aboutsummaryrefslogtreecommitdiffstats
path: root/modules/util
diff options
context:
space:
mode:
authorkolaente <k@knt.li>2020-10-11 22:27:20 +0200
committerGitHub <noreply@github.com>2020-10-11 21:27:20 +0100
commit64133126cdb842a047b2cd104c2f177f6e83f79a (patch)
tree8bfd86c1f7a3c565c19552c588758674384796e3 /modules/util
parente35f7e81ae7ed8388a8011baa43cb4faf42ebfe0 (diff)
downloadgitea-64133126cdb842a047b2cd104c2f177f6e83f79a.tar.gz
gitea-64133126cdb842a047b2cd104c2f177f6e83f79a.zip
Update golangci-lint to version 1.31.0 (#13102)
This PR updates golangci-lint to the latest version 1.31.0. The upgrade introduced a new check for which I've fixed or disabled most cases. Signed-off-by: kolaente <k@knt.li>
Diffstat (limited to 'modules/util')
-rw-r--r--modules/util/sanitize.go2
1 files changed, 1 insertions, 1 deletions
diff --git a/modules/util/sanitize.go b/modules/util/sanitize.go
index b1c17b29cf..a4f5479dfb 100644
--- a/modules/util/sanitize.go
+++ b/modules/util/sanitize.go
@@ -28,7 +28,7 @@ func URLSanitizedError(err error, unsanitizedURL string) error {
// SanitizeMessage sanitizes a message which may contains a sensitive URL
func SanitizeMessage(message, unsanitizedURL string) string {
sanitizedURL := SanitizeURLCredentials(unsanitizedURL, true)
- return strings.Replace(message, unsanitizedURL, sanitizedURL, -1)
+ return strings.ReplaceAll(message, unsanitizedURL, sanitizedURL)
}
// SanitizeURLCredentials sanitizes a url, either removing user credentials