A customizable imports organizer for the Go programming language
goio
is a fully customizable Go imports organizer. The configuration
is project based and is stored in a goio.yaml
file in the root of your
module's project folder alongside the go.mod
file. For consistency
the goio.yaml
file should be committed to your projects vcs.
$ go install github.com/go-imports-organizer/goio@latest
Usage of goio:
-p value
path to a file or directory to organize, use multiple times for multiple files
-l list files that need to be organized (no changes made)
-v print version and exit
This file will ensure that the github.com/go-imports-organizer/goio
repo is vendored into your project.
//go:build tools
// +build tools
package scripts
// Add tools that scripts depend on here, to ensure they are vendored.
import (
_ "github.com/go-imports-organizer/goio"
)
This file will check if there are any go files that need to be formatted. If there are, it will print a list of them, and exit with status one (1), otherwise it will exit with status zero (0). Make sure that you make the file executable with chmod +x scripts/verify-imports.sh
.
#!/bin/bash
bad_files=$(go run ./vendor/github.com/go-imports-organizer/goio -l)
if [[ -n "${bad_files}" ]]; then
echo "!!! goio needs to be run on the following files:"
echo "${bad_files}"
echo "Try running 'make imports'"
exit 1
fi
imports: ## Organize imports in go files using goio. Example: make imports
go run ./vendor/github.com/go-imports-organizer/goio
.PHONY: imports
verify-imports: ## Run import verifications. Example: make verify-imports
hack/verify-imports.sh
.PHONY: verify-imports
The goio.yaml
configuration file is a well formatted yaml file.
An array of Exclude definitions.
Each Exclude definition is a rule that tells goio
which files and folders to ignore while looking for Go files that it should organize the imports of. The default configuration file ignores the .git
directory and the vendor
directory. The more files and folders that you can ignore at this stage the faster goio
will run.
A string, valid values are any valid Go regular expression.
A well formatted Regular Expression that is used to match against. Be as specific as possible.
A string, valid values are [name, path]
.
Lets goio
know whether to match agains the files name
or the files path
relative to the modules root directory (where the go.mod file is located).
An array of Group definitions
Each group definition is a rule that tells goio
how you would like the imports
in your Go files organized. Each definition represents a block of import statements, describing how to identify the items that it should contain. Group blocks are displayed in the order that they appear in the array.
A string, valid values are any valid string value
A friendly name to identify the definition by instead of trying to decipher the regular expression each time to remember what it does.
An array of strings, valid values are any valid Go regular expression.
A well formatted Regular Expression that is used to match against. Be as specific as possible.
NOTE:
There is one keyword that is available for the RegExp value that is a special keyword, it is %{module}%
. This keyword automatically creates a regular expression that matches the current module name as defined by the go.mod file. To ensure that it captures the correct imports you should always set the MatchOrder
to 0
for this definition.
An integer, valid values are -n...n
Tells goio
which order the definitions should be matched against in. Lower numbers are first, higher numbers are last.
It is important to ensure the correct matchorder
is used, expecially if any of your regexp
have any kind of overlap, such as having a module name of github.com/example/mymodule
and a group definition for github.com/example
. You would want to make sure that your module
definition was matched first or those imports would get rolled into the github.com/example
one because it is less specific.
NOTE The recommended Match Order to avoid the above scenario is:
- module (should always be first)
- custom groups (ordered most specific to least specific)
- standard (should be second to last)
- other (should be last)
Profiling via the pprof
tools is already configured within the application and can be enabled using the following methods.
You can enable CPU profiling by setting the CPUPROFILE
environment variable to the name of the file that the profiling information should be written to.
$ CPUPROFILE=cpu.pprof goio
You can enable MEMORY profiling by setting the MEMPROFILE
environment variable to the name of the file that the profiling information should be written to.
$ MEMPROFILE=mem.pprof goio