Code quality metrics tracking tool that combines Ruff, Radon, and cloc to generate detailed trends over time
Project description
Code Metrics Tracker
Why We Built Code Metrics Tracker
Most code quality tools fall into two categories: simple analyzers that provide point-in-time metrics without historical tracking, or complex enterprise platforms that require servers, cloud accounts, and extensive configuration. We built Code Metrics Tracker to fill the gap in between.
The Problem We Solved
Python developers needed a tool that could:
- Track code quality metrics over time locally without cloud dependencies
- Work seamlessly with git workflows for version-controlled metrics
- Setup in minutes with sensible defaults
- Integrate effortlessly with CI/CD pipelines like GitHub Actions
- Generate reports that live alongside the code
What Makes Us Different
Unlike enterprise platforms, Code Metrics Tracker:
- Runs entirely locally - your code never leaves your machine
- Zero configuration - works out of the box with smart defaults
- Git-native - metrics are stored in your repository
- CI/CD ready - includes GitHub Actions templates
- Developer-friendly - simple CLI, markdown reports
Unlike simple analyzers, Code Metrics Tracker:
- Tracks history - see how metrics change over time
- Unified reporting - combines multiple tools into one view
- Manages snapshots - compare any two points in time
- Automated workflows - updates metrics on every commit
What It Does
Code Metrics Tracker combines three industry-standard tools to provide comprehensive analysis:
- cloc: Counts lines of code, comments, and blank lines across programming languages
- Ruff: Identifies linting issues, code style violations, and potential bugs with fast performance
- Radon: Analyzes code complexity (cyclomatic complexity) and maintainability
What's New in 0.1.9 (May 2025)
- Bug Fix: Fixed cloc command failure when exclude patterns contain wildcards (e.g.,
*.db,config/*.yaml) - GitHub Actions: Resolved "cannot specify directory paths" error in CI/CD workflows
- Pattern Handling: Improved exclude pattern logic to correctly handle wildcards and file extensions
What's New in 0.1.6 (May 2025)
- Improved Detection: Fixed
--only-on-changesflag to correctly identify meaningful changes - Better Feedback: Added debug output showing which metrics changed between snapshots
- Developer UX: Clear messages when no changes are detected in snapshots
- JSON Files: Added "_unchanged" suffix to metrics files when no changes are detected
What's New in 0.1.5 (May 2025)
- New Feature: Added
--only-on-changesflag to prevent redundant CODE_METRICS.md updates - GitHub Actions Efficiency: Improved GitHub workflow to avoid empty commits
- Bug Fix: Fixed an issue with Radon CC JSON parsing where string entries caused errors
- Improved Stability: Enhanced parser to handle different formats of Radon output
- Better Error Handling: Added specific type checking to prevent AttributeError
What's New in 0.1.4 (May 2023)
- Improved JSON Parsing: All tools now use structured JSON output for better accuracy
- Accurate Complexity Reporting: Fixed function complexity display in reports
- Enhanced Modularity: New dedicated modules for parsing and snapshot management
- Type Safety: Added TypedDict definitions for all metrics data
See the CHANGELOG.md for full details.
Features
The tracker generates detailed reports focusing on:
- Lines of code statistics: Track code volume and distribution by language
- Linting issues: Detect and monitor code style, potential bugs, and anti-patterns
- Cyclomatic complexity: Identify complex functions and methods that need refactoring
- Maintainability index: Measure how maintainable your code is over time
Results are stored in two complementary formats:
- JSON snapshots: Detailed metrics data stored in versioned JSON files for programmatic analysis
- Markdown reports: Human-readable CODE_METRICS.md file that tracks metrics over time with trend indicators
Perfect For
- Python teams who want local control over their metrics
- Open source projects that need transparent quality tracking
- Private codebases where cloud solutions aren't an option
- CI/CD workflows that need automated quality gates
- Developers who prefer simplicity over complexity
Key benefits:
- Track code quality trends over time
- Identify problematic areas in the codebase
- Make data-driven refactoring decisions
- Establish quality standards with measurable metrics
- Integrate metrics tracking into CI/CD pipelines
Installation
Install from PyPI
pip install code-metrics-tracker
Install Required Dependencies
The tool relies on three external tools that need to be installed separately:
1. Install cloc
# macOS
brew install cloc
# Ubuntu/Debian
sudo apt-get install cloc
# Windows
choco install cloc
2. Install Ruff and Radon
These are automatically installed as dependencies when you install code-metrics-tracker, but you can also install them directly:
pip install ruff radon
Quick Start
- Initialize code quality tracking in your project:
codeqa init
- Create a code quality snapshot:
codeqa snapshot
- View the generated CODE_METRICS.md file for detailed metrics.
