A rust reimplementation of good-fences:
Good-fences is a tool that allows you to segment a TypeScript project into conceptual areas and manage dependencies between those areas. This is mostly a concern for large projects with many people working on them, where it is impossible for every developer to have a wholistic understanding of the entire codebase. JavaScript's module system is a specialized form of anarchy because any file can import any other file, possibly allowing access to code that was really meant to be an internal implementation detail of some larger system. Other languages have concepts like DLL boundaries and the internal keyword to mitigate this. Good-fences provides a way to enforce similar boundaries in the TypeScript world.
The original good-fences implementation came with some limitations:
- Its native dependencies only supported Node.js < v15.
- It had performance issues in some of our biggest projects (scanning 40k+ files).
Rust's safe concurrency and memory safety allows us to re-write original project with additional performance benefits, leaning on swc for javascript/typescript parsing.
good-fences-rs includes a CLI and an API, under the name @good-fences/api.
Compatible with x86 and x64 windows and linux platforms.
Linux:
GCLIB>= 2.27 (preinstalled with ubuntu 18)- Node.js > 14
npm
Via npm.
npm install -g @good-fences/apiCloning the repo:
git clone https://github.com/Adjective-Object/good-fences-rs-core
cd good-fences-rs-core
yarn
yarn run buildnpm install @good-fences/apiUse it in your project:
import { goodFences } from '@good-fences/api';
goodFences({...});To run the good-fences cli we need at least two things:
fence.jsonconfiguration files.- A
tsconfig.jsonfile. (see tsconfig reference)
Let's assume a project like this:
├── my-project
│ ├── src
│ │ ├── **/*.ts
| | ├── index.js
| │ ├── fence.json
| tsconfig.json
From your terminal you can run this:
cd my-project
good-fences src[paths]: the cli takes only thepathsargument, a list, separated with spaces, of all directories that are going to be scanned.
If you have your tsconfig file splitt and want to use the one containing compilerOptions.paths instead of the default tsconfig.json
good-fences src --project tsconfig.with-paths.jsonIn cases like the one above, it could be that different tsconfig files have different compilerOptions.baseUrl configuration, you can override that valua from your specified --project file with --baseUrl flag.
good-fences src --project tsconfig.without-baseurl.json --baseUrl .The --output flag takes a path. At the end of checking, fence violation errors will be saved to the provided path as json.
good-fences src --output fenceViolations.json
cat fenceViolations.jsonFor some cases, scanning your cwd could be needed but most projects have node_modules that isn't necessary to perform evaluations, in those cases --ignoreExternalFences makes good-fences skip all directories and files from node_modules.
good-fences . --ignoreExternalFencesThis takes a list of regular expressions as input values, separated with spaces. In case certain directories need to be ignored during the fence evaluation, this will perform regular expression matching on fence paths to ignore them (e.g. --ignoredDirs lib will not evaluate files under any lib directory).
good-fences src --ignoredDirs ignored1 ignored2 ...-
Install a container engine: The repo uses a devcontainer, which is like a lightweight virtual machine that contains a pre-configured development environment.
It is intended to support both Docker and podman, which are two different container engines. This is kind of arbitrary, and I might choose to revert it in the future if it presents issues.
On windows, install Docker-Desktop On linux, you can install either
dockeror podman (viapodman-docker) -
Set up your local config The devcontainer mounts some local directories from your machine into the container. If you do not have these already, you will have to create them, or comment out the bind mounts in the devcontainer.
$HOME/.ssh-- This is mounted so the container can access your SSH keys to push/pull from the git remote.
This should already exist if you have ever configured an SSH key viassh-keygen, which is the normal way to clone a git repo.
Note that if you are developing in WSL, you should create these files in wsl, not within your windows filesystem.
-
Configure your local user identity From within the repo, configure your local git identity:
❯ git config --local user.name "Your Name Here" ❯ git config --local user.email "[email protected]"Note that you have to do this from within the repo's folder so it will be persisted into the devcontainer when the repo's folder is mounted as a volume. If you are in WSL, you need to do this within the repo's out folder in WSL
-
Install recommended extensions Install the recommended extensions from this repo.
Ctrl+Shift+P > Extensions: Show Recommended Extensions, then install all recommended extensions from the left navbar that opens up. -
Build and open in the devcontainer
Ctrl+Shift+P > Rebuild and Reopen In ContainerSelect the development container based on your container engine (podman or docker)- If installation stalls on
docker inspect --type image ubuntu:24.10, you may need to feth the base image manually - Run
docker inspect --type image ubuntu:24.10 - If it fails with
Error response from daemon: No such image: ubuntu, then rundocker pull ubuntu:24.10
- If installation stalls on
-
(optional) mount additional projects into the dev container To test
unused-finderagainst your repo during development, uncomment the commented-out "mount" in the checked-in.devcontainer:// This mounts client-web checked out next to this repo for testing, left checked-in here for convenience. // Don't commit it, though! // "source=${localWorkspaceFolder}/../client-web,target=/workspaces/client-web,type=bind,consistency=cached",
The provided example mounts
client-webas a target repo
For profiling, you can use samply
# This isn't installed by default in the dev container because it has to be built from source,
# which takes a long time
#
# Must be built with --locked dependencies
# See: https://github.com/mstange/samply/issues/341
cargo install samply --lockedTo profile a test, first build the test binary
# This will print the path of the test binary
cargo test -p unused_finder --no-run
# Then, run samply on the test binary binary
samply record target/debug/deps/unused_finder-3aa70b00191bd4dfThe devcontainer is configured to allow perf events, but the host system must also be configured to allow perf events. On windows, devcontainers will probably be running under wsl. This means opening up wsl, and running the following:
# from within WSL
echo '1' | sudo tee /proc/sys/kernel/perf_event_paranoidThen, close and restart your devcontainers