-
Notifications
You must be signed in to change notification settings - Fork 17.9k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
x/tools/gopls: provide a way to suppress analysis diagnostics for certain files #50764
Comments
No, there isn't a way to do this, currently. Based on the issue subject, are you asking for something akin to the golangci-lint |
@findleyr correct, i'd even be happy if it worked for a single line instead of a while function, the spam is real and I'd rather not turn off the specific linter for the whole project. |
@OneOfOne would you want this just for lint/analysis errors, or would you want it for all diagnostics (including "compiler" errors). I am sympathetic to wanting to suppress lint errors, but I don't think we should ever suppress errors from the compiler (the parser/type checker). If there is a compiler error many other gopls features (autocompletion, jump to definition, etc.) may not function correctly, and it would be confusing if this happens silently. |
Only lint/analysis of course, compiler errors are important. |
My two cents: Compiler errors are important, but linter errors are not. Do not decorate your code with annotations to silence a defective tool. Instead, use better tools and depend on ones that are reliable. It is just bad practice to require your build to pass through a capricious tool like a linter. If you insist on using a linter, find a way for your local build process to disable it when required. Don't require externally-supported tools to honor your process, and don't require source code add marks to disable one too. That slippery slope leads to a valley of toxic muck. |
Can you describe what the problem is in more detail? What I have managed to grasp so far is that gopls is reporting accurately on intentionally buggy code. This does not sound like a problem yet so I think I am missing something. Maybe a brief description of how the workspace is setup? Also what is the test? |
@timothy-king @robpike this is about gopls' linter/analysis not the compiler, to be more specific, we have some tests that that trigger |
I understand the problem you've set yourself, I'm just asking that we don't end up with annotated source code as a solution. Instead, for your particular situation, construct a way to avoid failing on the linter error for that broken code. In other words, it's your problem to solve, not the Go team's, in my obviously biased opinion. Gopls should not make bad code easier to work on. That just contradicts its purpose. |
I'd argue that you can already do that by turning off the guilty linter
rule with gopls options, but instead of turning it off for a specific
function or line like I requested, it'd apply to the whole codebase which
can lead to actual problems.
…On Mon, Jan 24, 2022, 2:49 AM Rob Pike ***@***.***> wrote:
I understand the problem you've set yourself, I'm just asking that we
don't end up with annotated source code as a solution. Instead, for your
particular situation, construct a way to avoid failing on the linter error
for that broken code. In other words, it's your problem to solve, not the
Go team's, in my obviously biased opinion. Gopls should not make bad code
easier to work on. That just contradicts its purpose.
—
Reply to this email directly, view it on GitHub
<#50764 (comment)>, or
unsubscribe
<https://github.com/notifications/unsubscribe-auth/AAIHY6Z6LOMJGPAI6JMDYKTUXUHATANCNFSM5MSZTM2A>
.
Triage notifications on the go with GitHub Mobile for iOS
<https://apps.apple.com/app/apple-store/id1477376905?ct=notification-email&mt=8&pt=524675>
or Android
<https://play.google.com/store/apps/details?id=com.github.android&referrer=utm_campaign%3Dnotification-email%26utm_medium%3Demail%26utm_source%3Dgithub>.
