@theglitchking/gimme-the-lint 2.0.0 → 2.1.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -6,13 +6,13 @@
6
6
  },
7
7
  "metadata": {
8
8
  "description": "Official marketplace for gimme-the-lint - polyglot progressive linting with per-app baselines and drift detection",
9
- "version": "2.0.0"
9
+ "version": "2.1.0"
10
10
  },
11
11
  "plugins": [
12
12
  {
13
13
  "name": "gimme-the-lint",
14
- "description": "Polyglot progressive linting for monorepos — adapter-driven baselines, per-app drift detection, and idempotent skips across JavaScript/TypeScript, Python, Go, and Rust.",
15
- "version": "2.0.0",
14
+ "description": "Polyglot progressive linting for monorepos — adapter-driven baselines, per-app drift detection, and idempotent skips across JavaScript/TypeScript, Python, Go, Rust, and Terraform.",
15
+ "version": "2.1.0",
16
16
  "author": {
17
17
  "name": "TheGlitchKing"
18
18
  },
@@ -30,6 +30,8 @@
30
30
  "ruff",
31
31
  "golangci-lint",
32
32
  "clippy",
33
+ "tflint",
34
+ "terraform",
33
35
  "claude-code"
34
36
  ],
35
37
  "category": "productivity",
@@ -1,7 +1,7 @@
1
1
  {
2
2
  "name": "gimme-the-lint",
3
- "description": "Polyglot progressive linting for monorepos — adapter-driven baselines, per-app drift detection, and idempotent skips across JavaScript/TypeScript, Python, Go, and Rust.",
4
- "version": "2.0.0",
3
+ "description": "Polyglot progressive linting for monorepos — adapter-driven baselines, per-app drift detection, and idempotent skips across JavaScript/TypeScript, Python, Go, Rust, and Terraform.",
4
+ "version": "2.1.0",
5
5
  "author": {
6
6
  "name": "TheGlitchKing",
7
7
  "email": "theglitchking@users.noreply.github.com"
@@ -19,6 +19,8 @@
19
19
  "eslint",
20
20
  "ruff",
21
21
  "golangci-lint",
22
- "clippy"
22
+ "clippy",
23
+ "tflint",
24
+ "terraform"
23
25
  ]
24
26
  }
package/CHANGELOG.md CHANGED
@@ -5,6 +5,48 @@ All notable changes to this project will be documented in this file.
5
5
  The format is based on [Keep a Changelog](https://keepachangelog.com/en/1.1.0/),
6
6
  and this project adheres to [Semantic Versioning](https://semver.org/spec/v2.0.0.html).
7
7
 
8
+ ## [2.1.0] - 2026-05-17
9
+
10
+ ### Added
11
+ - **Terraform / OpenTofu support** via a new `tflint` linter adapter. tflint
12
+ plugs into the same progressive-lint engine as every other linter: baselines
13
+ are captured into `.gtl/apps/<app>/baseline.json` under a `tflint` section,
14
+ fingerprinted by `file + rule + message`, and only new violations block.
15
+ - Runs `tflint --format=json`, module-scoped (executes inside the module
16
+ directory for compatibility with tflint versions predating `--chdir`).
17
+ - Parses both `issues` and `errors` — broken HCL surfaces as a blocking
18
+ error rather than slipping through as zero issues.
19
+ - Supports `--fix`; tracks config drift on `.tflint.hcl`.
20
+ - **Extension-based app discovery** for Terraform: a directory containing
21
+ `*.tf` / `*.tofu` source is auto-discovered and bound to `tflint`. Terraform
22
+ has no manifest file, so it is discovered by extension rather than by a
23
+ manifest like `package.json` or `go.mod`. In the root-module layout (`.tf`
24
+ at the repo root *and* in `modules/*/`), the root is treated as a workspace
25
+ root — bind `.` explicitly in `gimme-the-lint.config.js` to lint it. See the
26
+ installation guide.
27
+ - **Best-practice config templates** for every supported codebase. `install`
28
+ now seeds each discovered app with a curated, "recommended tier" config for
29
+ its linter — `eslint.config.js` + `.prettierrc.json`, `biome.json`,
30
+ `pyproject.toml` `[tool.ruff]`, `.golangci.yml` (golangci-lint v2 format),
31
+ `clippy.toml` + `Cargo.toml` `[lints.clippy]`, `.tflint.hcl`. Every write is
32
+ create-if-absent — an existing config is never overwritten (`--force`
33
+ replaces). New module `lib/linter-configs.js`.
34
+ - **Security lint rules** across every codebase. gitleaks remains the universal
35
+ secret scanner (passwords, SSL/private keys, tokens — always blocks, never
36
+ baselined) and its template now also flags PEM private keys and hardcoded
37
+ password assignments. Per-linter security layers are enabled in the shipped
38
+ configs: `gosec` (Go), Ruff `S` / flake8-bandit (Python),
39
+ `eslint-plugin-security` + `eslint-plugin-no-secrets` (JS/TS), and Biome's
40
+ `security` rule group.
41
+ - **Prettier support** — a `.prettierrc.json` template is seeded for ESLint
42
+ apps, and the ESLint config now applies `eslint-config-prettier` so the two
43
+ do not fight over formatting. The ESLint template refresh is additive: every
44
+ pre-existing rule (architecture import guards, `no-cycle`, unused-vars) is
45
+ retained.
46
+ - **New documentation** — `.documentation/lint-rules-guide.md` documents every
47
+ supported codebase, its baseline rules, the security layers, and how/where to
48
+ adjust them.
49
+
8
50
  ## [2.0.0] - 2026-05-17
9
51
 
10
52
  A ground-up rearchitecture: gimme-the-lint is now a language-agnostic
package/README.md CHANGED
@@ -19,7 +19,7 @@ stuff at its own pace; meanwhile no new mess gets in.
19
19
  **v2.0** generalizes that idea to any linter and any language. It is no longer
20
20
  "ESLint + Ruff for webapps" — it is a progressive-lint **engine** with a
21
21
  pluggable **linter adapter** for each tool, across **JavaScript/TypeScript, Python,
22
- Go, and Rust**, in **any monorepo shape**.
22
+ Go, Rust, and Terraform**, in **any monorepo shape**.
23
23
 
24
24
  ---
25
25
 
@@ -38,8 +38,10 @@ is ever flagged. (In v1 this job was outsourced to the third-party
38
38
 
39
39
  Each app is bound to the linters its package manifest implies — `package.json`
40
40
  → ESLint, `pyproject.toml` → Ruff, `go.mod` → golangci-lint, `Cargo.toml` →
41
- Clippy, `biome.json` → Biome. Drift detection runs per app, so a config or
42
- linter-version change in one app never churns the baselines of another.
41
+ Clippy, `biome.json` → Biome. Terraform has no manifest, so a directory of
42
+ `*.tf` / `*.tofu` files binds to tflint by extension. Drift detection runs per
43
+ app, so a config or linter-version change in one app never churns the baselines
44
+ of another.
43
45
 
44
46
  ---
45
47
 
@@ -48,10 +50,14 @@ linter-version change in one app never churns the baselines of another.
48
50
  - **Progressive linting** — only new violations block; existing ones are baselined
49
51
  - **In-house diff engine** — line/column-independent fingerprints survive code shifts
50
52
  - **Pluggable linter adapters** — the choice of linter is config, not a hardcode
51
- - **Polyglot** — JavaScript/TypeScript, Python, Go, Rust out of the box
53
+ - **Polyglot** — JavaScript/TypeScript, Python, Go, Rust, Terraform out of the box
52
54
  - **Per-app model** — auto-discovers every package in a monorepo; no `frontend/`
53
55
  + `backend/` assumption
54
56
  - **Per-app drift detection** — app add/remove, config change, linter version, age
57
+ - **Best-practice configs shipped** — `install` seeds each app with a curated,
58
+ security-aware config for its linter (create-if-absent — never clobbers yours)
59
+ - **Security linting built in** — gitleaks for secrets across every codebase,
60
+ plus per-language security rules (gosec, Ruff `S`, eslint-plugin-security)
55
61
  - **Idempotent skips** — an app with code but no installed linter is warn-skipped
56
62
  (never blocks) — or fails loudly under `--strict`
57
63
  - **Offline install** — air-gapped mode for regulated environments
@@ -68,6 +74,22 @@ linter-version change in one app never churns the baselines of another.
68
74
  | Python | `ruff` | `pyproject.toml`, `requirements.txt`, `setup.py` |
69
75
  | Go | `golangci-lint` | `go.mod` |
70
76
  | Rust | `clippy` (`cargo clippy`) | `Cargo.toml` |
77
+ | Terraform / OpenTofu | `tflint` | `*.tf` / `*.tofu` files (no manifest) |
78
+
79
+ ## Shipped lint configs
80
+
81
+ `install` seeds every discovered app with a best-practice ("recommended" tier)
82
+ config for its linter — `eslint.config.js` + `.prettierrc.json`, `biome.json`,
83
+ `pyproject.toml` `[tool.ruff]`, `.golangci.yml`, `clippy.toml` + `Cargo.toml`
84
+ `[lints.clippy]`, `.tflint.hcl` — plus a repo-root `.gitleaks.toml`. Configs are
85
+ **created only if absent**; your own config is never overwritten.
86
+
87
+ Every shipped config carries a **security layer**: gitleaks scans all files for
88
+ secrets (passwords, SSL/private keys, tokens) and always blocks, while each
89
+ linter adds language-specific security rules (`gosec`, Ruff `S` / flake8-bandit,
90
+ `eslint-plugin-security`, Biome's `security` group). See
91
+ [`.documentation/lint-rules-guide.md`](.documentation/lint-rules-guide.md) for
92
+ the baseline rules per codebase and how to adjust them.
71
93
 
72
94
  ---
73
95
 
@@ -262,7 +284,7 @@ lib/
262
284
  ├── diff-engine.js pure diff: new vs baselined vs fixed
263
285
  ├── baseline-store.js one baseline.json format for every linter
264
286
  ├── adapters/ one adapter per linter (eslint, biome, ruff,
265
- │ golangci-lint, clippy) + the base contract
287
+ │ golangci-lint, clippy, tflint) + the base contract
266
288
  ├── project-model.js discovers apps + binds them to linters
267
289
  ├── units.js resolves apps → {dir, linters, baseline path}
268
290
  ├── check.js runCheck: lint → diff → report
@@ -282,7 +304,7 @@ git hooks, GitHub Action and Claude Code plugin are thin front doors over it.
282
304
  - **Node.js** >= 20
283
305
  - **Git** (for hooks and staged-file detection)
284
306
  - A linter for each language you use (`eslint`/`biome`, `ruff`, `golangci-lint`,
285
- `clippy`) — any language whose linter is absent is simply skipped
307
+ `clippy`, `tflint`) — any language whose linter is absent is simply skipped
286
308
 
