Vinego is a new set of linters built on the Go analysis.Analyzer framework. Many of the linters focus on increasing strictness around variable initialization and type safety. They fall somewhere in-between "drop these into your codebase with no changes" and "rewrite all your code to conform to weird new language-extra conventions" in terms of invasiveness.
The linters are built as a single .so with control over individual checks via a .vinego.yaml file. Methods for using this with golangci-lint are provided, but you can use them with other frameworks as well.
-
allfieldsConfirms that all required fields are explicitly initialized in struct literals.
Add a comment before a struct type like:
// check:allfields type MyStruct { X int Y string Z bool `optional:""` }Then, if you do (for instance):
m := MyStruct{X: 4}you'll get an error that
Yis missing. -
varinitEnabled with
enable_varinit: truein.vinego.yaml.Checks that all variables have been explicitly initialized (with a value) before usage.
For example:
var i int if something { i = 4 } else { doOtherThings() } myFunc(i)
would produce an error saying that
ihasn't been initialized in theelsebranch.Taking the address of a variable is considered initialization (ex: in doing
json.Unmarshal(bytes, &config)config would be marked as initialized). -
explicitcastEnabled with
enable_explicitcast: truein.vinego.yaml.Checks that primitive literals are never implicitly casted (during assignments, function calls, and returns).
For example:
var x time.Duration x = 24
would produce an error saying that
24is being implicitly cast totime.Duration. -
loopvariablerefEnabled with
enable_loopvariableref: truein.vinego.yaml.Checks that loop variables are not used outside of a single iteration, either via reference/pointer or function capture.
For example:
for _, x := range myList { go func() { print(x) } }
would produce an error saying that the capture of
xhere is risky.The simple work around is to explicitly declare a local variable like:
for _, x := range myList { x := x go func() { print(x) } }
to make sure the captured data is unique.
This will be obsolete after Go 1.22.
-
capturederrEnabled with
enable_capturederr: truein.vinego.yaml.The
staticchecklinterSA4006check which makes sure we properly consume error variables ignores anything that happens with captured variables. Therefore if you accidentally captureerrfrom an outer function, assign it a value, then never check it,SA4006won't help you. Go's behavior using variable reuse/reinitialization with=and:=makes it easy to transplant code and accidentally reuse an existing variable, which makes it easy to accidentally capture external variables in closures.capturederrorwill give you an error when an error variable is captured by a closure (specifically error variables). As with the other linters here, capturing an error variable isn't necessarily incorrect, but it's generally unintended and when done unintentionally can lead to hard to track incorrect failure behavior.Example usage:
err := something() if err != nil { return err } wrapper(func() error { err = otherthing() }) ...
would produce an error saying that we're assgning to the captured variable
err. (The workaround is to doerr := otherthing(), which would make this error disappear and theSA4006one appear in its place, as intended.)
-
We provide a pre-made Docker batteries-included image for CI and development environments:
ghcr.io/upsun/vinego:latestIt includes
- Go
- Vinego
golangci-lintgcigoimportsdlvstaticcheck
(Distributed this way because
golangci-lintneeds linters to be built with the same dependency versions and the easiest way to guarantee that is to build them together)You can build the Docker container yourself with
docker build --tag vinego srcat the root of this repo.Alternatively, you can build just the plugin
.so- see theDockerfilefor details (it's a straightforward Go.sobuild). -
Add custom linter plugin to your project's
.golangci.yamlfile:linters: enable: - vinego linters-settings: custom: vinego: path: "/custom_linters/vinego.so" description: "Vinego linters" -
For optional linters, enable them in a
.vinego.yamlin the same directory as.golangci.json. For details see the per-linter explanations above. -
Run the linters with
docker run --rm --volume $PWD:/mnt --workdir /mnt vinego /bin/golangci-lint run --verbose. You should seevinegolisted in the output.