@good-fences/api v0.20.0
good-fences-rs-core
A rust reimplementation of good-fences:
Good-fences is a tool that allows you to segment a TypeScript project into conceptual areas and manage dependencies between those areas. This is mostly a concern for large projects with many people working on them, where it is impossible for every developer to have a wholistic understanding of the entire codebase. JavaScript's module system is a specialized form of anarchy because any file can import any other file, possibly allowing access to code that was really meant to be an internal implementation detail of some larger system. Other languages have concepts like DLL boundaries and the internal keyword to mitigate this. Good-fences provides a way to enforce similar boundaries in the TypeScript world.
Motivation
The original good-fences implementation came with some limitations:
- Its native dependencies only supported Node.js < v15.
- It had performance issues in some of our biggest projects (scanning 40k+ files).
Rust's safe concurrency and memory safety allows us to re-write original project with additional performance benefits, leaning on swc for javascript/typescript parsing.
Getting Started
good-fences-rs includes a CLI and an API, under the name @good-fences/api.
Requirements
Compatible with x86 and x64 windows and linux platforms.
Linux:
GCLIB>= 2.27 (preinstalled with ubuntu 18)- Node.js > 14
npm
Installing CLI
Via npm.
npm install -g @good-fences/apiCloning the repo:
git clone https://github.com/Adjective-Object/good-fences-rs-core
cd good-fences-rs-core
yarn
yarn run buildInstalling as Node dependency
npm install @good-fences/apiUse it in your project:
import { goodFences } from '@good-fences/api';
goodFences({...});Using the CLI
To run the good-fences cli we need at least two things:
fence.jsonconfiguration files.- A
tsconfig.jsonfile. (see tsconfig reference)
Let's assume a project like this:
├── my-project
│ ├── src
│ │ ├── **/*.ts
| | ├── index.js
| │ ├── fence.json
| tsconfig.jsonFrom your terminal you can run this:
cd my-project
good-fences srcArguments
[paths]: the cli takes only thepathsargument, a list, separated with spaces, of all directories that are going to be scanned.
Options
--project or -p
If you have your tsconfig file splitt and want to use the one containing compilerOptions.paths instead of the default tsconfig.json
good-fences src --project tsconfig.with-paths.json--baseUrl
In cases like the one above, it could be that different tsconfig files have different compilerOptions.baseUrl configuration, you can override that valua from your specified --project file with --baseUrl flag.
good-fences src --project tsconfig.without-baseurl.json --baseUrl .--output or -o
The --output flag takes a path. At the end of checking, fence violation errors will be saved to the provided path as json.
good-fences src --output fenceViolations.json
cat fenceViolations.jsonFor some cases, scanning your cwd could be needed but most projects have node_modules that isn't necessary to perform evaluations, in those cases --ignoreExternalFences makes good-fences skip all directories and files from node_modules.
good-fences . --ignoreExternalFences--ignoredDirs
This takes a list of regular expressions as input values, separated with spaces. In case certain directories need to be ignored during the fence evaluation, this will perform regular expression matching on fence paths to ignore them (e.g. --ignoredDirs lib will not evaluate files under any lib directory).
good-fences src --ignoredDirs ignored1 ignored2 ...Development
Setting up the Development Environment
Install a container engine: The repo uses a devcontainer, which is like a lightweight virtual machine that contains a pre-configured development environment.
It is intended to support both Docker and podman, which are two different container engines. This is kind of arbitrary, and I might choose to revert it in the future if it presents issues.
On windows, install Docker-Desktop On linux, you can install either
dockeror podman (viapodman-docker)Set up your local config The devcontainer mounts some local directories from your machine into the container. If you do not have these already, you will have to create them, or comment out the bind mounts in the devcontainer.
$HOME/.ssh-- This is mounted so the container can access your SSH keys to push/pull from the git remote.
This should already exist if you have ever configured an SSH key viassh-keygen, which is the normal way to clone a git repo.
Note that if you are developing in WSL, you should create these files in wsl, not within your windows filesystem.
Configure your local user identity From within the repo, configure your local git identity:
❯ git config --local user.name "Your Name Here" ❯ git config --local user.email "your@e.mail"Note that you have to do this from within the repo's folder so it will be persisted into the devcontainer when the repo's folder is mounted as a volume. If you are in WSL, you need to do this within the repo's out folder in WSL
Install recommended extensions Install the recommended extensions from this repo.
Ctrl+Shift+P > Extensions: Show Recommended Extensions, then install all recommended extensions from the left navbar that opens up.Build and open in the devcontainer
Ctrl+Shift+P > Rebuild and Reopen In ContainerSelect the development container based on your container engine (podman or docker)- If installation stalls on
docker inspect --type image ubuntu:24.10, you may need to feth the base image manually - Run
docker inspect --type image ubuntu:24.10 - If it fails with
Error response from daemon: No such image: ubuntu, then rundocker pull ubuntu:24.10
- If installation stalls on
(optional) mount additional projects into the dev container To test
unused-finderagainst your repo during development, uncomment the commented-out "mount" in the checked-in.devcontainer:// This mounts client-web checked out next to this repo for testing, left checked-in here for convenience. // Don't commit it, though! // "source=${localWorkspaceFolder}/../client-web,target=/workspaces/client-web,type=bind,consistency=cached",The provided example mounts
client-webas a target repo
Flamegraphs and profiling
For profiling, you can use samply
# This isn't installed by default in the dev container because it has to be built from source,
# which takes a long time
#
# Must be built with --locked dependencies
# See: https://github.com/mstange/samply/issues/341
cargo install samply --lockedTo profile a test, first build the test binary
# This will print the path of the test binary
cargo test -p unused_finder --no-run
# Then, run samply on the test binary binary
samply record target/debug/deps/unused_finder-3aa70b00191bd4dfNote: Working in WSL
The devcontainer is configured to allow perf events, but the host system must also be configured to allow perf events. On windows, devcontainers will probably be running under wsl. This means opening up wsl, and running the following:
# from within WSL
echo '1' | sudo tee /proc/sys/kernel/perf_event_paranoidThen, close and restart your devcontainers
8 months ago
8 months ago
8 months ago
11 months ago
11 months ago
1 year ago
1 year ago
1 year ago
1 year ago
1 year ago
1 year ago
1 year ago
2 years ago
2 years ago
2 years ago
2 years ago
2 years ago
2 years ago
2 years ago
2 years ago
2 years ago
2 years ago
2 years ago
2 years ago
2 years ago
3 years ago
3 years ago
3 years ago
3 years ago
3 years ago
3 years ago
3 years ago
3 years ago
3 years ago
3 years ago
3 years ago
3 years ago
3 years ago
3 years ago