Commands
Command Overview
codeqa init- Initialize code quality tracking in your projectcodeqa snapshot- Create a new code quality snapshot and update CODE_METRICS.mdcodeqa list- List all available snapshotscodeqa compare- Compare two snapshots to see trendscodeqa report- Generate a standalone report from a snapshot
Detailed Usage Examples
Initialize a Project
The init command sets up your project for code quality tracking by:
- Creating a configuration file (
codeqa.json) - Creating a metrics storage directory
- Adding a CODE_METRICS.md file if it doesn't exist
# Basic initialization with default settings
codeqa init
# Initialize with patterns from your .gitignore file
codeqa init --from-gitignore
# Include ALL .gitignore patterns (including IDE files, logs, etc.)
codeqa init --from-gitignore --all-gitignore-patterns
# After initialization, you can edit codeqa.json to customize
# which directories to include/exclude
Initializing from .gitignore
The --from-gitignore option reads your project's .gitignore file and automatically configures exclude patterns. This ensures consistency between what's ignored by git and what's excluded from code analysis.
By default, some patterns are filtered out as they might contain code you want to analyze:
- IDE configuration files (
.idea/,.vscode/) - Environment files (
.env,.env.local) - Log files (
*.log,logs/) - OS-specific files (
.DS_Store,Thumbs.db)
Use --all-gitignore-patterns to include these patterns anyway.
The tool will also suggest additional patterns based on your project type. For example, if it detects Python patterns, it will suggest adding .coverage, htmlcov/, .pytest_cache/, etc.
Create Metrics Snapshots
The snapshot command analyzes your codebase and:
- Runs code statistics with cloc
- Performs linting checks with Ruff
- Analyzes complexity and maintainability with Radon
- Updates CODE_METRICS.md with the latest metrics
- Stores detailed metrics data as a JSON file
# Create a snapshot with default settings
codeqa snapshot
# Create a snapshot with a custom report title
codeqa snapshot --title "Post-Refactoring Metrics"
# Create a snapshot but only update CODE_METRICS.md if there are meaningful changes
codeqa snapshot --only-on-changes
List Available Snapshots
The list command shows all available snapshots:
# List all snapshots with their dates and filenames
codeqa list
Example output:
Available snapshots:
- May 13, 2025 (metrics_20250513_164444.json)
- April 19, 2025 (metrics_20250419_150845.json)
- April 18, 2025 (metrics_20250418_183327.json)
Compare Snapshots
The compare command allows you to track changes between two snapshots:
# Compare by using snapshot filenames
codeqa compare --first generated/metrics/metrics_20250418_183327.json --second generated/metrics/metrics_20250513_164444.json
# Compare and save the report to a file
codeqa compare --first generated/metrics/metrics_20250418_183327.json --second generated/metrics/metrics_20250513_164444.json --output comparison_report.md
# Compare using indexes from the list command (1-based)
codeqa compare --first 2 --second 1 --output comparison_report.md
The comparison report highlights:
- Changes in lines of code
- Changes in linting issues
- Changes in complex functions
- Changes in maintainability
- Trend analysis with percentage changes
Generate Standalone Reports
The report command generates a standalone report from a specific snapshot:
# Generate a report from a specific snapshot
codeqa report --snapshot generated/metrics/metrics_20250513_164444.json
# Save the report to a specific file
codeqa report --snapshot generated/metrics/metrics_20250513_164444.json --output quality_report.md
# Generate a report using the snapshot index from the list command (1-based)
codeqa report --snapshot 1 --output quality_report.md
The standalone report includes:
- Summary statistics
- Code distribution by language
- Top complex files and functions
- Files with linting issues
- Files with low maintainability
Output Formats
CODE_METRICS.md
The main output file is CODE_METRICS.md, which contains:
- A header section explaining the metrics
- Historical snapshots with dates
- Summary statistics for each snapshot
- Code statistics by language
- Lists of complex files and functions
- Files with linting issues
- Files with low maintainability
- Trend analysis compared to the previous snapshot
- Analysis of critical issues to address
Sample CODE_METRICS.md Excerpt
# Code Quality Metrics
This file tracks code quality metrics over time to help monitor and improve our codebase.