You are receiving this because you were mentioned.Message ID:
***@***.***>
|
@robpike I fully agree about avoiding annotated source code, and independent of the solution I don't think we should couple ourselves to golangci-lint -- that is bound to be problematic. However, I do think at a high level it is reasonable to request that gopls provide a mechanism to disable analyses for certain files or directories. Per your point:
Many users primarily consume static analysis through their editor, where the analog of this advice is to find a way to disable the linter where required in the development process. Right now gopls only provides an on/off switch, and I can understand how in certain codebases, perhaps in the process of incremental cleanup, it could be desirable to disable/enable linters for portions of the codebase. With all that said, gopls has long avoided any sort of per-directory configuration, and I'd like to keep avoiding it as long as possible, until the benefit is unambiguous. With respect to this request, it seems possible that no additional gopls configuration is required. The default set of linters gopls uses are the Staticcheck has its own mechanism for per-directory configuration, which we have a long-standing request to support (#36373). I'd rather we do that than build an analogous mechanism for gopls. |
@OneOfOne I empathize with your situation. I still want to understand whether existing exception rules The go command has established its own exception patterns - directory and file names that begin with "." or "_" are ignored, and files in |
@hyangah I guess it's possible to load the tests cases from a json file or something, however I stand by my original request since gopls took over the job of all the linters, and it's fairly standard in most linters to support a way to turn it off per file or function. |
2cents: For testing with string constants that violate ST1018, I recommend putting this data into a file in |
Change https://go.dev/cl/489835 mentions this issue: |
I think it is possible to distinguish two different approaches to annotations. In the first approach, an annotation declares "suppress diagnostics of class X in this function/file". Such annotations are used to work around linters that inherently produce spurious findings, and I agree that they seem likely to encourage littering (@robpike's slippery slope to the Valley of the Drums). In the second approach, annotations provide specific additional information to the linter that improve its precision, so that it can emit more true positives and fewer false negatives. For example, the
has no single body from which the analysis can make this deduction. An annotation--such as the completely hypothetical comment notation above--could assert "these abstract functions behave like printf". This records helpful design intent for the reader, and a small number of annotations enables the tool to check essentially 100% of printf-like calls accurately. This seems like progress. It might not always be clear whether an annotation is a "suppression" or a "lemma". Lemmas are intimately tied to particular analyses; they should record specific non-obvious design information that is helpful to the reader; and they should have high leverage (a few annotations go along way); but suppressions are just a generic way to hush the tool, like swatting flies as you see them instead of preventing them from breeding. |
A
|
How about adding a setting to the gopls configuration to have exclude rules? A bit like golangci-lint's For my case, I have that line from a 'deprecated' function which I really need and there is no replacement, and gopls has been complaining about it for years now, and I occasionally forget what the warning is and go check out that file every few weeks... A little single exclude rule for gopls would solve that time wasted every few weeks. |
Is there a way to suppress my custom linter on a line by line/function etc basis like other linters? Seems like a cirital gap - any update. I wan't //nolint:mylintername |
See my comment above for why I don't think we should take that approach. Exclude rules in a personal configuration file are more palatable, but it seems to me that the need to exclude this particular deprecation check is a sign that deprecations shouldn't be reported as diagnostics in the first place. |
Imho, inline comment are clearly superiour than config because config often is abused and set too broadly, for example regex Another benefit of inline comments is that linters can report on |
it's obvious we need a built-in inline suppression mech just like other tools in go and other languages ecosystems. not sure why here is any debate. currently my own rule has code for end of line comment suppressions but I haven't coded for comments on line above or on function or file level. |
I’ve noticed that the VSCode Problems pane lists lint diagnostics as Errors. Is there a reason why lint Warnings are showing up as Errors in VSCode? That seems like an unnecessary source of friction. I have my gopls configured with: "staticcheck": true Moreover, I’m using a According to the gopls analyzers documentation, we should consult staticcheck’s documentation for analyzer details. Which I did, and the annotation I used is valid for staticcheck, confirmed by running staticcheck on the command line. I’m using this annotation in just one specific corner case—I’m definitely not advocating for widespread use of such annotations. My concern is that gopls should respect staticcheck’s handling of these annotations to prevent confusion. If someone configures gopls to use staticcheck, they shouldn’t find their valid staticcheck annotations ignored. |
