Rules & Filters
Use rules or filters to customize Knip’s output. This has various use cases, a few examples:
- Temporarily focus on a specific issue type.
- You don’t want to see unused
type,interfaceandenumexports reported. - Specific issue types should be printed, but not counted against the total error count.
If you’re looking to handle one-off exceptions, also see JSDoc tags.
Filters
Section titled “Filters”You can --include or --exclude any of the reported issue types to slice &
dice the report to your needs. Alternatively, they can be added to the
configuration (e.g. "exclude": ["dependencies"]).
Use --include to report only specific issue types. The following example
commands do the same:
knip --include files --include dependenciesknip --include files,dependenciesOr the other way around, use --exclude to ignore the types you’re not
interested in:
knip --include files --exclude enumMembers,duplicatesAlso see the list of issue types.
Shorthands
Section titled “Shorthands”Knip has shortcuts to include only specific issue types.
-
The
--dependenciesflag includes:dependencies(anddevDependencies+optionalPeerDependencies)unlistedbinariesunresolved
-
The
--exportsflag includes:exportstypesenumMembersduplicates
-
The
--filesflag is a shortcut for--include files
Use rules in the configuration to customize the issue types that count towards
the total error count, or to exclude them altogether.
| Value | Default | Printed | Counted | Description |
|---|---|---|---|---|
"error" | ✓ | ✓ | ✓ | Similar to the --include filter |
"warn" | - | ✓ | - | Printed in faded/gray color |
"off" | - | - | - | Similar to the --exclude filter |
Example:
{ "rules": { "files": "warn", "classMembers": "off", "duplicates": "off" }}Also see the issue types overview.
NOTE: If the dependencies issue type is included, the devDependencies and
optionalPeerDependencies types can still be set to "warn" separately.
The rules are modeled after the ESLint rules configuration, and could be
extended in the future.
Rules or filters?
Section titled “Rules or filters?”Filters are meant to be used as command-line flags, rules allow for more fine-grained configuration.
- Rules are more fine-grained since they also have “warn”.
- Rules could be extended in the future.
- Filters can be set in configuration and from CLI (rules only in configuration).
- Filters have shorthands (rules don’t have this).
ISC License © 2024 Lars Kappert