287
309
  ## License
288
310
 
@@ -6,6 +6,7 @@ const BiomeAdapter = require('./biome');
6
6
  const RuffAdapter = require('./ruff');
7
7
  const GolangciLintAdapter = require('./golangci-lint');
8
8
  const ClippyAdapter = require('./clippy');
9
+ const TflintAdapter = require('./tflint');
9
10
 
10
11
  // The adapter registry. `tool` strings in gimme-the-lint.config.js resolve to
11
12
  // concrete adapters here. Adding a language to gimme-the-lint means adding one
@@ -17,6 +18,7 @@ const REGISTRY = {
17
18
  ruff: RuffAdapter,
18
19
  'golangci-lint': GolangciLintAdapter,
19
20
  clippy: ClippyAdapter,
21
+ tflint: TflintAdapter,
20
22
  };
21
23
 
22
24
  /** Construct an adapter instance by id. Throws on an unknown id. */
@@ -0,0 +1,138 @@
1
+ 'use strict';
2
+
3
+ const fs = require('fs');
4
+ const path = require('path');
5
+ const { LinterAdapter } = require('./adapter');
6
+ const { createViolation, SEVERITY } = require('../violation');
7
+
8
+ // tflint adapter. tflint is the de-facto Terraform/OpenTofu linter; it emits a
9
+ // machine-readable report under `--format json`. Terraform has no manifest
10
+ // file — a directory of *.tf (or *.tofu) IS the module — so detection here is
11
+ // extension-based. tflint is module-scoped: it lints the .tf files of one
12
+ // directory, so the adapter resolves and runs inside that directory, mirroring
13
+ // the crate/module handling in the Clippy and golangci-lint adapters.
14
+
15
+ const TFLINT_CONFIG_FILES = ['.tflint.hcl'];
16
+
17
+ /** Map a tflint severity string onto a NormalizedViolation severity. */
18
+ function mapSeverity(severity) {
19
+ switch (String(severity).toLowerCase()) {
20
+ case 'error':
21
+ return SEVERITY.ERROR;
22
+ case 'notice':
23
+ case 'info':
24
+ return SEVERITY.INFO;
25
+ case 'warning':
26
+ default:
27
+ return SEVERITY.WARNING;
28
+ }
29
+ }
30
+
31
+ class TflintAdapter extends LinterAdapter {
32
+ get id() {
33
+ return 'tflint';
34
+ }
35
+
36
+ get languages() {
37
+ return ['terraform'];
38
+ }
39
+
40
+ get supportsFix() {
41
+ return true;
42
+ }
43
+
44
+ // tflint config files double as a detection hint; the real signal is the
45
+ // presence of *.tf source (see sourceExtensions / project-model.js).
46
+ get manifestFiles() {
47
+ return ['.tflint.hcl', '.terraform.lock.hcl'];
48
+ }
49
+
50
+ get sourceExtensions() {
51
+ return ['.tf', '.tofu'];
52
+ }
53
+
54
+ configFiles() {
55
+ return TFLINT_CONFIG_FILES;
56
+ }
57
+
58
+ buildCommand(targets, opts = {}) {
59
+ const args = ['--format=json'];
60
+ if (opts.fix && this.supportsFix) args.push('--fix');
61
+
62
+ // tflint lints whichever directory it runs in. Resolve a run directory
63
+ // from the target — a directory target directly, or the parent directory
64
+ // of a file target (changed-files mode) — and lint there with no path
65
+ // arguments, which keeps the adapter compatible with tflint versions that
66
+ // predate `--chdir`.
67
+ let cwd = opts.cwd || this.projectRoot;
68
+ const first = targets && targets.length ? targets[0] : null;
69
+ if (first && first !== '.') {
70
+ const abs = path.resolve(this.projectRoot, first);
71
+ try {
72
+ cwd = fs.statSync(abs).isDirectory() ? abs : path.dirname(abs);
73
+ } catch {
74
+ // Unresolvable target — fall back to the default cwd.
75
+ }
76
+ }
77
+ return { cmd: this.binary, args, cwd };
78
+ }
79
+
80
+ parse(stdout) {
81
+ const text = (stdout || '').trim();
82
+ if (!text) return [];
83
+
84
+ let report;
85
+ try {
86
+ report = JSON.parse(text);
87
+ } catch {
88
+ return [];
89
+ }
90
+
91
+ const violations = [];
92
+
93
+ const issues = Array.isArray(report.issues) ? report.issues : [];
94
+ for (const issue of issues) {
95
+ const range = issue.range || {};
96
+ const start = range.start || {};
97
+ const end = range.end || {};
98
+ const rule = issue.rule || {};
99
+ violations.push(
100
+ createViolation({
101
+ file: this._relativize(range.filename || ''),
102
+ line: start.line,
103
+ col: start.column,
104
+ endLine: end.line,
105
+ endCol: end.column,
106
+ ruleId: rule.name || 'tflint',
107
+ severity: mapSeverity(rule.severity),
108
+ message: issue.message,
109
+ source: 'tflint',
110
+ })
111
+ );
112
+ }
113
+
114
+ // tflint reports configuration / HCL parse failures in a separate
115
+ // `errors` array — treat each as a blocking error so broken Terraform
116
+ // fails the check rather than slipping through as zero issues.
117
+ const errors = Array.isArray(report.errors) ? report.errors : [];
118
+ for (const err of errors) {
119
+ const range = err.range || {};
120
+ const start = range.start || {};
121
+ violations.push(
122
+ createViolation({
123
+ file: this._relativize(range.filename || ''),
124
+ line: start.line,
125
+ col: start.column,
126
+ ruleId: 'tflint-error',
127
+ severity: SEVERITY.ERROR,
128
+ message: err.message || err.summary || 'tflint error',
129
+ source: 'tflint',
130
+ })
131
+ );
132
+ }
133
+
134
+ return violations;
135
+ }
136
+ }
137
+
138
+ module.exports = TflintAdapter;
package/lib/installer.js CHANGED
@@ -7,6 +7,7 @@ const venvManager = require('./venv-manager');
7
7
  const gitHooksManager = require('./git-hooks-manager');
8
8
  const toolchain = require('./toolchain');
9
9
  const { runBaseline } = require('./baseline');
10
+ const { writeLinterConfigs } = require('./linter-configs');
10
11
 
