-
Notifications
You must be signed in to change notification settings - Fork 374
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Consider add Go Vet tool in the CI #639
Comments
I believe go vet is already run as part of that. Do you see any output from go vet? |
As far as i know, go vet is not part of golangci. But it covers some of cases. I just opened a PR about this, btw. 🙃 |
It seems like it is part of golangci-lint https://golangci-lint.run/usage/linters/, but I think would have to be added to this list https://github.com/kubernetes-sigs/krew/blob/master/.golangci.yml#L40 |
Issues go stale after 90d of inactivity. If this issue is safe to close now please do so with Send feedback to sig-testing, kubernetes/test-infra and/or fejta. |
Since we already use golangci-lint static analysis in the run-lint.sh file, adding the yet another static analysis tool (a.k.a go vet) would still makes sense. In order to detect suspicious constructs (too see registered analyzers:
go tool vet help
), we should use that official tool. (We are still covering some cases, by using .golangci.yaml config file.)The text was updated successfully, but these errors were encountered: