Datadog acquired Codiga. This repository is no longer active.
These are various Python tools used to use the codiga engine in a continuous integration pipeline and compare analysis.
The following programs are being included:
codiga-project
: get metrics about a projectcodiga-compare
: compare a project metrics against another projects or branchescodiga-check-ruleset
: check a ruleset against an APIcodiga-export-ruleset
: export a set of rules into a JSON filecodiga-check-quality
: check the quality of a project for a particular revisioncodiga-pre-hook-check
: script to invoke for a pre-push hook to check that a commit has no issue before pushing to your git repocodiga-github-action
: specific GitHub action for Codiga (learn more here)
You can build and try the program using the following command:
python setup.py install --user
You will then find binaries in $HOME/.local/bin
, for example $HOME/.local/bin/codiga-compare
.
python3 setup.py install
You need to set your API token with environment variables:
CODIGA_API_TOKEN
: your API token generated from your account
On a terminal, you would set them up like this:
export CODIGA_API_TOKEN=<INSERT-YOUR-API-TOKEN-HERE>
codiga-check-ruleset -r "python-security" -s "https://analysis.codiga.io/analyze"
codiga-export-ruleset -r python-security,python-best-practices -f <file>
Get general information about a project.
Invoke the tool as follow:
codiga-project -p <PROJECT_NAME>
For example:
codiga-project -p "mergify integration"
This is an example of the execution results:
{
"lastAnalysis": {
"status": "Done",
"summary": {
"duplicates": 0,
"duplicated_lines": 0,
"violations": 2
}
},
"id": 173,
"name": "mergify integration"
}
The compare tool is used to compare a project with another repository. Invoke the tool as follow:
codiga-compare -p "mergify integration" --kind <REPOSITORY_KIND> --url <URL_TO_OTHER_REPOSITORY> --target-branch=<BRANCH> --target-revision=<REVISION>
This command will compare the project mergify integration
on codiga with the project located
at the URL <URL_TO_OTHER_REPOSITORY>
.
When the tool successfully executes, it reports the execution in a JSON object. This object shows you the number of violations, duplicates so that developers can reuse this later. There is an example of the JSON object - as follow:
{
"status": "Done",
"targetAnalysis": {
"status": "Done",
"summary": {
"duplicates": 0,
"violations": 2
}
},
"id": 53,
"sourceAnalysis": {
"status": "Done",
"summary": {
"duplicates": 0,
"violations": 2
}
}
}
These are the explanation for the other parameters:
kind
: kind of repository used for the target. Can beGit
,Github
,Gitlab
orBitbucket
. Values are explained below. This parameter is REQUIRED.URL
: URL of the repository. This parameter is REQUIRED.target-revision
: revision of the target repository. This parameter is OPTIONALtarget-branch
: branch of the target repository. This parameter is OPTIONAL
The kind
argument is used to define how the target repository will be fetched.
Based on the value, we use credentials from the authenticated user to clone the repository.
For example, if you specify Github
, the target repository will be cloned using the github credentials
of the authenticated user. If the user does not have any registered credentials on Codiga,
analysis will fail.
These are the valid values for the kind
argument:
Github
: use the Github credentials of the user making the compare request to clone the target repositoryGit
: do not use any credentials to clone the target repository. Used to clone public repository that does not need authentication.Gitlab
: use the Gitlab credentials of the user making the compare request to clone the target repositoryBitbucket
: use the Bitbucket credentials of the user making the compare request to clone the target repository
These are the potential return code:
0
: everything is great and the target analysis does not have more violations or duplicates1
: error during the analysis2
: cannot find the project (specified with the-p
option)3
: cannot start a new comparison5
: the target analysis has more violations than the source6
: the target analysis has more duplicates than the source
In order to use the pre-push git hooks, edit your .git/hooks/pre-push
file and add the following command:
codiga-pre-hook-check --project-name codeinspector-playground --remote-sha $remote_sha --local-sha $local_sha
The following variables should be defined by the script:
local_sha
represents the local SHA being pushedremote_sha
represents the remote SHA at the beginning of this revision
The tool lets you ignore violations according to their categories and severities using options
--exclude-severities
lets you ignore violations based on their severities (example:--exclude-severities=3,4
to ignore severities3
and4
).--exclude-categories
lets you ignore violations based on their categories (example:--exclude-categories=design,security
)
Notes that the following environment variables must be set to use the tool:
CODIGA_API_TOKEN
: token related to your API access
There is an example of a pre-push
hook available in docs/hooks/pre-push.sample
.
Codiga is a software analysis platform to manage and mitigate technical debt. It offers plans that caters to all developers. From our basic free plan for your personal project to the gold plan (for companies with multiples private projects), codiga detects coding issues and helps you keep your project afloat.