From 8fa1eda207be48a377082eec3c520af3a08d18ed Mon Sep 17 00:00:00 2001 From: "Charles P. Cross" <8572939+cpdata@users.noreply.github.com> Date: Fri, 19 Dec 2025 00:28:20 -0500 Subject: [PATCH] fix(lint): add batch_ops.go to G201 exclusion The batch_ops.go file uses fmt.Sprintf to build SQL queries with IN clause expansion, same pattern as dependencies.go. The placeholders are parameterized (?) making this safe, but gosec G201 flags it. Add batch_ops.go to the existing G201 exclusion path regex. This fixes CI lint failures affecting multiple open PRs. Co-authored-by: Charles P. Cross --- .golangci.yml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/.golangci.yml b/.golangci.yml index 31da97cf..fdc9983e 100644 --- a/.golangci.yml +++ b/.golangci.yml @@ -79,7 +79,7 @@ linters: - gosec text: "G115" # G201: SQL with fmt.Sprintf using placeholders (IN clause expansion) - - path: 'internal/storage/sqlite/dependencies\.go' + - path: 'internal/storage/sqlite/(dependencies|batch_ops)\.go' linters: - gosec text: "G201"