## Metrics Definitions
### Ruff Metrics
- **Issues Count**: Total number of linting issues detected by Ruff
- **Issues by Type**: Distribution of error types (unused imports, undefined names, etc.)
### Radon Complexity Metrics (CC)
- **A**: CC score 1-5 (low complexity)
- **B**: CC score 6-10 (moderate complexity)
- **C**: CC score 11-20 (high complexity)
- **D**: CC score 21-30 (very high complexity)
- **E**: CC score 31-40 (extremely high complexity)
- **F**: CC score 41+ (alarming complexity)
## Historical Snapshots
### May 13, 2025
#### Summary
| Metric | Value |
|--------|-------|
| Lines of Code | 123,739 |
| Files | 699 |
| Comments | 35,493 |
| Linting Issues | 376 |
| Cyclomatic Complexity | A:751 B:102 C:253 D:8 E:3 F:346 |
| Maintainability Index | A:215 B:1 C:3 |
#### Analysis
- Critical issues to address:
- 376 linting issues
- 610 high complexity functions
- 3 files with low maintainability
Comparison Reports
Comparison reports highlight changes between snapshots:
## Comparison: April 19, 2025 vs May 13, 2025
### Summary
| Metric | April 19, 2025 | May 13, 2025 | Change |
|--------|---------|---------|--------|
| Lines of Code | 26,423 | 123,739 | ↑ 97316 (368.3%) |
| Linting Issues | 296 | 376 | ↑ 80 (27.0%) |
| Complex Functions (C-F) | 474 | 610 | ↑ 136 (28.7%) |
| Low Maintainability Files | 3 | 3 | ↑ 0 (0.0%) |
### Analysis
- Code Size: Increased by 97,316 lines
- Code Quality: Mixed changes
- Most Significant Change: Complex Functions
JSON Data Files
Each snapshot also produces a detailed JSON file containing:
- Complete metrics data
- Timestamp information
- Raw data from all tools (cloc, Ruff, Radon)
- Detailed breakdowns by file and function
- Language statistics
These JSON files can be used for:
- Custom analysis scripts
- Integration with other tools
- Historical data processing
- Visualization dashboards
Configuration
Important Note: Many common patterns are already excluded by the tools themselves (like .git, .venv, __pycache__), so you only need to specify project-specific exclusions.
The tool uses a codeqa.json configuration file to control which files and directories are analyzed. Understanding how include and exclude patterns work is crucial for getting accurate metrics that reflect only your project's code.
Basic Configuration Structure
{
"include_paths": ["src", "tests"],
"exclude_patterns": ["migrations", ".coverage", "*.db", "*.log"]
}
How Include and Exclude Patterns Work
Code Metrics Tracker ensures consistent pattern application across all three analysis tools (cloc, Ruff, and Radon) by converting the configuration patterns to each tool's specific format:
Pattern Application by Tool
-
cloc (Code Statistics)
- Include paths: Analyzes only the specified directories
- Exclude patterns are converted to:
--exclude-dirfor directory patterns (e.g.,venv,__pycache__)--exclude-extfor file extensions (e.g.,.pycbecomespyc)
-
Ruff (Linting)
- Include paths: Analyzes only the specified directories
- Exclude patterns are converted to glob patterns:
- Directory names become
**/{dir}/**to match anywhere in the tree - File extensions become
*.extpatterns
- Directory names become
-
Radon (Complexity & Maintainability)
- Include paths: Analyzes only the specified directories
- Exclude patterns are converted to glob patterns:
- Directory names become
*/{dir}/*for matching - File extensions become
*.extpatterns
- Directory names become
Pattern Format Guidelines
When creating your configuration, follow these guidelines for effective pattern matching:
-
Include Paths
- Use relative paths from the project root
- List only the directories containing your source code
- Common examples:
src,lib,tests,app
-
Exclude Patterns
- Simple directory names: Use just the name (e.g.,
venv,migrations) - File extensions: Include the dot (e.g.,
.db,.log) - Specific paths: Use forward slashes (e.g.,
docs/build) - Complex patterns: Use standard glob syntax
- Simple directory names: Use just the name (e.g.,
What's Already Excluded by Default
Each tool has built-in exclusions, so you don't need to exclude these:
cloc automatically excludes:
- Version control directories:
.git,.svn,.hg,.bzr,.cvs - The
.snapshotdirectory - Many auto-generated files (configure, Makefile.in, etc.)