11
12
  // init() supports two adoption modes beyond the default:
12
13
  // options.offline — air-gapped install: no npm/pip fetches; assumes the
@@ -99,6 +100,32 @@ async function init(projectRoot, options = {}) {
99
100
  }
100
101
  }
101
102
 
103
+ // Step 7b: Seed each discovered app with its linters' best-practice config
104
+ // (create-if-absent — a user's existing linter config is never overwritten).
105
+ try {
106
+ results.linterConfigs = await writeLinterConfigs(projectRoot, {
107
+ force: options.force,
108
+ reactVersion: options.reactVersion,
109
+ });
110
+ const seeded = results.linterConfigs.filter(
111
+ (c) => c.status === 'created' || c.status === 'appended'
112
+ );
113
+ if (seeded.length) {
114
+ results.steps.push(
115
+ `Seeded best-practice linter configs: ${seeded
116
+ .map((c) => `${c.app === '.' ? '' : c.app + '/'}${c.file}`)
117
+ .join(', ')}`
118
+ );
119
+ }
120
+ for (const c of results.linterConfigs) {
121
+ if (c.status === 'error') {
122
+ results.errors.push(`Linter config (${c.linter} @ ${c.app}): ${c.reason}`);
123
+ }
124
+ }
125
+ } catch (e) {
126
+ results.errors.push(`Linter configs: ${e.message}`);
127
+ }
128
+
102
129
  // Step 8: Setup Python venv (backend) — skipped entirely in offline mode,
103
130
  // where the toolchain is provisioned outside gimme-the-lint.
104
131
  if (options.offline) {
@@ -0,0 +1,130 @@
1
+ 'use strict';
2
+
3
+ const fs = require('fs-extra');
4
+ const path = require('path');
5
+ const projectModel = require('./project-model');
6
+ const configManager = require('./config-manager');
7
+
8
+ // Ships gimme-the-lint's best-practice ("recommended" tier) linter configs
9
+ // into a project. Every write is CREATE-IF-ABSENT — a user's existing linter
10
+ // config is never overwritten (pass { force: true } to replace).
11
+ //
12
+ // For eslint / golangci-lint / clippy / tflint the config file is not the
13
+ // linter's detection key, so install genuinely seeds a config. For biome and
14
+ // ruff the config file IS the detection key (biome.json / pyproject.toml), so
15
+ // a discovered app already has one — the template then only applies on adoption
16
+ // or under --force.
17
+
18
+ // linter id -> { template filename, destination filename in the app dir }
19
+ const LINTER_CONFIGS = {
20
+ eslint: { template: 'eslint.config.template.js', dest: 'eslint.config.js' },
21
+ biome: { template: 'biome.template.json', dest: 'biome.json' },
22
+ ruff: { template: 'pyproject.template.toml', dest: 'pyproject.toml' },
23
+ 'golangci-lint': { template: '.golangci.template.yml', dest: '.golangci.yml' },
24
+ tflint: { template: '.tflint.template.hcl', dest: '.tflint.hcl' },
25
+ clippy: { template: 'clippy.template.toml', dest: 'clippy.toml' },
26
+ };
27
+
28
+ /** Copy one template into an app dir, create-if-absent. */
29
+ async function writeConfig(appRoot, linterId, options = {}) {
30
+ const spec = LINTER_CONFIGS[linterId];
31
+ if (!spec) return { linter: linterId, status: 'skipped', reason: 'no template' };
32
+
33
+ const dest = path.join(appRoot, spec.dest);
34
+ const result = { linter: linterId, file: spec.dest };
35
+
36
+ if ((await fs.pathExists(dest)) && !options.force) {
37
+ result.status = 'exists';
38
+ return result;
39
+ }
40
+ try {
41
+ const subs =
42
+ linterId === 'eslint' ? { REACT_VERSION: options.reactVersion || '18.3' } : {};
43
+ await configManager.copyTemplate(spec.template, dest, subs);
44
+ result.status = 'created';
45
+ } catch (e) {
46
+ result.status = 'error';
47
+ result.reason = e.message;
48
+ }
49
+ return result;
50
+ }
51
+
52
+ /** ESLint apps also get a Prettier config (create-if-absent). */
53
+ async function writePrettier(appRoot, options = {}) {
54
+ const dest = path.join(appRoot, '.prettierrc.json');
55
+ const result = { linter: 'prettier', file: '.prettierrc.json' };
56
+ if ((await fs.pathExists(dest)) && !options.force) {
57
+ result.status = 'exists';
58
+ return result;
59
+ }
60
+ try {
61
+ await configManager.copyTemplate('.prettierrc.template.json', dest);
62
+ result.status = 'created';
63
+ } catch (e) {
64
+ result.status = 'error';
65
+ result.reason = e.message;
66
+ }
67
+ return result;
68
+ }
69
+
70
+ /**
71
+ * Clippy lint levels can only be declared in Cargo.toml's [lints.clippy]
72
+ * table (clippy.toml tunes thresholds only). Append the table — but only if
73
+ * Cargo.toml has no [lints] / [workspace.lints] table already.
74
+ */
75
+ async function writeClippyLints(appRoot) {
76
+ const cargoPath = path.join(appRoot, 'Cargo.toml');
77
+ const result = { linter: 'clippy', file: 'Cargo.toml [lints.clippy]' };
78
+
79
+ if (!(await fs.pathExists(cargoPath))) {
80
+ return { ...result, status: 'skipped', reason: 'no Cargo.toml' };
81
+ }
82
+ const content = await fs.readFile(cargoPath, 'utf8');
83
+ if (/^\s*\[(workspace\.)?lints/m.test(content)) {
84
+ return { ...result, status: 'exists' };
85
+ }
86
+ try {
87
+ const snippet = await fs.readFile(
88
+ path.join(configManager.TEMPLATES_DIR, 'clippy-cargo-lints.template.toml'),
89
+ 'utf8'
90
+ );
91
+ const sep = content.endsWith('\n') ? '\n' : '\n\n';
92
+ await fs.writeFile(cargoPath, content + sep + snippet, 'utf8');
93
+ return { ...result, status: 'appended' };
94
+ } catch (e) {
95
+ return { ...result, status: 'error', reason: e.message };
96
+ }
97
+ }
98
+
99
+ /**
100
+ * Discover every app and seed its linters' best-practice configs.
101
+ * @returns {Promise<{app, linter, file, status, reason?}[]>}
102
+ */
103
+ async function writeLinterConfigs(projectRoot, options = {}) {
104
+ const root = projectRoot || process.cwd();
105
+ const apps = projectModel.discoverApps(root);
106
+ const written = [];
107
+
108
+ for (const app of apps) {
109
+ const appRoot = path.resolve(root, app.appPath);
110
+ for (const linterId of app.linters) {
111
+ written.push({ app: app.appPath, ...(await writeConfig(appRoot, linterId, options)) });
112
+
113
+ if (linterId === 'eslint') {
114
+ written.push({ app: app.appPath, ...(await writePrettier(appRoot, options)) });
115
+ }
116
+ if (linterId === 'clippy') {
117
+ written.push({ app: app.appPath, ...(await writeClippyLints(appRoot)) });
118
+ }
119
+ }
120
+ }
121
+ return written;
122
+ }
123
+
124
+ module.exports = {
125
+ LINTER_CONFIGS,
126
+ writeConfig,
127
+ writePrettier,
128
+ writeClippyLints,
129
+ writeLinterConfigs,
130
+ };
@@ -23,6 +23,20 @@ const MANIFEST_LINTERS = {
23
23
  'Cargo.toml': 'clippy',
24
24
  };
25
25
 
26
+ // Terraform / OpenTofu have no manifest file — a directory of *.tf (or *.tofu)
27
+ // IS the module — so they are discovered by source extension rather than by a
28
+ // manifest filename, unlike every other supported language.
29
+ const TERRAFORM_EXTENSIONS = ['.tf', '.tofu'];
30
+
31
+ /** True if any directory entry is a Terraform/OpenTofu source file. */
32
+ function hasTerraformSource(entries) {
33
+ return entries.some(
34
+ (entry) =>
35
+ entry.isFile() &&
36
+ TERRAFORM_EXTENSIONS.some((ext) => entry.name.endsWith(ext))
37
+ );
38
+ }
39
+
26
40
  // Template/scaffold directories: linting them is pure noise. Skipped by
27
41
  // convention; projects can add more via `skipPatterns` in the config.
28
42
  const DEFAULT_SKIP_PATTERNS = ['_template-*', '__template__', '*.template.*'];
@@ -67,6 +81,7 @@ function findManifestDirs(projectRoot) {
67
81
  linters.add(MANIFEST_LINTERS[entry.name]);
68
82
  }
69
83
  }
84
+ if (hasTerraformSource(entries)) linters.add('tflint');
70
85
  if (linters.size > 0) {
71
86
  found.push({ dir: relDir || '.', linters });
72
87
  }
package/package.json CHANGED
@@ -1,7 +1,7 @@
1
1
  {
2
2
  "name": "@theglitchking/gimme-the-lint",
3
- "version": "2.0.0",
4
- "description": "Polyglot progressive linting for monorepos — adapter-driven baselines, per-app drift detection, and idempotent skips across JavaScript/TypeScript, Python, Go, and Rust.",
3
+ "version": "2.1.0",
4
+ "description": "Polyglot progressive linting for monorepos — adapter-driven baselines, per-app drift detection, and idempotent skips across JavaScript/TypeScript, Python, Go, Rust, and Terraform.",
5
5
  "keywords": [
6
6
  "linting",
7
7
  "progressive-linting",
@@ -20,7 +20,10 @@
20
20
  "golangci-lint",
21
21
  "go",
22
22
  "clippy",
23
- "rust"
23
+ "rust",
24
+ "tflint",
25
+ "terraform",
26
+ "opentofu"
24
27
  ],
25
28
  "author": {
26
29
  "name": "TheGlitchKing",
@@ -45,6 +45,18 @@ regex = '''(?i)(postgresql|postgres|mysql|mongodb)://[a-zA-Z0-9_-]+:([^@\s]+)@''
45
45
  tags = ["database", "password"]
46
46
  secretGroup = 2
47
47
 
48
+ [[rules]]
49
+ id = "private-key-pem"
50
+ description = "Private key / SSL cert key (PEM, OpenSSH, PKCS)"
51
+ regex = '''-----BEGIN ([A-Z]+ )?PRIVATE KEY( BLOCK)?-----'''
52
+ tags = ["key", "private", "ssl"]
53
+
54
+ [[rules]]
55
+ id = "hardcoded-password"
56
+ description = "Hardcoded password / secret assignment"
57
+ regex = '''(?i)\b(password|passwd|pwd|secret)\b\s*[:=]\s*['"][^'"\s$]{6,}['"]'''
58
+ tags = ["password", "secret"]
59
+
48
60
  # Allowlist (false positive prevention)
49
61
  [allowlist]
50
62
  description = "Allowlist for false positives"
@@ -0,0 +1,81 @@
1
+ # Generated by gimme-the-lint — golangci-lint v2 (recommended tier)
2
+ # Requires golangci-lint v2.x. Run `golangci-lint migrate` to convert v1 configs.
3
+ version: "2"
4
+
5
+ run:
6
+ timeout: 5m
7
+ tests: true
8
+
9
+ formatters:
10
+ enable:
11
+ - goimports # superset of gofmt; also manages import grouping
12
+ - gofumpt # stricter gofmt
13
+ # settings:
14
+ # goimports:
15
+ # local-prefixes:
16
+ # - github.com/your-org/your-project # set to your module path
17
+
18
+ linters:
19
+ default: standard # errcheck, govet, ineffassign, staticcheck, unused
20
+
21
+ enable:
22
+ # --- Correctness ---
23
+ - copyloopvar # loop-variable capture bugs
24
+ - bodyclose # HTTP response bodies must be closed
25
+ - errorlint # correct error wrapping / unwrapping
26
+ - nilerr # `return nil` when the error is non-nil
27
+ - noctx # HTTP requests must carry a context
28
+ - durationcheck # bad time.Duration arithmetic
29
+ - makezero # make([]T, n) then append — usually a bug
30
+ # --- Security ---
31
+ - gosec # hardcoded creds, injection, weak crypto, insecure TLS
32
+ # --- Code quality ---
33
+ - revive # modern golint replacement
34
+ - gocritic # broad diagnostic / performance checks
35
+ - gocyclo # cyclomatic complexity
36
+ - unconvert # unnecessary type conversions
37
+ - unparam # parameters that always receive the same value
38
+ - nolintlint # malformed or unexplained //nolint directives
39
+ - misspell # misspellings in comments / strings
40
+ - usestdlibvars # use stdlib constants (http.MethodGet, etc.)
41
+
42
+ settings:
43
+ errcheck:
44
+ check-type-assertions: true
45
+ gocyclo:
46
+ min-complexity: 15
47
+ gocritic:
48
+ enabled-tags:
49
+ - diagnostic
50
+ - performance
51
+ disabled-checks:
52
+ - ifElseChain
53
+ gosec:
54
+ # G104 overlaps errcheck; G115 (int-overflow) is high false-positive.
55
+ excludes:
56
+ - G104
57
+ - G115
58
+ severity: medium
59
+ confidence: medium
60
+ nolintlint:
61
+ require-explanation: true
62
+ require-specific: true
63
+
64
+ exclusions:
65
+ generated: lax
66
+ warn-unused: true
67
+ presets:
68
+ - std-error-handling
69
+ - common-false-positives
70
+ rules:
71
+ # Test code legitimately ignores errors, uses math/rand, repeats strings.
72
+ - path: '_test\.go'
73
+ linters:
74
+ - bodyclose
75
+ - gosec
76
+ - errcheck
77
+ - goconst
78
+
79
+ issues:
80
+ max-same-issues: 50
81
+ max-issues-per-linter: 0
@@ -0,0 +1,14 @@
1
+ {
2
+ "printWidth": 100,
3
+ "tabWidth": 2,
4
+ "useTabs": false,
5
+ "semi": true,
6
+ "singleQuote": true,
7
+ "quoteProps": "as-needed",
8
+ "jsxSingleQuote": false,
9
+ "trailingComma": "all",
10
+ "bracketSpacing": true,
11
+ "bracketSameLine": false,
12
+ "arrowParens": "always",
13
+ "endOfLine": "lf"
14
+ }
@@ -0,0 +1,32 @@
1
+ # Generated by gimme-the-lint — TFLint (recommended tier)
2
+ #
3
+ # Uses only the bundled "terraform" ruleset, which ships inside the TFLint
4
+ # binary. No network access and no `tflint --init` required — works offline.
5
+ #
6
+ # For deeper, cloud-provider-specific checks (AWS / GCP / Azure best practices),
7
+ # add the matching provider plugin block and run `tflint --init` once. Those
8
+ # plugins require network access — do NOT add them for air-gapped installs.
9
+ #
10
+ # plugin "aws" {
11
+ # enabled = true
12
+ # version = "0.47.0"
13
+ # source = "github.com/terraform-linters/tflint-ruleset-aws"
14
+ # }
15
+
16
+ tflint {
17
+ required_version = ">= 0.50"
18
+ }
19
+
20
+ config {
21
+ # "local" evaluates local module calls; "none" skips module evaluation.
22
+ call_module_type = "local"
23
+ # Set true to treat findings as warnings during initial rollout.
24
+ force = false
25
+ }
26
+
27
+ plugin "terraform" {
28
+ enabled = true
29
+ # "recommended" — Terraform-language hygiene. Use "all" for the stricter
30
+ # set (naming conventions, documented variables/outputs, module structure).
31
+ preset = "recommended"
32
+ }
@@ -0,0 +1,90 @@
1
+ {
2
+ "$schema": "https://biomejs.dev/schemas/latest/schema.json",
3
+ "vcs": {
4
+ "enabled": true,
5
+ "clientKind": "git",
6
+ "useIgnoreFile": true,
7
+ "defaultBranch": "main"
8
+ },
9
+ "files": {
10
+ "ignoreUnknown": false,
11
+ "maxSize": 2097152
12
+ },
13
+ "formatter": {
14
+ "enabled": true,
15
+ "indentStyle": "space",
16
+ "indentWidth": 2,
17
+ "lineWidth": 100,
18
+ "lineEnding": "lf"
19
+ },
20
+ "javascript": {
21
+ "formatter": {
22
+ "quoteStyle": "double",
23
+ "jsxQuoteStyle": "double",
24
+ "quoteProperties": "asNeeded",
25
+ "trailingCommas": "all",
26
+ "semicolons": "always",
27
+ "arrowParentheses": "always",
28
+ "bracketSameLine": false
29
+ }
30
+ },
31
+ "json": {
32
+ "formatter": {
33
+ "trailingCommas": "none"
34
+ }
35
+ },
36
+ "linter": {
37
+ "enabled": true,
38
+ "rules": {
39
+ "recommended": true,
40
+ "correctness": {
41
+ "noUnresolvedImports": "error"
42
+ },
43
+ "suspicious": {
44
+ "noConsole": {
45
+ "level": "warn",
46
+ "options": { "allow": ["error", "warn", "info"] }
47
+ },
48
+ "noImportCycles": "warn",
49
+ "noUnusedExpressions": "error"
50
+ },
51
+ "style": {
52
+ "useForOf": "warn",
53
+ "useNamingConvention": "warn",
54
+ "useConsistentTypeDefinitions": {
55
+ "level": "warn",
56
+ "options": { "define": "interface" }
57
+ }
58
+ },
59
+ "complexity": {
60
+ "noExcessiveCognitiveComplexity": {
61
+ "level": "warn",
62
+ "options": { "maxAllowedComplexity": 15 }
63
+ }
64
+ },
65
+ "performance": {
66
+ "noDelete": "warn"
67
+ },
68
+ "security": {
69
+ "noBlankTarget": "error",
70
+ "noDangerouslySetInnerHtml": "error",
71
+ "noDangerouslySetInnerHtmlWithChildren": "error",
72
+ "noGlobalEval": "error",
73
+ "noSecrets": "warn"
74
+ }
75
+ }
76
+ },
77
+ "overrides": [
78
+ {
79
+ "includes": ["**/*.test.*", "**/*.spec.*", "**/test/**"],
80
+ "linter": {
81
+ "rules": {
82
+ "suspicious": {
83
+ "noConsole": "off",
84
+ "noImportCycles": "off"
85
+ }
86
+ }
87
+ }
88
+ }
89
+ ]
90
+ }
@@ -0,0 +1,21 @@
1
+ # Generated by gimme-the-lint — Clippy lint levels
2
+ #
3
+ # Clippy lint GROUPS cannot be enabled from clippy.toml. The canonical
4
+ # mechanism (Cargo 1.74+) is the [lints.clippy] table in Cargo.toml.
5
+ # gimme-the-lint appends this block to your Cargo.toml only if no [lints]
6
+ # table already exists. For a workspace, put it under
7
+ # [workspace.lints.clippy] in the root Cargo.toml and add `[lints]
8
+ # workspace = true` to each member crate instead.
9
+
10
+ [lints.clippy]
11
+ # priority = -1 lets the individual "allow" overrides below win.
12
+ pedantic = { level = "warn", priority = -1 }
13
+ cargo = { level = "warn", priority = -1 }
14
+
15
+ # Pedantic lints that are too noisy in idiomatic Rust — allowed back.
16
+ module_name_repetitions = "allow" # fires on config::Config, error::Error, ...
17
+ must_use_candidate = "allow" # demands #[must_use] almost everywhere
18
+ missing_errors_doc = "allow" # requires an # Errors doc section
19
+ missing_panics_doc = "allow" # requires a # Panics doc section
20
+ default_trait_access = "allow" # Default::default() vs T::default() — style
21
+ map_unwrap_or = "allow" # map_or style — team preference
@@ -0,0 +1,23 @@
1
+ # Generated by gimme-the-lint — Clippy threshold tuning (recommended tier)
2
+ #
3
+ # clippy.toml only tunes lint PARAMETERS. It cannot enable lint groups —
4
+ # that is done via the [lints.clippy] table in Cargo.toml (see the
5
+ # clippy-cargo-lints snippet gimme-the-lint also provides).
6
+
7
+ # Rust style guide suggests 6; Clippy's default is 7.
8
+ too-many-arguments-threshold = 6
9
+
10
+ # Default is 100; 80 is a sensible opinionated ceiling.
11
+ too-many-lines-threshold = 80
12
+
13
+ # Default is 25; 15 is a solid complexity gate.
14
+ cognitive-complexity-threshold = 15
15
+
16
+ # Allow unwrap/expect/indexing in tests without per-file attributes.
17
+ allow-unwrap-in-tests = true
18
+ allow-expect-in-tests = true
19
+ allow-indexing-slicing-in-tests = true
20
+
21
+ # Set to your project's minimum supported Rust version so lint
22
+ # suggestions stay compatible.
23
+ msrv = "1.74"
@@ -1,5 +1,10 @@
1
1
  // ESLint v9 Flat Config - Generated by gimme-the-lint
2
- // Customize this file for your project
2
+ // Customize this file for your project.
3
+ //
4
+ // Ships security linting (eslint-plugin-security + eslint-plugin-no-secrets)
5
+ // and is Prettier-compatible (eslint-config-prettier disables conflicting
6
+ // stylistic rules). Dev deps beyond the React/TS set: eslint-plugin-security,
7
+ // eslint-plugin-no-secrets, eslint-config-prettier, prettier.
3
8
 
