +1,24 @@ +// Code generated by generate-staticcheck; DO NOT EDIT. + +//go:build bazel +// +build bazel + +package st1017 + +import ( + util "github.com/cockroachdb/cockroach/pkg/testutils/lint/passes/staticcheck" + "golang.org/x/tools/go/analysis" + "honnef.co/go/tools/stylecheck" +) + +var Analyzer *analysis.Analyzer + +func init() { + for _, analyzer := range stylecheck.Analyzers { + if analyzer.Analyzer.Name == "ST1017" { + Analyzer = analyzer.Analyzer + break + } + } + util.MungeAnalyzer(Analyzer) +} diff --git a/build/bazelutil/staticcheckanalyzers/st1018/BUILD.bazel b/build/bazelutil/staticcheckanalyzers/st1018/BUILD.bazel new file mode 100644 index 000000000000..4295539feb6f --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/st1018/BUILD.bazel @@ -0,0 +1,13 @@ +load("@io_bazel_rules_go//go:def.bzl", "go_library") + +go_library( + name = "st1018", + srcs = ["analyzer.go"], + importpath = "github.com/cockroachdb/cockroach/build/bazelutil/staticcheckanalyzers/st1018", + visibility = ["//visibility:public"], + deps = [ + "//pkg/testutils/lint/passes/staticcheck", + "@co_honnef_go_tools//stylecheck", + "@org_golang_x_tools//go/analysis", + ], +) diff --git a/build/bazelutil/staticcheckanalyzers/st1018/analyzer.go b/build/bazelutil/staticcheckanalyzers/st1018/analyzer.go new file mode 100644 index 000000000000..599e1d1d4421 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/st1018/analyzer.go @@ -0,0 +1,24 @@ +// Code generated by generate-staticcheck; DO NOT EDIT. + +//go:build bazel +// +build bazel + +package st1018 + +import ( + util "github.com/cockroachdb/cockroach/pkg/testutils/lint/passes/staticcheck" + "golang.org/x/tools/go/analysis" + "honnef.co/go/tools/stylecheck" +) + +var Analyzer *analysis.Analyzer + +func init() { + for _, analyzer := range stylecheck.Analyzers { + if analyzer.Analyzer.Name == "ST1018" { + Analyzer = analyzer.Analyzer + break + } + } + util.MungeAnalyzer(Analyzer) +} diff --git a/build/bazelutil/staticcheckanalyzers/st1019/BUILD.bazel b/build/bazelutil/staticcheckanalyzers/st1019/BUILD.bazel new file mode 100644 index 000000000000..a4bba830f9c2 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/st1019/BUILD.bazel @@ -0,0 +1,13 @@ +load("@io_bazel_rules_go//go:def.bzl", "go_library") + +go_library( + name = "st1019", + srcs = ["analyzer.go"], + importpath = "github.com/cockroachdb/cockroach/build/bazelutil/staticcheckanalyzers/st1019", + visibility = ["//visibility:public"], + deps = [ + "//pkg/testutils/lint/passes/staticcheck", + "@co_honnef_go_tools//stylecheck", + "@org_golang_x_tools//go/analysis", + ], +) diff --git a/build/bazelutil/staticcheckanalyzers/st1019/analyzer.go b/build/bazelutil/staticcheckanalyzers/st1019/analyzer.go new file mode 100644 index 000000000000..fda11d5b3c19 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/st1019/analyzer.go @@ -0,0 +1,24 @@ +// Code generated by generate-staticcheck; DO NOT EDIT. + +//go:build bazel +// +build bazel + +package st1019 + +import ( + util "github.com/cockroachdb/cockroach/pkg/testutils/lint/passes/staticcheck" + "golang.org/x/tools/go/analysis" + "honnef.co/go/tools/stylecheck" +) + +var Analyzer *analysis.Analyzer + +func init() { + for _, analyzer := range stylecheck.Analyzers { + if analyzer.Analyzer.Name == "ST1019" { + Analyzer = analyzer.Analyzer + break + } + } + util.MungeAnalyzer(Analyzer) +} diff --git a/build/bazelutil/staticcheckanalyzers/st1020/BUILD.bazel