We use linters to check our code for common errors or bad patterns. The Oppia linter runs our linters, flags any problems the linters find, and reports those problems on the terminal.
-
To lint only files that have been changed but not committed:
python -m scripts.linters.run_lint_checks
-
To lint the file or files at a path:
python -m scripts.linters.run_lint_checks --path {{path}}
If you specify the path to a file, only that file will be linted, but if you provide a directory, all the files under that directory will be linted.
-
To lint a specific list of files:
python -m scripts.linters.run_lint_checks --files {{file paths}}
Separate file paths with spaces. For example, to lint
scripts/start.py
andservers.py
, you could run this:python -m scripts.linters.run_lint_checks --files scripts/start.py servers.py
-
To lint files in verbose mode, add the
--verbose
flag like this:python -m scripts.linters.run_lint_checks --verbose
This also enables logging, so it is very useful for debugging!
-
To lint a specific list of file extensions (separated by spaces):
python -m scripts.linters.run_lint_checks --only-check-file-extensions {{extensions}}
For example, to lint Python and JavaScript files, you could run this:
python -m scripts.linters.run_lint_checks --only-check-file-extensions py js
If you see a bad pattern cropping up a lot in the code base, you might want to add a lint check to help you find and fix them all. Then, the lint check will ensure no one ever uses that bad pattern again. When adding a new lint check, you should follow the following approach:
-
Identify what types of files your lint check needs to evaluate. This is important because we use different linters for different file types.
-
Check which of our linters apply to your file types, and decide which linters you want to use. Add your lint check following the linter-specific instructions below.
-
Run your lint check locally to find all existing violations in the code base. Fix these until the linter passes.
-
Open a PR that both fixes all existing violations and adds the lint check. Once your PR merges, your lint check will prevent any future PRs from introducing new violations.
We make use of several third-party linters, some of which also accept custom rules.
We use ESLint to lint our JavaScript and TypeScript code. It has lots of built-in rules, and if one of them does what you want, you can enable it in .eslintrc
. If no existing rule does what you need, you can write a [[custom rule|Custom-ESLint-checks]].
The ESLint checks are run by scripts.linters.js_ts_linter.JsTsLintChecksManager
.
We use Pylint to lint our Python code. It provides many rules and configuration options that you may find useful. They are configured in .pylintrc
. If they aren't enough though, you can also write a [[custom rule|Custom-Pylint-checks]].
The Pylint checks are run by scripts.linters.python_linter.ThirdPartyPythonLintChecksManager
.
We use isort to make sure our Python imports are properly sorted. It is configured by .isort.cfg
, but it does not support custom rules.
The isort checks are run by scripts.linters.python_linter.ThirdPartyPythonLintChecksManager
.
We lint our HTML code with htmllint, which is configured in .htmllintrc
. See the htmllint documentation for a list of the available configuration options.
Unfortunately, htmllint doesn't support custom rules.
The htmllint checks are run by scripts.linters.html_linter.ThirdPartyHTMLLintChecksManager
.
We lint CSS and HTML files with stylelint. The linter is configured by .stylelintrc
for HTML files and by core/templates/css/.stylelintrc
for CSS files. Check out its documentation for a list of the available rules and configuration options.
Since stylelint does not support custom rules, you'll need to use other linters if the built-in rules don't suit your needs.
Even with custom rules, the third-party linters above are sometimes insufficient. That's why we also wrote some linters ourselves.
Our custom JavaScript and TypeScript lint checks are defined in the JsTsLintChecksManager
class of scripts/linters/js_ts_linter.py
. The individual lint checks are defined as private helper methods in that class, and those methods are called from the JsTsLintChecksManager.perform_all_lint_checks()
method when the linter runs.
We do not allow adding new checks to this linter. Instead, you should use ESLint.
Since we cannot add custom rules to htmllint, we have written our own HTML linter in the HTMLLintChecksManager
class in scripts/linters/html_linter.py
. If you need to add custom HTML lint checks, you can do so here.
The general-purpose linter relies on regular expressions to identify bad patterns in the code, but it is less efficient since it has to run over every file. We do not allow adding Python, JavaScript, or TypeScript checks here. Instead, you should use Pylint or ESLint.
Even though we do not allow new checks to this linter, we explain below how the checks are defined to help you understand the existing checks.
We define regular expression checks like this:
{
'regexp': re.compile(r'TODO[^\(]*[^\)][^:]*[^A-Z]+[^\w]*$'),
'message': 'Please assign TODO comments to a user '
'in the format TODO(username): XXX. ',
'excluded_files': (),
'excluded_dirs': ()
}
We have 4 keys in this dictionary:
regexp
: The regular expression here that the check matches. Depending on the situation, this could be either a forbidden or a required pattern.message
The error message that will be shown to the user if the lint check fails.excluded_files
: A tuple of excluded files, if really necessary (not recommended).excluded_dirs
: A tuple of excluded directories if really necessary (not recommended).
These regular expression checks can be added to any of the following constants in general_purpose_linter.py
:
BAD_PATTERNS_REGEXP
: The regular expressions here are forbidden in any file.MANDATORY_PATTERNS_REGEXP
: The regular expressions here must be present in every file. Theincluded_types
key may be specified to limit what files this applies to.MANDATORY_PATTERNS_JS_REGEXP
: The regular expressions here must be present in all JavaScript and TypeScript files. Theincluded_types
key should specify JavaScript files, TypeScript files, or both.BAD_LINE_PATTERNS_HTML_REGEXP
: The regular expressions here are forbidden in HTML files.BAD_PATTERNS_PYTHON_REGEXP
: The regular expressions here are forbidden in Python files.
There are also two additional constants you can add values to:
BAD_PATTERNS
: This dictionary stores mappings from forbidden substrings to dictionaries like those defining regular expression checks, but without theregexp
key.BAD_STRINGS_CONSTANTS
: This dictionary stores mappings from forbidden substrings to dictionaries like those defining regular expression checks, but without theregexp
key. These substrings are only checked inconstants.ts
.
For more complicated rules, you can also add a method to the GeneralPurposeLinter
class.
In scripts/linters/codeowner_linter.py
, we have a custom linter that helps us maintain the codeowners file. You probably won't ever have to change this linter, but if you ever get a warning that says {{some file}} is not listed in the .github/CODEOWNERS file
, that's the codeowner linter reminding you to add a new file to the codeowners file.
Finally, we have some miscellaneous lint checks defined in the CustomLintChecksManager
class in scripts/linters/other_files_linter.py
.
Sample PRs where checks were added:
-
Custom ESLint check: oppia/oppia#10494
-
Custom Pylint check: oppia/oppia#10107
Please reach out to Sajal Asati (@sajalasati, [email protected]) or Sandeep Dubey (@DubeySandeep, [email protected]) with any questions.