Ruff automatically excludes:
- Version control:
.git,.svn,.hg,.bzr - Virtual environments:
.venv,venv,.direnv - Python caches:
__pycache__,.mypy_cache,.pytype,.ruff_cache - Build directories:
dist,build,.eggs,__pypackages__ - Test environments:
.tox,.nox - Other:
node_modules,.pants.d - Respects
.gitignorefiles by default
Radon automatically excludes:
- Hidden directories (starting with
.)
You only need to exclude:
- Project-specific directories (e.g.,
migrations,static,uploads) - Non-default virtual environments (e.g.,
env,.env) - Generated files not covered by defaults (e.g.,
.coverage,htmlcov) - Large data files (e.g.,
.db,.sqlite,.pkl)
Best Practices for Configuration
Effective Configuration Examples
Standard Python Project:
{
"include_paths": [
"src",
"tests"
],
"exclude_patterns": [
"env", // Non-default virtual env name
".env", // Non-default virtual env name
".pytest_cache", // Testing artifacts
".coverage", // Coverage data
"htmlcov", // Coverage reports
"*.egg-info" // Package metadata
]
}
Complex Multi-Package Project:
{
"include_paths": [
"packages/core/src",
"packages/cli/src",
"packages/api/src",
"shared/utils",
"tests"
],
"exclude_patterns": [
// Non-default environments
"env",
// Project-specific
"site-packages", // Vendored packages
".idea", // IDE files
".vscode", // IDE files
".coverage", // Test coverage
"docs/_build", // Built docs
"htmlcov", // Coverage reports
// Test data
"test_data",
"fixtures",
"*.db",
"*.log"
]
}
Tips for Accurate Metrics
-
Start Narrow, Expand Gradually
- Begin with your core source directories
- Add additional paths as needed
- Monitor the first few snapshots to ensure accuracy
-
Exclude Generated Code
- Migration files (
migrations/) - Auto-generated API clients
- Compiled or transpiled output
- Protocol buffer generated files
- Migration files (
-
Exclude Third-Party Code
- Vendored dependencies
- Copied libraries
- Framework boilerplate
- Template code
-
Use Specific Patterns When Needed
- For partial exclusions:
tests/fixturesinstead of alltests - For specific file types:
.spec.jsfor test files - For nested exclusions:
src/generatedto exclude only generated code in src
- For partial exclusions:
-
Validate Your Configuration
- Run
codeqa snapshot --verboseto see which directories are analyzed - Check the first snapshot's file count and language distribution
- Adjust patterns based on the results
- Run
Common Configuration Patterns
Python Projects (minimal, non-redundant):
{
"exclude_patterns": [
// Non-default virtual environments
"env", ".env",
// Project-specific artifacts
".pytest_cache", ".coverage", "htmlcov",
"wheelhouse", // Wheel storage
// Data files
"*.db", "*.sqlite", "*.log"
]
}
JavaScript/TypeScript Projects:
{
"exclude_patterns": [
// Dependencies (node_modules already excluded by Ruff)
"bower_components", // If using Bower
// Build outputs (dist/build already excluded)
"out", ".next", // Framework-specific
// Testing
"coverage", ".nyc_output",
// Caches
".cache", ".parcel-cache"
]
}
Common Pitfalls to Avoid
-
Over-broad Exclusions
- Don't exclude entire directories if you only need to exclude subdirectories
- Be specific with patterns to avoid missing important code
-
Missing Project-Specific Patterns
- Don't forget non-default virtual environments (
env,.envif used) - Remember project-specific generated files (
.coverage,htmlcov) - Include custom build/data directories specific to your project
- Note: Most common patterns (
.git,.venv,__pycache__) are already excluded by the tools
- Don't forget non-default virtual environments (
-
Incorrect Pattern Syntax
- File extensions need the dot:
.pycnotpycin exclude_patterns - Use forward slashes (
/) even on Windows - Patterns are case-sensitive
- File extensions need the dot:
-
Not Testing Configuration Changes
- Always run a snapshot after changing configuration
- Use the
--verboseflag to see what's being analyzed - Verify metrics match your expectations
Debugging Configuration Issues
If your metrics seem incorrect:
- Run with verbose output:
codeqa snapshot --verbose - Check which directories are being analyzed
- Verify exclude patterns are working correctly
- Look at the generated JSON file for detailed file lists
- Adjust patterns and re-run until accurate
{
"include_paths": ["src", "notebooks", "pipelines", "tests"],
"exclude_patterns": [
"data", "models", "outputs", "*.ipynb_checkpoints",
"*.pkl", "*.h5", "*.parquet", "venv"
]
}
Common Pitfalls to Avoid
1. Over-Inclusive Patterns
❌ Avoid:
{
"include_paths": ["."], // Includes everything, even virtual environments
"exclude_patterns": []
}
✅ Better:
{
"include_paths": ["src", "tests"],
"exclude_patterns": ["venv", "*.pyc", "__pycache__"]
}
2. Missing Virtual Environment Exclusions
❌ Problem:
{
"exclude_patterns": ["pycache"] // Missing __ prefix
}
✅ Correct:
{
"exclude_patterns": ["__pycache__", "venv", ".venv"]
}
3. Conflicting Include/Exclude Patterns
❌ Confusing:
{
"include_paths": ["src", "tests"],
"exclude_patterns": ["src/generated", "tests/fixtures"]
}
✅ Clearer:
{
"include_paths": ["src", "tests"],
"exclude_patterns": ["*/generated", "*/fixtures", "*/test_data"]
}
4. Platform-Specific Paths
❌ Windows-specific:
{
"exclude_patterns": ["src\\temp", "tests\\data"]
}
✅ Cross-platform:
{
"exclude_patterns": ["src/temp", "tests/data", "*/temp", "*/data"]
}
Examples of Effective Configurations
Monorepo with Multiple Services
{
"include_paths": [
"services/api",
"services/worker",
"services/gateway",
"shared/lib",
"shared/utils"
],
"exclude_patterns": [
"*/coverage", // Test coverage reports
"*.log", // Log files
"services/deprecated", // Deprecated code
"*/migrations", // Database migrations
"*/uploads", // User uploads
"*.db" // Database files
]
}
Library with Examples and Docs
{
"include_paths": [
"src",
"tests"
],
"exclude_patterns": [
"examples", // Example code not part of the library
"docs", // Documentation
"benchmarks", // Performance testing
"scripts", // Build/deploy scripts
"*.egg-info", // Package metadata
".coverage", // Test coverage data
"htmlcov" // Coverage reports
]
}
Microservice with Docker
{
"include_paths": [
"app",
"tests",
"migrations"
],
"exclude_patterns": [
"docker", // Docker configurations
"k8s", // Kubernetes manifests
".dockerignore",
"volumes", // Docker volumes
"*.log", // Log files
"coverage.xml", // Coverage report
".coverage", // Coverage data
"*.db", // Database files
"uploads" // User uploaded files
]
}
Debugging Pattern Matching
If you're unsure whether your patterns are working correctly:
- Check Generated Metrics: Look at the files being analyzed in the JSON output
- Use Verbose Mode: Some tools provide verbose output showing excluded files
- Test Incrementally: Start with minimal patterns and add exclusions as needed
- Review Tool Documentation: Each tool may have specific pattern syntax requirements
Pattern Precedence
When there's a conflict between include and exclude patterns:
- Exclude patterns generally take precedence over include patterns
- More specific patterns override more general ones
- Tool-specific behaviors may vary (check individual tool documentation)
By carefully configuring your include and exclude patterns, you can ensure that codeqa provides accurate metrics that truly reflect your project's code quality, excluding third-party dependencies and generated files that might skew the results.