4
9
  import js from '@eslint/js'
5
10
  import globals from 'globals'
@@ -9,6 +14,9 @@ import reactRefresh from 'eslint-plugin-react-refresh'
9
14
  import importPlugin from 'eslint-plugin-import'
10
15
  import tseslint from '@typescript-eslint/eslint-plugin'
11
16
  import tsparser from '@typescript-eslint/parser'
17
+ import security from 'eslint-plugin-security'
18
+ import noSecrets from 'eslint-plugin-no-secrets'
19
+ import prettier from 'eslint-config-prettier'
12
20
 
13
21
  export default [
14
22
  { ignores: ['dist', 'build', 'node_modules', 'vite.config.ts'] },
@@ -44,6 +52,8 @@ export default [
44
52
  'react-hooks': reactHooks,
45
53
  'react-refresh': reactRefresh,
46
54
  'import': importPlugin,
55
+ security,
56
+ 'no-secrets': noSecrets,
47
57
  },
48
58
  rules: {
49
59
  ...js.configs.recommended.rules,
@@ -67,6 +77,9 @@ export default [
67
77
  'import/no-cycle': 'error',
68
78
  'import/no-self-import': 'error',
69
79
  'no-unused-vars': ['error', { argsIgnorePattern: '^_', varsIgnorePattern: '^_' }],
80
+ // Security rules — unsafe APIs + hardcoded-secret detection
81
+ ...security.configs.recommended.rules,
82
+ 'no-secrets/no-secrets': ['warn', { tolerance: 4.2 }],
70
83
  'react/no-unescaped-entities': 'off',
71
84
  'react/prop-types': 'off',
72
85
  },
@@ -93,6 +106,8 @@ export default [
93
106
  'react-refresh': reactRefresh,
94
107
  'import': importPlugin,
95
108
  '@typescript-eslint': tseslint,
109
+ security,
110
+ 'no-secrets': noSecrets,
96
111
  },
97
112
  rules: {
98
113
  ...js.configs.recommended.rules,
@@ -116,9 +131,16 @@ export default [
116
131
  '@typescript-eslint/no-unused-vars': ['warn', { argsIgnorePattern: '^_', varsIgnorePattern: '^_' }],
117
132
  '@typescript-eslint/explicit-module-boundary-types': 'off',
118
133
  '@typescript-eslint/no-non-null-assertion': 'warn',
134
+ // Security rules — unsafe APIs + hardcoded-secret detection
135
+ ...security.configs.recommended.rules,
136
+ 'no-secrets/no-secrets': ['warn', { tolerance: 4.2 }],
119
137
  'react/no-unescaped-entities': 'off',
120
138
  'no-unused-vars': 'off',
121
139
  'react/prop-types': 'off',
122
140
  },
123
141
  },
142
+
143
+ // eslint-config-prettier — disables stylistic rules that conflict with
144
+ // Prettier. Keep this LAST so it overrides earlier formatting rules.
145
+ prettier,
124
146
  ];
@@ -18,6 +18,10 @@ select = [
18
18
  "I", # isort
19
19
  "B", # flake8-bugbear
20
20
  "UP", # pyupgrade
21
+ "S", # flake8-bandit — security (hardcoded passwords, SQL injection, SSL misuse)
22
+ "C4", # flake8-comprehensions
23
+ "SIM", # flake8-simplify
24
+ "RUF", # Ruff-specific rules
21
25
  ]
22
26
  ignore = [
23
27
  "E501", # line too long (handled by formatter)
@@ -26,6 +30,12 @@ ignore = [
26
30
  [tool.ruff.lint.isort]
27
31
  known-first-party = ["app"]
28
32
 
33
+ [tool.ruff.lint.per-file-ignores]
34
+ # Tests legitimately use `assert` and may hold dummy credentials/fixtures.
35
+ "tests/**" = ["S101", "S105", "S106"]
36
+ "**/test_*.py" = ["S101", "S105", "S106"]
37
+ "**/*_test.py" = ["S101", "S105", "S106"]
38
+
29
39
  [tool.ruff.format]
30
40
  quote-style = "double"
31
41
  indent-style = "space"