All Projects → smontanari → Code Forensics

smontanari / Code Forensics

A toolset for code analysis and report visualisation

Programming Languages

javascript
184084 projects - #8 most used programming language

Projects that are alternatives of or similar to Code Forensics

lancer
Turn your python code into a hideous mess. Ever heard of Black? This is the opposite.
Stars: ✭ 179 (-35.38%)
Mutual labels:  code-analysis
gogs-bash
Bash Script for Interacting with the GOGS API
Stars: ✭ 31 (-88.81%)
Mutual labels:  version-control
Doorstop
Requirements management using version control.
Stars: ✭ 258 (-6.86%)
Mutual labels:  version-control
snowfs
SnowFS - a fast, scalable version control file storage for graphic files 🎨
Stars: ✭ 1,101 (+297.47%)
Mutual labels:  version-control
hardhat-abi-exporter
🧰 Export Solidity contract ABIs on compilation ⚙️
Stars: ✭ 29 (-89.53%)
Mutual labels:  version-control
wip
WIP & naenae: CLI utilities to easily manage Work In Progress with Git
Stars: ✭ 46 (-83.39%)
Mutual labels:  version-control
revctrl.org
An extract, as complete as I can make it, of content from the revctrl.org wiki
Stars: ✭ 13 (-95.31%)
Mutual labels:  version-control
Schemazen
Script and create SQL Server objects quickly
Stars: ✭ 273 (-1.44%)
Mutual labels:  version-control
speckle-server
The Speckle Server, Frontend, 3D Viewer, & other JS utilities.
Stars: ✭ 224 (-19.13%)
Mutual labels:  version-control
mps-coderules
Type checking and logical inference for JetBrains MPS
Stars: ✭ 24 (-91.34%)
Mutual labels:  code-analysis
facoy
FaCoY Code-to-Code Search Engine
Stars: ✭ 26 (-90.61%)
Mutual labels:  code-analysis
static-code-analysis-plugin
A plugin to simplify Static Code Analysis on Gradle. Not restricted to, but specially useful, in Android projects, by making sure all analysis can access the SDK classes.
Stars: ✭ 36 (-87%)
Mutual labels:  code-analysis
gtbump
git tag bump: A simple utility to bump and manage git semantic version tags and generate Markdown changelogs.
Stars: ✭ 15 (-94.58%)
Mutual labels:  version-control
infinitree
Scalable and encrypted embedded database with 3-tier caching
Stars: ✭ 80 (-71.12%)
Mutual labels:  version-control
Wotan
Pluggable TypeScript and JavaScript linter
Stars: ✭ 271 (-2.17%)
Mutual labels:  code-analysis
git-stashout
A custom git checkout command to automatically manage a per-branch stash
Stars: ✭ 32 (-88.45%)
Mutual labels:  version-control
milestoner
A command line interface for crafting Git repository milestones.
Stars: ✭ 27 (-90.25%)
Mutual labels:  version-control
Coala Bears
Bears for coala
Stars: ✭ 276 (-0.36%)
Mutual labels:  code-analysis
Git Fame
Pretty-print `git` repository collaborators sorted by contributions.
Stars: ✭ 272 (-1.81%)
Mutual labels:  code-analysis
yorm
Automatic object-YAML mapping for Python.
Stars: ✭ 23 (-91.7%)
Mutual labels:  version-control

code-forensics

Run tests

code-forensics is a toolset for analysing codebases stored in a version control system. It leverages the repository logs, or version history data, to perform deep analyses with regards to complexity, logical coupling, authors coupling and to inspect the evolution in time of different parts of a software system with respect to metrics like code churn and number of revisions.

Credits

This project is based on the excellent work of Adam Tornhill and his command line tool Code Maat. The majority of the analysis that code-forensics performs are actually described in Adam's book Your Code as a Crime Scene.

Release news

Version 3 release (January 2021)

This release upgrades a number of packages and drops support for old Node versions in order to start migrating the code to ES6.

Version 2 release (September 2018)

This release introduces new metrics trends in the system evolution analysis (number of commits, number of authors). This change requires a different logic to generate and render the revisions trend diagram, which breaks compatibility with respect to older versions.

See the CHANGELOG for release details.

Pre-requisites

  • Node.js - From release 1.0.0 code-forensics requires Nodejs 4 or later. If you can't upgrade I suggest you use an earlier version of this package.
  • npm v3 - code-forensics requires a flat install of its dependencies into the node_modules folder in order to visualise d3 diagrams.
  • code-maat: code-forensics is distributed with a pre-built (a .jar package) version of code-maat that requires Java 8. Alternatively you can use Docker, provided you can supply a docker image of code-maat. See the Code Maat repository for details on how to run the tool with Java or Docker.

Install

$ npm install code-forensics

Note 1: code-forensics is distributed as a nodejs module that runs on top of gulp version 4. Be aware that if you have gulp already installed as a global module and it's not the required version you will have to explicitly execute the gulp command that comes with the installation of code-forensics.

Note 2: I would advise against installing code-forensics as a global module, as it requires certain packages to be at the top level of the node_modules folder in order to correctly run its internal http server and serve the pages to the browser for the visualisation part of the analysis. If code-forensics is installed as a global module such packages may conflict with already existing ones and that could cause all sorts of unpredictable issues.

VCS support

At the moment code-forensics can work with git and svn based repositories, however other version control systems could be supported in the future, given the ability of Code Maat to parse log data from the most popular ones.

Programming languages

Most of code-forensics analyses are agnostic of the programming language used in the repository, however some tasks can report metrics on the language complexity and currently only Ruby and JavaScript are supported. Complexity analysis for other languages can be added, possibly with your help.

Compatibility

This software is not meant to be a commercial tool, hence support for various operating systems and different browsers is not a priority. I've tested code-forensics on a Mac OS X with different versions of Node.js, and primarily with Chrome as a browser. While I expect (and I'm willing to support) code-forensics to work in linux/unix environments, I can't guarantee it would on a Windows OS.

Usage

This is only a short description on how to get started with code-forensics.

PLEASE REFER TO THE WIKI PAGES FOR A MORE COMPREHENSIVE DOCUMENTATION.

Before posting a new issue please make sure you check out the Troubleshooting guide and the Frequently Asked Questions wiki pages.

Minimal configuration

code-forensics runs as a set of gulp tasks, therefore it requires a gulpfile.js to bootstrap gulp, however there is no need to know the task declaration syntax, as all the necessary tasks are defined inside code-forensics. The gulpfile.js must define the configuration options and parameters necessary to run code-forensics tasks.

A minimal configuration gulpfile.js would look like the following:

require('code-forensics').configure(
  {
    repository: {
      rootPath: "<path-to-the-repo>",
    }
  }
);

The only required configuration value is the file system path to the root directory of the version control repository to analyse, however this example is not practical and I would recommend you learn about and configure other parameters to more effectively target the analyses you intend to run.

Running analyses

Analyses are executed as a gulp task. Depending on how the gulp module is installed (as global or local) there are different ways to invoke the gulp command. Here, to simplify the examples, I will assume it is available on your command PATH. I will also assume you are running the required version (4) of gulp.

Each analysis may require or accept optional parameters.

$ gulp <analysis-task-name> [parameters]

See below how to learn about any available task parameter.

Note: it is highly recommended to specify a time interval for any analysis. If not, code-forensics will attempt to analyse the git commits for the current date only, most likely resulting in empty or near empty reports. You can specify a time interval via command line parameters or through the configuration file. Please refer to the provided documentation.

List analysis tasks

By default running gulp without any argument will print the list of all the top level analysis tasks. Alternatively you can explicitly run the task list-analysis-tasks:

$ gulp list-analysis-tasks

Currently the following analyses are implemented:

  • javascript-complexity-trend-analysis (when JavaScript is enabled)
  • ruby-complexity-trend-analysis (when Ruby is enabled)
  • sloc-trend-analysis
  • hotspot-analysis
  • sum-of-coupling-analysis
  • temporal-coupling-analysis
  • system-evolution-analysis
  • developer-effort-analysis
  • developer-coupling-analysis
  • knowledge-map-analysis
  • commit-message-analysis

List all available tasks

There are different options to print all the available tasks.

The help task itself will list all the tasks along with their description, e.g.:

$ gulp help

If you're interested in inspecting the dependencies between tasks you can leverage gulp version 4 way of displaying exeactly that in a nice tree-like format: run gulp -T or gulp --tasks.

Task usage information

In order to learn which parameters can be passed to a task you can type the following command:

$ gulp help --taskName=<task-name>
Temporal period of analysis

For most tasks it's possible to specify a time period for which the analysis is performed by passing the parameters dateFrom and dateTo. This is particularly useful to understand the evolution of the code in time and analyse negative or positive trends of particular metrics (see the wiki pages for more detailed documentation).

Visualise the reports

The results of each analysis can be displayed in the form of D3 diagrams.

Start up the local http server:

$ gulp webserver

Open the browser at http://localhost:3000/index.html to see a list of the available reports.

Example: perform a commit message analysis

Say we want to investigate the commit messages in our repository during the first six months of 2016. The commit-message-analysis task produces a report on the most frequently used words in the commit messages:

$ gulp commit-message-analysis --dateFrom=2016-01-01 --dateTo=2016-06-30

The output of the command would be something similar to this:

[00:13:07] Starting 'vcs-commit-messages'...
[00:13:07] Fetching git messages from 2010-01-01 to 2010-06-30
[00:13:07] Created: vcs_commit_messages_2010-01-01_2010-06-30.log
[00:13:07] Finished 'vcs-commit-messages' after 214 ms
[00:13:07] Starting 'commit-message-analysis'...
[00:13:07] Generating report file 2010-01-01_2010-06-30_commit-words-data.json
[00:13:07] Open the following link to see the results:
[00:13:07] http://localhost:3000/index.html?reportId=cbd5e3db4ecc7acfb000014f22107ac37e98d785
[00:13:07] Finished 'commit-message-analysis' after 62 ms

The results can then be displayed in a word cloud diagram at the url given above.

Sample diagrams gallery

Hotspot Complexity trend
System evolution Commit messages
Developer coupling Developer network
Developer effort Knowledge map

Upcoming features

In time I'm also planning to add the following analyses in future versions of code-forensics:

  • code fragmentation analysis: to be used together with the current developer effort analysis to see if the fragmentation in your files is healthy or not.
  • code age analysis: another perspective to find out how old and stable the different parts of your codebase actually are.

Of course, if you think there could be any new analysis or feature that could be useful in this tool, you're welcome to open a new issue and even to help directly with the code!

License

Copyright © 2016-2021 Silvio Montanari

code-forensics is free software; you can redistribute it and/or modify it under the terms of the GNU General Public License v3.0 or any later version.

Acknowledgements

code-forensics makes use of Code Maat - Copyright © Adam Tornhill

Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].