b/build/bazelutil/staticcheckanalyzers/st1020/BUILD.bazel new file mode 100644 index 000000000000..c8cfbc2c4fd7 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/st1020/BUILD.bazel @@ -0,0 +1,13 @@ +load("@io_bazel_rules_go//go:def.bzl", "go_library") + +go_library( + name = "st1020", + srcs = ["analyzer.go"], + importpath = "github.com/cockroachdb/cockroach/build/bazelutil/staticcheckanalyzers/st1020", + visibility = ["//visibility:public"], + deps = [ + "//pkg/testutils/lint/passes/staticcheck", + "@co_honnef_go_tools//stylecheck", + "@org_golang_x_tools//go/analysis", + ], +) diff --git a/build/bazelutil/staticcheckanalyzers/st1020/analyzer.go b/build/bazelutil/staticcheckanalyzers/st1020/analyzer.go new file mode 100644 index 000000000000..0c74a3aa82ca --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/st1020/analyzer.go @@ -0,0 +1,24 @@ +// Code generated by generate-staticcheck; DO NOT EDIT. + +//go:build bazel +// +build bazel + +package st1020 + +import ( + util "github.com/cockroachdb/cockroach/pkg/testutils/lint/passes/staticcheck" + "golang.org/x/tools/go/analysis" + "honnef.co/go/tools/stylecheck" +) + +var Analyzer *analysis.Analyzer + +func init() { + for _, analyzer := range stylecheck.Analyzers { + if analyzer.Analyzer.Name == "ST1020" { + Analyzer = analyzer.Analyzer + break + } + } + util.MungeAnalyzer(Analyzer) +} diff --git a/build/bazelutil/staticcheckanalyzers/st1021/BUILD.bazel b/build/bazelutil/staticcheckanalyzers/st1021/BUILD.bazel new file mode 100644 index 000000000000..bc95d6ef1261 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/st1021/BUILD.bazel @@ -0,0 +1,13 @@ +load("@io_bazel_rules_go//go:def.bzl", "go_library") + +go_library( + name = "st1021", + srcs = ["analyzer.go"], + importpath = "github.com/cockroachdb/cockroach/build/bazelutil/staticcheckanalyzers/st1021", + visibility = ["//visibility:public"], + deps = [ + "//pkg/testutils/lint/passes/staticcheck", + "@co_honnef_go_tools//stylecheck", + "@org_golang_x_tools//go/analysis", + ], +) diff --git a/build/bazelutil/staticcheckanalyzers/st1021/analyzer.go b/build/bazelutil/staticcheckanalyzers/st1021/analyzer.go new file mode 100644 index 000000000000..6db789aebf3f --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/st1021/analyzer.go @@ -0,0 +1,24 @@ +// Code generated by generate-staticcheck; DO NOT EDIT. + +//go:build bazel +// +build bazel + +package st1021 + +import ( + util "github.com/cockroachdb/cockroach/pkg/testutils/lint/passes/staticcheck" + "golang.org/x/tools/go/analysis" + "honnef.co/go/tools/stylecheck" +) + +var Analyzer *analysis.Analyzer + +func init() { + for _, analyzer := range stylecheck.Analyzers { + if analyzer.Analyzer.Name == "ST1021" { + Analyzer = analyzer.Analyzer + break + } + } + util.MungeAnalyzer(Analyzer) +} diff --git a/build/bazelutil/staticcheckanalyzers/st1022/BUILD.bazel b/build/bazelutil/staticcheckanalyzers/st1022/BUILD.bazel new file mode 100644 index 000000000000..877f160de68e --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/st1022/BUILD.bazel @@ -0,0 +1,13 @@ +load("@io_bazel_rules_go//go:def.bzl", "go_library") + +go_library( + name = "st1022", + srcs = ["analyzer.go"], + importpath = "github.com/cockroachdb/cockroach/build/bazelutil/staticcheckanalyzers/st1022", + visibility = ["//visibility:public"], + deps = [ + "//pkg/testutils/lint/passes/staticcheck", + "@co_honnef_go_tools//stylecheck", + "@org_golang_x_tools//go/analysis", + ], +) diff --git a/build/bazelutil/staticcheckanalyzers/st1022/analyzer.go b/build/bazelutil/staticcheckanalyzers/st1022/analyzer.go new file mode 100644 index 000000000000..4aa982b77672 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/st1022/analyzer.go @@ -0,0 +1,24 @@ +// Code generated by generate-staticcheck; DO NOT EDIT. + +//go:build bazel +// +build bazel + +package st1022 + +import ( + util "github.com/cockroachdb/cockroach/pkg/testutils/lint/passes/staticcheck" + "golang.org/x/tools/go/analysis" + "honnef.co/go/tools/stylecheck" +) + +var Analyzer *analysis.Analyzer + +func init() { + for _, analyzer := range stylecheck.Analyzers { + if analyzer.Analyzer.Name == "ST1022" { + Analyzer = analyzer.Analyzer + break + } + } + util.MungeAnalyzer(Analyzer) +} diff --git a/build/bazelutil/staticcheckanalyzers/st1023/BUILD.bazel b/build/bazelutil/staticcheckanalyzers/st1023/BUILD.bazel new file mode 100644 index 000000000000..e89d54e0ca96 --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/st1023/BUILD.bazel @@ -0,0 +1,13 @@ +load("@io_bazel_rules_go//go:def.bzl", "go_library") + +go_library( + name = "st1023", + srcs = ["analyzer.go"], + importpath = "github.com/cockroachdb/cockroach/build/bazelutil/staticcheckanalyzers/st1023", + visibility = ["//visibility:public"], + deps = [ + "//pkg/testutils/lint/passes/staticcheck", + "@co_honnef_go_tools//stylecheck", + "@org_golang_x_tools//go/analysis", + ], +) diff --git a/build/bazelutil/staticcheckanalyzers/st1023/analyzer.go b/build/bazelutil/staticcheckanalyzers/st1023/analyzer.go new file mode 100644 index 000000000000..e7fa7c4afc6b --- /dev/null +++ b/build/bazelutil/staticcheckanalyzers/st1023/analyzer.go @@ -0,0 +1,24 @@ +// Code generated by generate-staticcheck; DO NOT EDIT. + +//go:build bazel +// +build bazel + +package st1023 + +import ( + util "github.com/cockroachdb/cockroach/pkg/testutils/lint/passes/staticcheck" + "golang.org/x/tools/go/analysis" + "honnef.co/go/tools/stylecheck" +) + +var Analyzer *analysis.Analyzer + +func init() { + for _, analyzer := range stylecheck.Analyzers { + if analyzer.Analyzer.Name == "ST1023" { + Analyzer = analyzer.Analyzer + break + } + } + util.MungeAnalyzer(Analyzer) +} diff --git a/pkg/ccl/backupccl/split_and_scatter_processor.go b/pkg/ccl/backupccl/split_and_scatter_processor.go index f856dd936452..349278b6e62a 100644 --- a/pkg/ccl/backupccl/split_and_scatter_processor.go +++ b/pkg/ccl/backupccl/split_and_scatter_processor.go @@ -218,7 +218,7 @@ func newSplitAndScatterProcessor( return nil, err } - var scatterer splitAndScatterer = makeSplitAndScatterer(db, kr) + var scatterer = makeSplitAndScatterer(db, kr) if !flowCtx.Cfg.Codec.ForSystemTenant() { scatterer = noopSplitAndScatterer{} } diff --git a/pkg/cmd/dev/build.go b/pkg/cmd/dev/build.go index 1c8ceb94c247..74085b8bae07 100644 --- a/pkg/cmd/dev/build.go +++ b/pkg/cmd/dev/build.go @@ -84,6 +84,7 @@ var buildTargetMapping = map[string]string{ "roachprod-stress": "//pkg/cmd/roachprod-stress:roachprod-stress", "roachtest": "//pkg/cmd/roachtest:roachtest", "short": "//pkg/cmd/cockroach-short:cockroach-short", + "staticcheck": "@co_honnef_go_tools//cmd/staticcheck:staticcheck", "stress": stressTarget, "workload": "//pkg/cmd/workload:workload", } diff --git a/pkg/cmd/generate-staticcheck/BUILD.bazel b/pkg/cmd/generate-staticcheck/BUILD.bazel