Skip to main content

CLI tools for

Project description

Code Grade Code Quality PyPI version

Codiga Continuous Integration Tool

These are various Python tools used to use the codiga engine in a continuous integration pipeline and compare analysis.

The following programs are being included:

  • codiga-project: get metrics about a project
  • codiga-compare: compare a project metrics against another projects or branches
  • codiga-check-quality: check the quality of a project for a particular revision
  • codiga-pre-hook-check: script to invoke for a pre-push hook to check that a commit has no issue before pushing to your git repo
  • codiga-github-action: specific GitHub action for Codiga (learn more here)


You can build and try the program using the following command:

Python 2

python install --user

You will then find binaries in $HOME/.local/bin, for example $HOME/.local/bin/codiga-compare.

Python 3

python3 install


You need to set your API token with environment variables:

  • CODIGA_API_TOKEN: your API token generated from your account

On a terminal, you would set them up like this:


Project information tool

Get general information about a project.

Invoke the tool as follow:

codiga-project -p <PROJECT_NAME>

For example:

codiga-project -p "mergify integration"

This is an example of the execution results:

    "lastAnalysis": {
        "status": "Done", 
        "summary": {
            "duplicates": 0, 
            "duplicated_lines": 0, 
            "violations": 2
    "id": 173, 
    "name": "mergify integration"

Compare tool

The compare tool is used to compare a project with another repository. Invoke the tool as follow:

codiga-compare -p "mergify integration" --kind <REPOSITORY_KIND> --url <URL_TO_OTHER_REPOSITORY> --target-branch=<BRANCH> --target-revision=<REVISION>

This command will compare the project mergify integration on codiga with the project located at the URL <URL_TO_OTHER_REPOSITORY>.

When the tool successfully executes, it reports the execution in a JSON object. This object shows you the number of violations, duplicates so that developers can reuse this later. There is an example of the JSON object - as follow:

    "status": "Done", 
    "targetAnalysis": {
        "status": "Done", 
        "summary": {
            "duplicates": 0, 
            "violations": 2
    "id": 53, 
    "sourceAnalysis": {
        "status": "Done", 
        "summary": {
            "duplicates": 0, 
            "violations": 2

These are the explanation for the other parameters:

  • kind: kind of repository used for the target. Can be Git, Github, Gitlab or Bitbucket. Values are explained below. This parameter is REQUIRED.
  • URL: URL of the repository. This parameter is REQUIRED.
  • target-revision: revision of the target repository. This parameter is OPTIONAL
  • target-branch: branch of the target repository. This parameter is OPTIONAL

The kind argument is used to define how the target repository will be fetched. Based on the value, we use credentials from the authenticated user to clone the repository. For example, if you specify Github, the target repository will be cloned using the github credentials of the authenticated user. If the user does not have any registered credentials on Codiga, analysis will fail.

These are the valid values for the kind argument:

  • Github: use the Github credentials of the user making the compare request to clone the target repository
  • Git: do not use any credentials to clone the target repository. Used to clone public repository that does not need authentication.
  • Gitlab: use the Gitlab credentials of the user making the compare request to clone the target repository
  • Bitbucket: use the Bitbucket credentials of the user making the compare request to clone the target repository

These are the potential return code:

  • 0: everything is great and the target analysis does not have more violations or duplicates
  • 1: error during the analysis
  • 2: cannot find the project (specified with the -p option)
  • 3: cannot start a new comparison
  • 5: the target analysis has more violations than the source
  • 6: the target analysis has more duplicates than the source

Git pre-hooks

In order to use the pre-push git hooks, edit your .git/hooks/pre-push file and add the following command:

codiga-pre-hook-check --project-name codeinspector-playground --remote-sha $remote_sha --local-sha $local_sha

The following variables should be defined by the script:

  • local_sha represents the local SHA being pushed
  • remote_sha represents the remote SHA at the beginning of this revision

The tool lets you ignore violations according to their categories and severities using options

  • --exclude-severities lets you ignore violations based on their severities (example: --exclude-severities=3,4 to ignore severities 3 and 4).
  • --exclude-categories lets you ignore violations based on their categories (example: --exclude-categories=design,security)

Notes that the following environment variables must be set to use the tool:

  • CODIGA_API_TOKEN: token related to your API access

There is an example of a pre-push hook available in docs/hooks/pre-push.sample.

About Codiga

Codiga is a software analysis platform to manage and mitigate technical debt. It offers plans that caters to all developers. From our basic free plan for your personal project to the gold plan (for companies with multiples private projects), codiga detects coding issues and helps you keep your project afloat.

Project details

Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

codiga-0.1.2.tar.gz (27.5 kB view hashes)

Uploaded source

Built Distribution

codiga-0.1.2-py2.py3-none-any.whl (35.1 kB view hashes)

Uploaded py2 py3

Supported by

AWS AWS Cloud computing Datadog Datadog Monitoring Fastly Fastly CDN Google Google Object Storage and Download Analytics Microsoft Microsoft PSF Sponsor Pingdom Pingdom Monitoring Sentry Sentry Error logging StatusPage StatusPage Status page