GitHub Actions Integration
Add this to your GitHub Actions workflow to automatically track code quality metrics:
name: Code Quality Metrics
on:
push:
branches: [ main ]
jobs:
code-quality:
runs-on: ubuntu-latest
steps:
- uses: actions/checkout@v4
- uses: actions/setup-python@v5
with:
python-version: '3.10'
- name: Install cloc
run: sudo apt-get install -y cloc
- name: Install dependencies
run: |
python -m pip install --upgrade pip
pip install code-metrics-tracker
- name: Generate code quality snapshot
run: codeqa snapshot --only-on-changes # Only update if there are meaningful changes
- name: Commit updated CODE_METRICS.md
uses: stefanzweifel/git-auto-commit-action@v5
with:
commit_message: "Update code quality metrics"
file_pattern: CODE_METRICS.md generated/metrics/*
Important: Use Latest Action Versions
Always use the latest versions of GitHub Actions to avoid deprecation warnings and security issues:
- ✅
actions/checkout@v4(not v3) - ✅
actions/setup-python@v5(not v4) - ✅
stefanzweifel/git-auto-commit-action@v5(not v4)
Using deprecated versions like actions/checkout@v3 or actions/upload-artifact@v3 will cause workflow failures with messages like:
This request has been automatically failed because it uses a deprecated version of `actions/upload-artifact: v3`.
The template above uses the latest stable versions as of 2025.
Development Guide
Local Development Setup
- Clone the repository:
git clone https://github.com/AgileWorksZA/codeqa.git
cd codeqa
- Install in development mode:
pip install -e .
- Install development dependencies:
pip install build twine
Creating a New Release
-
Update version numbers in both files:
setup.py- Update theversionparametercodeqa/__init__.py- Update the__version__variable
-
Update the README.md with any new features or changes
-
Build the package:
rm -rf dist/ build/ *.egg-info/
python -m build
- Test the package locally:
pip install dist/*.whl
Publishing to PyPI
- Install publishing tools if you haven't already:
pip install twine
- Create a
.pypircfile in your home directory with your PyPI credentials:
[pypi]
username = your_username
password = your_password
- Upload to PyPI:
python -m twine upload dist/*
- Alternatively, use a token for authentication:
python -m twine upload --username __token__ --password your-pypi-token dist/*
- Verify the package is available on PyPI: https://pypi.org/project/code-metrics-tracker/
License
MIT
Project details
Release history Release notifications | RSS feed
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
Built Distribution
Filter files by name, interpreter, ABI, and platform.
If you're not sure about the file name format, learn more about wheel file names.
Copy a direct link to the current filters
File details
Details for the file code_metrics_tracker-0.1.11.tar.gz.
File metadata
- Download URL: code_metrics_tracker-0.1.11.tar.gz
- Upload date:
- Size: 41.2 kB
- Tags: Source
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/6.1.0 CPython/3.13.3
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
4fdc37834360ca654447e6742bdb8d4b88c5ea7563007a7f5171fb9e0558d880
|
|
| MD5 |
4c4d35ebe8a79e492257a8c7a89b7729
|
|
| BLAKE2b-256 |
be992302fe0b5d2a5eec3017f180a11f35a9f935efc854f34471e7ce20ed8c40
|
File details
Details for the file code_metrics_tracker-0.1.11-py3-none-any.whl.
File metadata
- Download URL: code_metrics_tracker-0.1.11-py3-none-any.whl
- Upload date:
- Size: 37.0 kB
- Tags: Python 3
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/6.1.0 CPython/3.13.3
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
0e9bea07b1c35169511b78d9e26bb6820b1467ea60a0372ef1254bc8792a9ed9
|
|
| MD5 |
7b2911076d575f1f0fe34b269bda0c64
|
|
| BLAKE2b-256 |
1fa7b267f2f26a82653607d6a935f26dc411ef46fd2b3a9b5d985658bf413434
|