new file mode 100644 index 000000000000..3ade80b39e5f --- /dev/null +++ b/pkg/cmd/generate-staticcheck/BUILD.bazel @@ -0,0 +1,20 @@ +load("@io_bazel_rules_go//go:def.bzl", "go_binary", "go_library") + +go_library( + name = "generate-staticcheck_lib", + srcs = ["main.go"], + importpath = "github.com/cockroachdb/cockroach/pkg/cmd/generate-staticcheck", + visibility = ["//visibility:private"], + deps = [ + "@co_honnef_go_tools//analysis/lint", + "@co_honnef_go_tools//simple", + "@co_honnef_go_tools//staticcheck", + "@co_honnef_go_tools//stylecheck", + ], +) + +go_binary( + name = "generate-staticcheck", + embed = [":generate-staticcheck_lib"], + visibility = ["//visibility:public"], +) diff --git a/pkg/cmd/generate-staticcheck/main.go b/pkg/cmd/generate-staticcheck/main.go new file mode 100644 index 000000000000..f2f672d134e1 --- /dev/null +++ b/pkg/cmd/generate-staticcheck/main.go @@ -0,0 +1,130 @@ +// Copyright 2021 The Cockroach Authors. +// +// Use of this software is governed by the Business Source License +// included in the file licenses/BSL.txt. +// +// As of the Change Date specified in that file, in accordance with +// the Business Source License, use of this software will be governed +// by the Apache License, Version 2.0, included in the file +// licenses/APL.txt. +package main + +import ( + "io/ioutil" + "os" + "path/filepath" + "sort" + "strings" + "text/template" + + "honnef.co/go/tools/analysis/lint" + "honnef.co/go/tools/simple" + "honnef.co/go/tools/staticcheck" + "honnef.co/go/tools/stylecheck" +) + +const ( + readmeContent = `All of the code in this directory is generated by generate-staticcheck for use in Bazel. +` + buildBazelContent = `exports_files(["def.bzl"])` + analysisFileTemplate = `// Code generated by generate-staticcheck; DO NOT EDIT. + +//go:build bazel +// +build bazel + +package {{ .Package }} + +import ( + util "github.com/cockroachdb/cockroach/pkg/testutils/lint/passes/staticcheck" + "golang.org/x/tools/go/analysis" + "honnef.co/go/tools/{{ .CheckType }}" +) + +var Analyzer *analysis.Analyzer + +func init() { + for _, analyzer := range {{ .CheckType }}.Analyzers { + if analyzer.Analyzer.Name == "{{ .Check }}" { + Analyzer = analyzer.Analyzer + break + } + } + util.MungeAnalyzer(Analyzer) +} +` + defBzlFileTemplate = `# Code generated by generate-staticcheck; DO NOT EDIT. + +STATICCHECK_CHECKS = [ +{{range $i,$a := .AllAnalyzers}} "{{.}}", +{{end}}] +` +) + +func main() { + fileTpl := template.Must(template.New("source").Parse(analysisFileTemplate)) + rootDir := "build/bazelutil/staticcheckanalyzers" + err := os.RemoveAll(rootDir) + if err != nil { + panic(err) + } + err = os.MkdirAll(rootDir, 0755) + if err != nil { + panic(err) + } + err = ioutil.WriteFile(filepath.Join(rootDir, "README.md"), []byte(readmeContent), 0644) + if err != nil { + panic(err) + } + err = ioutil.WriteFile(filepath.Join(rootDir, "BUILD.bazel"), []byte(buildBazelContent), 0644) + if err != nil { + panic(err) + } + // All of these analyzers will be written to def.bzl. + var allAnalyzers []string + for _, check := range []struct { + Analyzers []*lint.Analyzer + CheckType string + }{ + // TODO: Consider adding quickfix checks. + {Analyzers: staticcheck.Analyzers, CheckType: "staticcheck"}, + {Analyzers: stylecheck.Analyzers, CheckType: "stylecheck"}, + {Analyzers: simple.Analyzers, CheckType: "simple"}, + } { + for _, v := range check.Analyzers { + analyzer := v.Analyzer + pkgname := strings.ToLower(analyzer.Name) + dirname := filepath.Join(rootDir, pkgname) + err := os.MkdirAll(dirname, 0755) + if err != nil { + panic(err) + } + outFile, err := os.Create(filepath.Join(dirname, "analyzer.go")) + if err != nil { + panic(err) + } + err = fileTpl.Execute(outFile, struct { + Package string + Check string + CheckType string + }{Package: pkgname, Check: analyzer.Name, CheckType: check.CheckType}) + if err != nil { + panic(err) + } + err = outFile.Close() + if err != nil { + panic(err) + } + allAnalyzers = append(allAnalyzers, "//"+dirname) + } + } + sort.Strings(allAnalyzers) + fileTpl = template.Must(template.New("defbzl").Parse(defBzlFileTemplate)) + defBzlFile, err := os.Create(filepath.Join(rootDir, "def.bzl")) + if err != nil { + panic(err) + } + err = fileTpl.Execute(defBzlFile, struct{ AllAnalyzers []string }{AllAnalyzers: allAnalyzers}) + if err != nil { + panic(err) + } +} diff --git a/pkg/cmd/mirror/mirror.go b/pkg/cmd/mirror/mirror.go index f5893126490e..4d4852c34118 100644 --- a/pkg/cmd/mirror/mirror.go +++ b/pkg/cmd/mirror/mirror.go @@ -271,7 +271,7 @@ func maybeGetExistingMirror(call *syntax.CallExpr) (string, existingMirror, erro switch bx := arg.(type) { case *syntax.BinaryExpr: if bx.Op != syntax.EQ { - return "", existingMirror{}, fmt.Errorf("Unexpected binary expression Op %d", bx.Op) + return "", existingMirror{}, fmt.Errorf("unexpected binary expression Op %d", bx.Op) } kwarg, err := expectIdent(bx.X) if err != nil { diff --git a/pkg/sql/catalog/tabledesc/index_test.go b/pkg/sql/catalog/tabledesc/index_test.go index 9bf96b5fab7c..f43c1da17c9e 100644 --- a/pkg/sql/catalog/tabledesc/index_test.go +++ b/pkg/sql/catalog/tabledesc/index_test.go @@ -88,7 +88,7 @@ func TestIndexInterface(t *testing.T) { immutable := catalogkv.TestingGetImmutableTableDescriptor(db, keys.SystemSQLCodec, "d", "t") require.NotNil(t, immutable) - var tableI catalog.TableDescriptor = immutable + var tableI = immutable require.NotNil(t, tableI) // Find indexes by name, check that names are correct and that indexes diff --git a/pkg/testutils/lint/lint_test.go b/pkg/testutils/lint/lint_test.go index 5134891ccb39..4d530bd07b0f 100644 --- a/pkg/testutils/lint/lint_test.go +++ b/pkg/testutils/lint/lint_test.go @@ -1680,7 +1680,9 @@ instead. t.Run("TestStaticCheck", func(t *testing.T) { // staticcheck uses 2.4GB of ram (as of 2019-05-10), so don't parallelize it. skip.UnderShort(t) - skip.UnderBazelWithIssue(t, 68496, "A TON of build errors") + if bazel.BuiltWithBazel() { + skip.IgnoreLint(t, "the staticcheck tests are run during the bazel build") + } cmd, stderr, filter, err := dirCmd( crdb.Dir, diff --git a/pkg/testutils/lint/passes/staticcheck/BUILD.bazel b/pkg/testutils/lint/passes/staticcheck/BUILD.bazel new file mode 100644 index 000000000000..6b57842cb1c7 --- /dev/null +++ b/pkg/testutils/lint/passes/staticcheck/BUILD.bazel @@ -0,0 +1,14 @@ +load("@io_bazel_rules_go//go:def.bzl", "go_library") + +go_library( + name = "staticcheck", + srcs = ["staticcheck.go"], + importpath = "github.com/cockroachdb/cockroach/pkg/testutils/lint/passes/staticcheck", + visibility = ["//visibility:public"], + deps = [ + "@co_honnef_go_tools//analysis/facts", + "@co_honnef_go_tools//analysis/lint", + "@co_honnef_go_tools//analysis/report", + "@org_golang_x_tools//go/analysis", + ], +) diff --git a/pkg/testutils/lint/passes/staticcheck/staticcheck.go b/pkg/testutils/lint/passes/staticcheck/staticcheck.go new file mode 100644 index 000000000000..3cdc69412e72 --- /dev/null +++ b/pkg/testutils/lint/passes/staticcheck/staticcheck.go @@ -0,0 +1,73 @@ +// Copyright 2020 The Cockroach Authors. +// +// Use of this software is governed by the Business Source License +// included in the file licenses/BSL.txt. +// +// As of the Change Date specified in that file, in accordance with +// the Business Source License, use of this software will be governed +// by the Apache License, Version 2.0, included in the file +// licenses/APL.txt. + +// Package staticcheck provides utilities for consuming `staticcheck` checks in +// `nogo`. +package staticcheck + +import ( + "strings" + + "golang.org/x/tools/go/analysis" + "honnef.co/go/tools/analysis/facts" + "honnef.co/go/tools/analysis/lint" + "honnef.co/go/tools/analysis/report" +) + +// MungeAnalyzer updates an Analyzer from `staticcheck` to make it work w/ nogo. +// The staticcheck analyzers don't look at "lint:ignore" directives, so if you +// integrate them into `nogo` unchanged, you'll get spurious build failures for +// issues that are actually explicitly ignored. So for each staticcheck analyzer +// we add `facts.Directives` to the list of dependencies, then cross-check +// each reported diagnostic to make sure it's not ignored before allowing it +// through. +func MungeAnalyzer(analyzer *analysis.Analyzer) { + // Add facts.directives to the list of dependencies for this analyzer. + analyzer.Requires = analyzer.Requires[0:len(analyzer.Requires):len(analyzer.Requires)] + analyzer.Requires = append(analyzer.Requires, facts.Directives) + oldRun := analyzer.Run + analyzer.Run = func(p *analysis.Pass) (interface{}, error) { + pass := *p + oldReport := p.Report + pass.Report = func(diag analysis.Diagnostic) { + dirs := pass.ResultOf[facts.Directives].([]lint.Directive) + for _, dir := range dirs { + cmd := dir.Command + args := dir.Arguments + switch cmd { + case "ignore": + ignorePos := report.DisplayPosition(pass.Fset, dir.Node.Pos()) + nodePos := report.DisplayPosition(pass.Fset, diag.Pos) + if ignorePos.Filename != nodePos.Filename || ignorePos.Line != nodePos.Line { + continue + } + for _, check := range strings.Split(args[0], ",") { + if check == analyzer.Name { + // Skip reporting the diagnostic. + return + } + } + case "file-ignore": + ignorePos := report.DisplayPosition(pass.Fset, dir.Node.Pos()) + nodePos := report.DisplayPosition(pass.Fset, diag.Pos) + if ignorePos.Filename == nodePos.Filename { + // Skip reporting the diagnostic. + return + } + default: + // Unknown directive, ignore + continue + } + } + oldReport(diag) + } + return oldRun(&pass) + } +} diff --git a/pkg/util/log/stderr_redirect_windows.go b/pkg/util/log/stderr_redirect_windows.go index 9861d56addcf..526e555106e4 100644 --- a/pkg/util/log/stderr_redirect_windows.go +++ b/pkg/util/log/stderr_redirect_windows.go @@ -19,10 +19,7 @@ import ( // dupFD is used to initialize OrigStderr (see stderr_redirect.go). func dupFD(fd uintptr) (uintptr, error) { // Adapted from https://github.com/golang/go/blob/go1.8/src/syscall/exec_windows.go#L303. - p, err := windows.GetCurrentProcess() - if err != nil { - return 0, err - } + p := windows.CurrentProcess() var h windows.Handle return uintptr(h), windows.DuplicateHandle(p, windows.Handle(fd), p, &h, 0, true, windows.DUPLICATE_SAME_ACCESS) }