go-critic
Highly extensible Go source code linter providing checks currently missing from other linters.
There is never too much static code analysis. Try it out.
Features
- Almost 100 diagnostics that check for bugs, performance and style issues
- Extensible without re-compilation with dynamic rules
- Includes
#opinionated
checks with very strict and specific requirements - Self-documented:
gocritic doc <checkname>
gives a checker description
Documentation
The latest documentation is available at go-critic.com.
Installation
For most users, using go-critic
under golangci-lint is enough.
Precompiled go-critic
binaries can be found at releases page.
It can be installed in the usual Go way by running:
go install -v github.com/go-critic/go-critic/cmd/gocritic@latest
To build go-critic
from sources, clone this repository and run make gocritic
.
On macOS, you can also install go-critic
using MacPorts: sudo port install go-critic
Usage
Be sure gocritic
executable is under your $PATH
.
Usage of gocritic: gocritic [sub-command] [sub-command args...]
Run gocritic
without arguments to get help output.
Supported sub-commands:
check - run linter over specified targets
$ gocritic check -help
$ gocritic check -v -enable='paramTypeCombine,unslice' strings bytes
$ gocritic check -v -enable='#diagnostic' -disable='#experimental,#opinionated' ./...
version - print linter version
$ gocritic version
doc - get installed checkers documentation
$ gocritic doc -help
$ gocritic doc
$ gocritic doc checkerName
check
sub-command examples:
gocritic check fmt
gocritic check pkg1 pkg2
gocritic check -@rangeExprCopy.sizeThreshold 128 fmt
gocritic check -enable elseif,paramName fmt
gocritic check ./...
gocritic check -disable=appendAssign ./...
gocritic check foo.go
gocritic check -enable='#diagnostic' -disable='#experimental' strings
gocritic check -enableAll -disable='#experimental,#opinionated' ./src/...
To get a list of available checker parameters, run gocritic doc <checkerName>
.
In place of a single name, tag can be used. Tag is a named checkers group.
Tags:
#diagnostic
- kind of checks that detect various errors in code#style
- kind of checks that find style issues in code#performance
- kind of checks that detect potential performance issues in code#experimental
- check is under testing and development. Disabled by default#opinionated
- check can be unwanted for some people. Disabled by default#security
- kind of checks that find security issues in code. Disabled by default and empty, so will fail if enabled.
Contributing
This project aims to be contribution-friendly.
Our chats: English or
Russian
(Telegram website)
We're using an optimistic merging strategy most of the time.
In short, this means that if your contribution has some flaws, we can still merge it and then
fix them by ourselves. Experimental and work-in-progress checkers are isolated, so nothing bad will happen.
Code style is the same as in Go project, see CodeReviewComments.
See CONTRIBUTING.md for more details.
It also describes how to develop a new checker for the linter.