-
Notifications
You must be signed in to change notification settings - Fork 17.9k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
proposal: cmd/go: add module repository health check tool #28590
Comments
Have you thought about integrating some or all of these into The upside is that we wouldn't need a separate command or service for this, and we'd have a single command to ensure that all modules conform to a certain standard. The downside is that users need to trust that authors are using the command when doing each release. Perhaps we could let users run the checks themselves too, e.g. |
Yes that did indeed cross my mind (but I failed to reference #26420). Rightly or wrongly I thought I'd start discussion about the "health check" separately. But we can/should fold this issue into #26420 in case that's more appropriate. |
I agree discussion should start separately to begin with. There's some overlap with that issue, but they're certainly not duplicates. |
Haven't thought about the features, but |
Assuming the |
Much like we have
These tests would surely be very fuzzy... but might be good enough. Definitely a separate tool. Just noting the idea here for now. |
@myitcv has mentioned multiple times that a tool such as he describes above could be built outside of the core FYI, this weekend, I put together a very rough cut of something in this ballpark: https://github.com/thepudds/gomodvet It is very much WIP / prototype level, but wanted to at least mention it. In particular, this first cut was helpful this past weekend to concretely illustrate to some people that some sanity checking is possible to at least increase the odds of catching someone accidentally stepping on some potential modules-related landmines.
Most of those are not strictly speaking "problems" in all cases, but most of those are at least notable situations. (E.g., a module with multiple major versions in a build might be a conscious choice, or might be because someone is doing You can control what you do / don't want to be told about via a command line flag for each rule. The current The intent of edit: the public |
This would be really useful, there are module maintainers out there who publish unusable, or difficult to use modules at the moment. Currently, they sometimes refuse to fix the problems even when pointed out, because they are not affecting that team's ability to write code, just other teams' ability to consume it. If there were an official go tool that could call out this kind of problem, then it could provide a concrete bug to report to maintainers which might help the ecosystem become more usable. Even better if it detected breaking API changes and suggested using the |
What version of Go are you using (
go version
)?Does this issue reproduce with the latest release?
n/a
What operating system and processor architecture are you using (
go env
)?go env
OutputDetails
A number of issues and Slack and go-nuts questions boil down to a VCS repository being in some way "invalid" as far as modules are concerned. An incomplete list includes:
go.mod
for av >= 2
module not having a/v2
suffixgo.mod
incomplete (i.e. the result ofgo mod tidy
not committed)go.mod
is not completeI think it might be useful to develop a tool that can be run against an arbitrary (remote) VCS repository that catches these sorts of problems, but also provides a summary of what is valid. A health check if you will.
This would be a tool for authors as well as consumers, because indicating (perhaps via one of those GitHub README badges) that your repository is module-safe is a good state and signal. Indeed in time this might be something that would sit well on godoc.org/similar, but in the short term a command line tool would have significant value.
These checks could of course be heavily cached (somewhere central).
This is a very rough idea, so just posting for thoughts/feedback:
cc @rsc @bcmills @thepudds @rogpeppe @mvdan
The text was updated successfully, but these errors were encountered: