-
Notifications
You must be signed in to change notification settings - Fork 50
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Configure automatic code linter #243
Comments
I propose trying GitHub's LGTM static analysis tool: https://lgtm.com/projects/g/theupdateframework/tuf/?mode=list |
python-tuf uses black, isort and pylint these days and I'm very happy with the setup because it has eliminated code style discussions (see invocation and config). Let's do the same thing at least for any newly added modules in securesystemslib. |
💯 |
this is irrelevant to the discussion but: the errors on the linked page are incorrect as all classes are "new-style" in Python now, explicitly deriving from object is not required (the distinction was a python 2 workaround). |
Do we want to mention |
Description of issue or feature request:
See in-toto/in-toto#289, in-toto/in-toto#296, in-toto/in-toto#279 for an exemplary setup, also see how commits are aggregated by error/warning type, to mitigate the flag day.
Current behavior:
No automatic code linting and unlinted code
Expected behavior:
Automatic code linting and linted code
The text was updated successfully, but these errors were encountered: