goodcheck
goodcheck documentation
- Version in MegaLinter: 3.1.0
- Visit Official Web Site
- See How to configure goodcheck rules
- If custom
goodcheck.ymlconfig file is not found, goodcheck.yml will be used
- If custom
- See Index of problems detected by goodcheck
Configuration in MegaLinter
- Enable goodcheck by adding
REPOSITORY_GOODCHECKin ENABLE_LINTERS variable - Disable goodcheck by adding
REPOSITORY_GOODCHECKin DISABLE_LINTERS variable
| Variable | Description | Default value |
|---|---|---|
| REPOSITORY_GOODCHECK_ARGUMENTS | User custom arguments to add in linter CLI call Ex: -s --foo "bar" |
|
| REPOSITORY_GOODCHECK_PRE_COMMANDS | List of bash commands to run before the linter | None |
| REPOSITORY_GOODCHECK_POST_COMMANDS | List of bash commands to run after the linter | None |
| REPOSITORY_GOODCHECK_CONFIG_FILE | goodcheck configuration file nameUse LINTER_DEFAULT to let the linter find it |
goodcheck.yml |
| REPOSITORY_GOODCHECK_RULES_PATH | Path where to find linter configuration file | Workspace folder, then MegaLinter default rules |
| REPOSITORY_GOODCHECK_DISABLE_ERRORS | Run linter but consider errors as warnings | false |
| REPOSITORY_GOODCHECK_DISABLE_ERRORS_IF_LESS_THAN | Maximum number of errors allowed | 0 |
MegaLinter Flavours
This linter is available in the following flavours
| Flavor | Description | Embedded linters | Info | |
|---|---|---|---|---|
![]() |
all | Default MegaLinter Flavor | 114 | |
| ci_light | Optimized for CI items (Dockerfile, Jenkinsfile, JSON/YAML schemas,XML | 20 | ||
| cupcake | MegaLinter for the most commonly used languages | 82 | ||
| documentation | MegaLinter for documentation projects | 48 | ||
| dotnet | Optimized for C, C++, C# or VB based projects | 60 | ||
| go | Optimized for GO based projects | 50 | ||
| java | Optimized for JAVA based projects | 51 | ||
| javascript | Optimized for JAVASCRIPT or TYPESCRIPT based projects | 57 | ||
| php | Optimized for PHP based projects | 51 | ||
| python | Optimized for PYTHON based projects | 59 | ||
| ruby | Optimized for RUBY based projects | 48 | ||
| rust | Optimized for RUST based projects | 48 | ||
| salesforce | Optimized for Salesforce based projects | 51 | ||
| swift | Optimized for SWIFT based projects | 48 | ||
| terraform | Optimized for TERRAFORM based projects | 53 |
Behind the scenes
How are identified applicable files
- Activated only if one of these files is found:
goodcheck.yml - If this linter is active, all files will always be linted
How the linting is performed
goodcheck is called once on the whole project directory (project CLI lint mode)
- filtering can not be done using MegaLinter configuration variables,it must be done using goodcheck configuration or ignore file (if existing)
VALIDATE_ALL_CODEBASE: falsedoes not make goodcheck analyze only updated files
Example calls
goodcheck check
goodcheck check -c goodcheck.yml
Help content
Usage: goodcheck <command> [options] [args...]
Commands:
goodcheck init Generate a sample configuration file
goodcheck check Run check with a configuration
goodcheck test Test your configuration
goodcheck pattern Print regexp for rules
goodcheck version Print version
goodcheck help Show help and quit
Installation on mega-linter Docker image
- GEM packages (Ruby) :
