diff --git a/tools/fetchml-vet/analyzers/hipaacomplete.go b/tools/fetchml-vet/analyzers/hipaacomplete.go index f5d6815..ad1df6d 100644 --- a/tools/fetchml-vet/analyzers/hipaacomplete.go +++ b/tools/fetchml-vet/analyzers/hipaacomplete.go @@ -27,7 +27,7 @@ var hipaaRequiredFields = []string{ "ComplianceMode", } -func runHIPAACompleteness(pass *analysis.Pass) (interface{}, error) { +func runHIPAACompleteness(pass *analysis.Pass) (any, error) { for _, file := range pass.Files { ast.Inspect(file, func(n ast.Node) bool { // Look for if statements diff --git a/tools/fetchml-vet/analyzers/manifestenv.go b/tools/fetchml-vet/analyzers/manifestenv.go index fd1d968..5362da9 100644 --- a/tools/fetchml-vet/analyzers/manifestenv.go +++ b/tools/fetchml-vet/analyzers/manifestenv.go @@ -16,7 +16,7 @@ var ManifestEnvironmentAnalyzer = &analysis.Analyzer{ Run: runManifestEnvironment, } -func runManifestEnvironment(pass *analysis.Pass) (interface{}, error) { +func runManifestEnvironment(pass *analysis.Pass) (any, error) { for _, file := range pass.Files { ast.Inspect(file, func(n ast.Node) bool { // Look for return statements diff --git a/tools/fetchml-vet/analyzers/nobaredetector.go b/tools/fetchml-vet/analyzers/nobaredetector.go index cef7a49..53b4384 100644 --- a/tools/fetchml-vet/analyzers/nobaredetector.go +++ b/tools/fetchml-vet/analyzers/nobaredetector.go @@ -16,7 +16,7 @@ var NoBareDetectorAnalyzer = &analysis.Analyzer{ Run: runNoBareDetector, } -func runNoBareDetector(pass *analysis.Pass) (interface{}, error) { +func runNoBareDetector(pass *analysis.Pass) (any, error) { for _, file := range pass.Files { ast.Inspect(file, func(n ast.Node) bool { // Look for call expressions diff --git a/tools/fetchml-vet/analyzers/noinlinecredentials.go b/tools/fetchml-vet/analyzers/noinlinecredentials.go index 2c52297..73e871c 100644 --- a/tools/fetchml-vet/analyzers/noinlinecredentials.go +++ b/tools/fetchml-vet/analyzers/noinlinecredentials.go @@ -29,7 +29,7 @@ var sensitiveCredentialFields = []string{ "PrivateKey", } -func runNoInlineCredentials(pass *analysis.Pass) (interface{}, error) { +func runNoInlineCredentials(pass *analysis.Pass) (any, error) { for _, file := range pass.Files { ast.Inspect(file, func(n ast.Node) bool { // Look for composite literals (struct initialization)