Skip to main content

Trigger new code analysis on

Project description

Code Grade Build Status

Code-Inspector Continuous Integration Tool

These are various Python tools used to use the code-inspector engine in a continuous integration pipeline and compare analysis.

The following programs are being included:

  • code-inspector-project: get metrics about a project
  • code-inspector-compare: compare a project metrics against another projects or branches
  • code-inspector-check-quality: check the quality of a project for a particular revision
  • code-inspector-pre-hook-check: script to invoke for a pre-push hook to check that a commit has no issue before pushing to your git repo
  • code-inspector-github-action: specific GitHub action for Code Inspector (learn more here)


You can build and try the program using the following command:

Python 2

python install --user

You will then find binaries in $HOME/.local/bin, for example $HOME/.local/bin/code-inspector-compare.

Python 3

python3 install


You need to set your API token with environment variables:

  • CODE_INSPECTOR_ACCESS_KEY: your access key API generated from your project preferences
  • CODE_INSPECTOR_SECRET_KEY: your secret key API generated from your project preferences

On a terminal, you would set them up like this:


Project information tool

Get general information about a project.

Invoke the tool as follow:

code-inspector-project -p <PROJECT_NAME>

For example:

code-inspector-project -p "mergify integration"

This is an example of the execution results:

    "lastAnalysis": {
        "status": "Done", 
        "summary": {
            "duplicates": 0, 
            "duplicated_lines": 0, 
            "violations": 2
    "id": 173, 
    "name": "mergify integration"

Compare tool

The compare tool is used to compare a project with another repository. Invoke the tool as follow:

code-inspector-compare -p "mergify integration" --kind <REPOSITORY_KIND> --url <URL_TO_OTHER_REPOSITORY> --target-branch=<BRANCH> --target-revision=<REVISION>

This command will compare the project mergify integration on code inspector with the project located at the URL <URL_TO_OTHER_REPOSITORY>.

When the tool successfully executes, it reports the execution in a JSON object. This object shows you the number of violations, duplicates so that developers can reuse this later. There is an example of the JSON object - as follow:

    "status": "Done", 
    "targetAnalysis": {
        "status": "Done", 
        "summary": {
            "duplicates": 0, 
            "violations": 2
    "id": 53, 
    "sourceAnalysis": {
        "status": "Done", 
        "summary": {
            "duplicates": 0, 
            "violations": 2

These are the explanation for the other parameters:

  • kind: kind of repository used for the target. Can be Git, Github, Gitlab or Bitbucket. Values are explained below. This parameter is REQUIRED.
  • URL: URL of the repository. This parameter is REQUIRED.
  • target-revision: revision of the target repository. This parameter is OPTIONAL
  • target-branch: branch of the target repository. This parameter is OPTIONAL

The kind argument is used to define how the target repository will be fetched. Based on the value, we use credentials from the authenticated user to clone the repository. For example, if you specify Github, the target repository will be cloned using the github credentials of the authenticated user. If the user does not have any registered credentials on Code Inspector, analysis will fail.

These are the valid values for the kind argument:

  • Github: use the Github credentials of the user making the compare request to clone the target repository
  • Git: do not use any credentials to clone the target repository. Used to clone public repository that does not need authentication.
  • Gitlab: use the Gitlab credentials of the user making the compare request to clone the target repository
  • Bitbucket: use the Bitbucket credentials of the user making the compare request to clone the target repository

These are the potential return code:

  • 0: everything is great and the target analysis does not have more violations or duplicates
  • 1: error during the analysis
  • 2: cannot find the project (specified with the -p option)
  • 3: cannot start a new comparison
  • 5: the target analysis has more violations than the source
  • 6: the target analysis has more duplicates than the source

Git pre-hooks

In order to use the pre-push git hooks, edit your .git/hooks/pre-push file and add the following command:

code-inspector-pre-hook-check --project-name codeinspector-playground --remote-sha $remote_sha --local-sha $local_sha

The following variables should be defined by the script:

  • local_sha represents the local SHA being pushed
  • remote_sha represents the remote SHA at the beginning of this revision

The tool lets you ignore violations according to their categories and severities using options

  • --exclude-severities lets you ignore violations based on their severities (example: --exclude-severities=3,4 to ignore severities 3 and 4).
  • --exclude-categories lets you ignore violations based on their categories (example: --exclude-categories=design,security)

Notes that the following environment variables must be set to use the tool:

  • CODE_INSPECTOR_ACCESS_KEY: access key related to your API access
  • CODE_INSPECTOR_SECRET_KEY: secret key related to your API access

There is an example of a pre-push hook available in docs/hooks/pre-push.sample.

About Code Inspector

Code Inspector is a software analysis platform to manage and mitigate technical debt. It offers plans that caters to all developers. From our basic free plan for your personal project to the gold plan (for companies with multiples private projects), code-inspector detects coding issues and helps you keep your project afloat.

Project details

Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

code-inspector-0.0.18.tar.gz (23.1 kB view hashes)

Uploaded source

Built Distribution

code_inspector-0.0.18-py2.py3-none-any.whl (29.4 kB view hashes)

Uploaded py2 py3

Supported by

AWS AWS Cloud computing Datadog Datadog Monitoring Facebook / Instagram Facebook / Instagram PSF Sponsor Fastly Fastly CDN Google Google Object Storage and Download Analytics Huawei Huawei PSF Sponsor Microsoft Microsoft PSF Sponsor NVIDIA NVIDIA PSF Sponsor Pingdom Pingdom Monitoring Salesforce Salesforce PSF Sponsor Sentry Sentry Error logging StatusPage StatusPage Status page