2015-11-30 19:24:08 +00:00
|
|
|
GOTOOLS = github.com/mitchellh/gox golang.org/x/tools/cmd/stringer \
|
|
|
|
github.com/jteeuwen/go-bindata/... github.com/elazarl/go-bindata-assetfs/...
|
2014-05-06 05:34:24 +00:00
|
|
|
DEPS = $(shell go list -f '{{range .TestImports}}{{.}} {{end}}' ./...)
|
2014-05-06 05:38:21 +00:00
|
|
|
PACKAGES = $(shell go list ./...)
|
Makefile: add vet target
Add a vet target in order to catch suspicious constructs
reported by go vet.
Vet has successfully detected problems in the past,
for example, see
c9333b1b9b472feb5cad80e2c8276d41b64bde88
Some vet flags are noisy. In particular, the following flags
reports a large amount of generally unharmful constructs:
```
-assign: check for useless assignments
-composites: check that composite literals used field-keyed
elements
-shadow: check for shadowed variables
-shadowstrict: whether to be strict about shadowing
-unreachable: check for unreachable code
```
In order to skip running the flags mentioned above, vet is
invoked on a directory basis with `go tool vet .` since package-
level type-checking with `go vet` doesn't accept flags.
Hence, each file is vetted in isolation, which is weaker than
package-level type-checking. But nevertheless, it might catch
suspicious constructs that pose a real issue.
The vet target runs the following flags on the entire repo:
```
-asmdecl: check assembly against Go declarations
-atomic: check for common mistaken usages of the
sync/atomic package
-bool: check for mistakes involving boolean operators
-buildtags: check that +build tags are valid
-copylocks: check that locks are not passed by value
-methods: check that canonically named methods are canonically
defined
-nilfunc: check for comparisons between functions and nil
-printf: check printf-like invocations
-rangeloops: check that range loop variables are used correctly
-shift: check for useless shifts
-structtags: check that struct field tags have canonical format
and apply to exported fields as needed
-unsafeptr: check for misuse of unsafe.Pointer
```
Now and then, it might make sense to check the output of the
disabled flags manually.
For example, `VETARGS=-unreachable make vet` can detect several
lines of dead code that can be deleted, etc.
2015-01-17 06:44:10 +00:00
|
|
|
VETARGS?=-asmdecl -atomic -bool -buildtags -copylocks -methods \
|
|
|
|
-nilfunc -printf -rangeloops -shift -structtags -unsafeptr
|
2015-10-22 18:16:01 +00:00
|
|
|
VERSION?=$(shell awk -F\" '/^const Version/ { print $$2; exit }' version.go)
|
2013-12-06 23:43:07 +00:00
|
|
|
|
2014-05-06 05:45:54 +00:00
|
|
|
all: deps format
|
2013-12-06 23:43:07 +00:00
|
|
|
@mkdir -p bin/
|
|
|
|
@bash --norc -i ./scripts/build.sh
|
|
|
|
|
2015-10-22 18:16:01 +00:00
|
|
|
# bin generates the releasable binaries
|
|
|
|
bin: generate
|
|
|
|
@sh -c "'$(CURDIR)/scripts/build.sh'"
|
|
|
|
|
2015-10-22 19:00:35 +00:00
|
|
|
# dev creates binaries for testing locally - these are put into ./bin and $GOPATH
|
2015-10-22 18:16:01 +00:00
|
|
|
dev: generate
|
|
|
|
@CONSUL_DEV=1 sh -c "'$(CURDIR)/scripts/build.sh'"
|
|
|
|
|
|
|
|
# dist creates the binaries for distibution
|
|
|
|
dist: bin
|
|
|
|
@sh -c "'$(CURDIR)/scripts/dist.sh' $(VERSION)"
|
|
|
|
|
2013-12-06 23:43:07 +00:00
|
|
|
cov:
|
|
|
|
gocov test ./... | gocov-html > /tmp/coverage.html
|
|
|
|
open /tmp/coverage.html
|
|
|
|
|
|
|
|
deps:
|
2014-05-06 05:45:54 +00:00
|
|
|
@echo "--> Installing build dependencies"
|
2015-10-26 23:00:51 +00:00
|
|
|
@go get -v $(GOTOOLS)
|
2015-01-23 01:37:35 +00:00
|
|
|
@go get -d -v ./... $(DEPS)
|
2013-12-06 23:43:07 +00:00
|
|
|
|
2015-01-23 01:37:35 +00:00
|
|
|
updatedeps: deps
|
2015-10-26 23:00:51 +00:00
|
|
|
go get -u -v $(GOTOOLS)
|
2015-10-22 18:16:01 +00:00
|
|
|
go list ./... \
|
|
|
|
| xargs go list -f '{{join .Deps "\n"}}' \
|
|
|
|
| grep -v github.com/hashicorp/consul \
|
|
|
|
| grep -v '/internal/' \
|
|
|
|
| sort -u \
|
|
|
|
| xargs go get -f -u -v
|
2013-12-06 23:43:07 +00:00
|
|
|
|
2015-01-23 01:37:35 +00:00
|
|
|
test: deps
|
2015-10-29 22:48:02 +00:00
|
|
|
@$(MAKE) vet
|
2015-04-11 20:21:56 +00:00
|
|
|
@./scripts/verify_no_uuid.sh
|
|
|
|
@./scripts/test.sh
|
2015-01-20 23:31:57 +00:00
|
|
|
|
2014-12-06 02:47:23 +00:00
|
|
|
cover: deps
|
|
|
|
./scripts/verify_no_uuid.sh
|
|
|
|
go list ./... | xargs -n1 go test --cover
|
2013-12-06 23:43:07 +00:00
|
|
|
|
2014-06-03 12:54:04 +00:00
|
|
|
format: deps
|
2014-05-06 05:45:54 +00:00
|
|
|
@echo "--> Running go fmt"
|
|
|
|
@go fmt $(PACKAGES)
|
2014-05-06 05:38:21 +00:00
|
|
|
|
Makefile: add vet target
Add a vet target in order to catch suspicious constructs
reported by go vet.
Vet has successfully detected problems in the past,
for example, see
c9333b1b9b472feb5cad80e2c8276d41b64bde88
Some vet flags are noisy. In particular, the following flags
reports a large amount of generally unharmful constructs:
```
-assign: check for useless assignments
-composites: check that composite literals used field-keyed
elements
-shadow: check for shadowed variables
-shadowstrict: whether to be strict about shadowing
-unreachable: check for unreachable code
```
In order to skip running the flags mentioned above, vet is
invoked on a directory basis with `go tool vet .` since package-
level type-checking with `go vet` doesn't accept flags.
Hence, each file is vetted in isolation, which is weaker than
package-level type-checking. But nevertheless, it might catch
suspicious constructs that pose a real issue.
The vet target runs the following flags on the entire repo:
```
-asmdecl: check assembly against Go declarations
-atomic: check for common mistaken usages of the
sync/atomic package
-bool: check for mistakes involving boolean operators
-buildtags: check that +build tags are valid
-copylocks: check that locks are not passed by value
-methods: check that canonically named methods are canonically
defined
-nilfunc: check for comparisons between functions and nil
-printf: check printf-like invocations
-rangeloops: check that range loop variables are used correctly
-shift: check for useless shifts
-structtags: check that struct field tags have canonical format
and apply to exported fields as needed
-unsafeptr: check for misuse of unsafe.Pointer
```
Now and then, it might make sense to check the output of the
disabled flags manually.
For example, `VETARGS=-unreachable make vet` can detect several
lines of dead code that can be deleted, etc.
2015-01-17 06:44:10 +00:00
|
|
|
vet:
|
|
|
|
@go tool vet 2>/dev/null ; if [ $$? -eq 3 ]; then \
|
|
|
|
go get golang.org/x/tools/cmd/vet; \
|
|
|
|
fi
|
|
|
|
@echo "--> Running go tool vet $(VETARGS) ."
|
|
|
|
@go tool vet $(VETARGS) . ; if [ $$? -eq 1 ]; then \
|
|
|
|
echo ""; \
|
|
|
|
echo "Vet found suspicious constructs. Please check the reported constructs"; \
|
|
|
|
echo "and fix them if necessary before submitting the code for reviewal."; \
|
|
|
|
fi
|
|
|
|
|
2015-10-22 18:16:01 +00:00
|
|
|
# generate runs `go generate` to build the dynamically generated source files
|
|
|
|
generate: deps
|
|
|
|
find . -type f -name '.DS_Store' -delete
|
|
|
|
go generate ./...
|
|
|
|
|
2015-11-30 19:24:08 +00:00
|
|
|
# generates the static web ui
|
|
|
|
static-assets: deps
|
|
|
|
@echo "--> Generating static assets"
|
|
|
|
@go-bindata-assetfs -pkg agent -prefix ui ./ui/dist/...
|
|
|
|
@mv bindata_assetfs.go command/agent
|
|
|
|
$(MAKE) format
|
|
|
|
|
2013-12-06 23:43:07 +00:00
|
|
|
web:
|
|
|
|
./scripts/website_run.sh
|
|
|
|
|
|
|
|
web-push:
|
|
|
|
./scripts/website_push.sh
|
|
|
|
|
2015-11-30 19:24:08 +00:00
|
|
|
.PHONY: all bin dev dist cov deps test vet web web-push generate test-nodep static-assets
|