I am encountering the same problem and was surprised that gopls doesn't obey the annotations of staticcheck. I'm not sure how these two interplay, but it seems to be a little weird this is the case. |
@meling @podocarp it looks like staticcheck's suppression mechanism is implemented by its analysis driver, not individual analyzers. Since gopls has its own driver, these annotations are not honored. It's not related to stripping comments; staticcheck analyzers see everything. It would not be a good idea to reimplement this logic in gopls; perhaps staticcheck push this logic into the analyzer, or offer a library call to wrap an analyzer in one that honors staticcheck suppression comments. CC @dominikh for opinions. |
I'll look into it. I can't yet say which of the two suggested options I'd go for, but I'm leaning towards the wrapper. |
https://staticcheck.dev/docs/configuration/#maintenance-of-linter-directives For a seamless integration against both linters, i recommend supporting both formats:
|
@silverwind as discussed above, we're not planning to add general suppression for diagnostics from gopls. However, IMO honoring staticcheck directives is necessary for our staticcheck integration, and it is a bug that they are not respected. |
Still sounds like unfair favorititsm if you are supporting one linter, but not the other. |
@silverwind sorry I don't understand this comment. Gopls does not integrate golangci-lint. If you are seeing diagnostics from golangci-lint, they are coming from an external integration, and that integration should honor golangci-lint suppressions. |
Perhaps you are referring to the fact that gopls integrates with staticcheck, and not golangci-lint? In that case: we cannot link arbitrarily many linters into gopls. I think the path forward is to allow others to make gopls' linting extensible, so that it can run external (or perhaps even workspace-specific) linters. This is something we're considering (#59869). But that is not directly relevant to this issue. My perspective is that:
|
Maybe to explain my use case further. I'm running I'm aware that linters like staticcheck and golangci-lint probably have their own LSPs, independant of gopls. I don't know if/how gopls integrates against staticcheck. |
@silverwind which errors do you suppress? We have been more permissive with 'hint' level diagnostics, since most clients make them much less prominent. However, we probably neglected to filter them out of the command line. |
The script that does it is here. Currently I'm suppressing deprecation warnings. For various reasons, these deprecations can not be fixed without considerable effort, which were not feasible to do at the time I introduced the |
Change https://go.dev/cl/651616 mentions this issue: |
We could also discuss reducing the set of Staticcheck analyses that run in gopls (or in Staticcheck, for that matter). Staticcheck has rules very similar to vet/gopls for how many false positives are tolerated, which really is "none, unless your code is extremely special.". Its ignore directives really only exist to tolerate extraordinary code without having to twist the code to conform to the analyses' rules. I'm frankly shocked by how important this issue seems to be to people and makes me worry that the rate of false positives is too high. |
In golang/go#50764, users were reporting having to filter out noisy diagnostics from the output of `gopls check` in CI. This is because there was no differentiation between diagnostics that represent real bugs, and those that are suggestions. By contrast, hint level diagnostics are very unobtrusive in the editor. Add a new -severity flag to control the minimum severity output by gopls check, and set its default to "warning". For golang/go#50764 Change-Id: I48d8bb74371fa6035fef4d2608412b986f509f7b Reviewed-on: https://go-review.googlesource.com/c/tools/+/651616 LUCI-TryBot-Result: Go LUCI <[email protected]> Reviewed-by: Alan Donovan <[email protected]> Auto-Submit: Robert Findley <[email protected]>
Thanks @dominikh. I wonder if all of the problematic diagnostics are actually info or hint level severity. We have recently taken the stance that it is OK to produce hint level diagnostics, since they are almost invisible in many editors (in VS Code they do not appear in the problems tab, and the underline is very subtle). The "deprecated" diagnostics @silverwind was referring to were hints, and we weren't suppressing them in the Some concrete examples of staticcheck diagnostics requiring suppression would be helpful here. |
Generally I prefer to treat all warnings/hints as errors when running code checking tools, but I guess I do appreciate the change. I'd appreciate it even more if |
I added this. |
gopls version
Is there a way to stop the linter for just one function or file?
In some of our tests we're bad bad things intentionally and it just clutters the problems pane.
The text was updated successfully, but these errors were encountered: