diff options
author | Philipp Hörist <philipp@hoerist.com> | 2023-03-27 21:56:34 +0300 |
---|---|---|
committer | Philipp Hörist <philipp@hoerist.com> | 2023-03-27 21:56:34 +0300 |
commit | d10a154fb57ae86826506a9977e3f781a9b40f0e (patch) | |
tree | 7d0c882a2843d7064f9072a46f96f512d157a744 /pyproject.toml | |
parent | 804ec59570f6e209d0f6dcb25529635a6cdf0063 (diff) |
ci: Update ruff to 0.0.259
Diffstat (limited to 'pyproject.toml')
-rw-r--r-- | pyproject.toml | 18 |
1 files changed, 18 insertions, 0 deletions
diff --git a/pyproject.toml b/pyproject.toml index cd1b9db91..6d14fbc7d 100644 --- a/pyproject.toml +++ b/pyproject.toml @@ -198,7 +198,15 @@ ignore = [ "N806", # Variable should be lower case "N817", # CamelCase imported as acronym "N818", # Exception name should be named with an Error suffix + "PLC1901",# Expression can be simplified to x as an empty string is falsey + "PLR0911",# Too many return statements + "PLR0912",# Too many branches + "PLR0913",# Too many arguments to function call + "PLR0915",# Too many statements "PLR2004",# Magic value used in comparison, consider replacing x with a constant variable + "PLR5501",# Consider using `elif` instead of `else` then `if` to remove one indentation level + "PLW0603",# Using the global statement to update `x` is discouraged + "PLW2901",# `for` loop variable `x` overwritten by assignment target "RUF001", # AmbiguousUnicodeCharacterString "RUF002", # AmbiguousUnicodeCharacterDocstring "RUF003", # AmbiguousUnicodeCharacterComment @@ -206,10 +214,17 @@ ignore = [ "RUF100", # Unused `noqa` directive "S101", # Use of `assert` detected "S110", # `try`-`except`-`pass` detected, consider logging the exception + "S301", # `pickle` and modules that wrap it can be unsafe when used to deserialize untrusted data, possible security issue + "S303", # Use of insecure MD2, MD4, MD5, or SHA1 hash function + "S310", # Audit URL open for permitted schemes + "S311", # Standard pseudo-random generators are not suitable for cryptographic purposes + "S314", # Using `xml` to parse untrusted data is known to be vulnerable to XML attacks; use `defusedxml` equivalents "S324", # Probable use of insecure hash functions + "S608", # Possible SQL injection vector through string-based query construction "SIM102", # Use a single `if` statement instead of nested `if` statements "SIM105", # Use `contextlib.suppress(Exception)` instead of try-except-pass "SIM108", # Use ternary operator + "SIM114", # Combine `if` branches using logical `or` operator" "SIM115", # Use context handler for opening files "SIM201", # Use x instead of not x "SIM212", # Use `value if value else ''` instead of `'' if not value else value` @@ -219,6 +234,9 @@ ignore = [ "UP031", # Use format specifiers instead of percent format "UP032", # Use f-string instead of `format` call "UP034", # Avoid extraneous parentheses + "UP035", # Import from `collections.abc` instead: `Callable` + "UP038", # Use `X | Y` in `isinstance` call instead of `(X, Y)` + "UP037", # Remove quotes from type annotation ] exclude = [ |