-
Notifications
You must be signed in to change notification settings - Fork 85
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
gometalinter vet vs govet #12
Comments
Issues go stale after 90d of inactivity. Prevent issues from auto-closing with an If this issue is safe to close now please do so with Send feedback to sig-testing, kubernetes/test-infra and/or |
/remove-lifecycle stale |
Issues go stale after 90d of inactivity. If this issue is safe to close now please do so with Send feedback to sig-testing, kubernetes/test-infra and/or fejta. |
Stale issues rot after 30d of inactivity. If this issue is safe to close now please do so with Send feedback to sig-testing, kubernetes/test-infra and/or fejta. |
Rotten issues close after 30d of inactivity. Send feedback to sig-testing, kubernetes/test-infra and/or fejta. |
I was reviewing the choices made on go verification options.
Is there a reason for running with gometalinter's vet and govet?
I see the need for boilerplate checking but not sure if we should be running that on every file. For example, do we need to add a copyright on gofmt.sh was that really developed for kubernetes or is it a copy?
On the gometalinter options there are many choices here and other projects have made different choices. Would it be ok to introduce some way to override choices? Or was there a reason these were chosen over other options some design choice made? For example, this repo disables all verifications even new ones that may come along.. and picks only the ones that are desired for all who use this repo. Maybe some projects would want to enable more? Maybe some projects would want to exclude more warnings/errors?
The text was updated successfully, but these errors were encountered: