codechecker
CodeChecker is an analyzer tooling, defect database and viewer extension for static and dynamic analyzer tools.
Science Score: 36.0%
This score indicates how likely this project is to be science-related based on various indicators:
-
○CITATION.cff file
-
✓codemeta.json file
Found codemeta.json file -
✓.zenodo.json file
Found .zenodo.json file -
○DOI references
-
○Academic publication links
-
✓Committers with academic emails
1 of 135 committers (0.7%) from academic institutions -
○Institutional organization owner
-
○JOSS paper metadata
-
○Scientific vocabulary similarity
Low similarity (14.7%) to scientific vocabulary
Keywords
Keywords from Contributors
Repository
CodeChecker is an analyzer tooling, defect database and viewer extension for static and dynamic analyzer tools.
Basic Info
- Host: GitHub
- Owner: Ericsson
- License: apache-2.0
- Language: Python
- Default Branch: master
- Homepage: https://codechecker.readthedocs.io
- Size: 42.7 MB
Statistics
- Stars: 2,443
- Watchers: 52
- Forks: 424
- Open Issues: 456
- Releases: 75
Topics
Metadata Files
docs/README.md
CodeChecker
CodeChecker is a static analysis infrastructure built on the LLVM/Clang
Static Analyzer toolchain, replacing
scan-build in a Linux or
macOS (OS X) development environment.

Check out our DEMO showing some analysis results of open-source projects!
Main features
Command line C/C++ Analysis
- Executes Clang-Tidy, Clang Static Analyzer with Cross-Translation Unit analysis, Statistical Analysis (when checkers are available), Cppcheck, GCC Static Analyzer and the Facebook Infer Analyzer.
- Creates the JSON compilation database by wiretapping any build process (e.g.,
CodeChecker log -b "make"). - Automatically analyzes GCC cross-compiled projects: detecting GCC or Clang compiler configuration and forming the corresponding clang analyzer invocations.
- Incremental analysis: Only the changed files and its dependencies need to be reanalyzed.
- False positive suppression with a possibility to add review comments.
- Result visualization in command line or in static HTML.
Web-based report storage
- You can store & visualize thousands of analysis reports of many analyzers like Clang Static Analyzer (C/C++), Clang Tidy (C/C++), Facebook Infer (C/C++, Java), Clang Sanitizers (C/C++), Spotbugs (Java), Pylint (Python), Eslint (Javascript) ... For a complete list see Supported Analyzers
- Web application for viewing discovered code defects with a streamlined, easy experience (with PostgreSQL, or SQLite backend).
- Gerrit and GitLab integration Shows analysis results as GitLab or Gerrit reviews.
- Filterable (defect checker name, severity, source paths, ...) and comparable (calculates difference between two analyses of the project, showing which bugs have been fixed and which are newly introduced) result viewing.
- Diff mode: This shows the list of bugs that have been introduced since your last analyzer execution.
- Results can be shared with fellow developers, the comments and review system helps communication of code defects.
- Easily implementable Thrift-based server-client communication used for storing and querying of discovered defects.
- Support for multiple bug visualization frontends, such as the web application, a command-line tool and an Eclipse plugin.
Command line features
CodeChecker command has many subcommands which can be used for example to
log and analyze your projects, print the results or start a web server. For
full list see the following table or check the help message of this command
(CodeChecker --help):
| CodeChecker subcommand | Description |
|--------------------------|-----------------------------------------------------------------------------------------------|
| analyze | Execute the supported code analyzers for the files recorded in a JSON Compilation Database. |
| analyzer-version | Print the version of CodeChecker analyzer package that is being used. |
| analyzers | List supported and available analyzers. |
| check | Perform analysis on a project and print results to standard output. |
| checkers | List the checkers available for code analysis. |
| cmd | View analysis results on a running server from the command line. |
| fixit | Apply automatic fixes based on the suggestions of the analyzers. |
| log | Run a build command, collect the executed compilation commands and store them in a JSON file. |
| parse | Print analysis summary and results in a human-readable format. |
| server | Start and manage the CodeChecker Web server. |
| store | Save analysis results to a database. |
| version | Print the version of CodeChecker package that is being used. |
| web-version | Print the version of CodeChecker server package that is being used. |
CodeChecker cmd subcommand also has many other subcommands which can be used
to get data (products, runs, results, statistics) from a running CodeChecker
server. For full list see the following table or check the help message of this
subcommand (CodeChecker cmd --help):
| CodeChecker cmd subcommand | Description |
|------------------------------|---------------------------------------------------------------------------------------------------|
| runs | List the available analysis runs. |
| history | Show run history of multiple runs. |
| results | List analysis result (finding) summary for a given run. |
| diff | Compare two analysis runs and show the difference. |
| sum | Show statistics of checkers. |
| token | Access subcommands related to configuring personal access tokens managed by a CodeChecker server. |
| del | Delete analysis runs. |
| update | Update an analysis run. |
| suppress | Manage and import suppressions of reports on a CodeChecker server. |
| products | Access subcommands related to configuring the products managed by a CodeChecker server. |
| components | Access subcommands related to configuring the source components managed by a CodeChecker server. |
| login | Authenticate into CodeChecker servers that require privileges. |
| export | Export comments and review statuses from CodeChecker. |
| import | Import comments and review statuses into CodeChecker. |
Usage flow

- Step 1:
CodeChecker logruns the given build command and records the executed compilation steps. These steps are written to an output file (Compilation Database) in a JSON format. - Step 2:
CodeChecker analyzeuses the previously created JSON Compilation Database to perform an analysis on the project, outputting analysis results in a machine-readable (plist) format. - Step 3: In this step, you can do multiple things:
- Parse and pretty-print the summary and results from analysis result files
(
CodeChecker parse). - Store the results to a running CodeChecker server (
CodeChecker store). - Compare two analysis results/runs to show the results that differ between
the two (
CodeChecker cmd diff). - etc.
- Parse and pretty-print the summary and results from analysis result files
(
For more information how to use CodeChecker see our user guide.
User documentation
C/C++ Analysis
- Analyzer User guide
- Avoiding or suppressing false positives
- Checker and Static Analyzer configuration
- GCC incompatibilities
- Suppressing false positives
Web based report management
- Webserver User Guide
- WEB GUI User Guide
- Command line and WEB UI Feature overview
- Security configuration
- Deployment
- Server Configuration
- Continuous Integration (CI)
- Database Configuration
Storage of reports from analyzer tools
CodeChecker can be used as a generic tool for visualizing analyzer results.
The following tools are supported:
| Language | Analyzer | |----------------|------------------------------------------------------------------------------| | C/C++ | Clang Static Analyzer | | | Clang Tidy | | | Clang Sanitizers | | | Cppcheck | | | Facebook Infer | | | Coccinelle | | | Smatch | | | Kernel-Doc | | | Sparse | | | cpplint | | C# | Roslynator.DotNet.Cli | | Java | SpotBugs | | | Facebook Infer | | Python | Pylint | | | Pyflakes | | JavaScript | ESLint | | TypeScript | TSLint | | Go | Golint | | Markdown | Markdownlint | | | Sphinx |
For details see supported code analyzers documentation and the Report Converter Tool.
Common Tools
Useful tools that can also be used outside CodeChecker.
- Build Logger (to generate JSON Compilation Database from your builds)
- Plist/Sarif to HTML converter (to generate HTML files from the given plist or sarif files)
- Report Converter Tool (to convert analysis results from other analyzers to the codechecker report directory format))
- Translation Unit Collector (to collect source files of a translation unit or to get source files which depend on the given header files)
- Report Hash generator (to generate unique hash identifiers for reports)
Helper Scripts
Install guide
Install CodeChecker via pip
CodeChecker is available on the pypi
and can be installed with the following command:
sh
pip3 install codechecker
Note: this package can be installed on Linux, OSX and Windows
systems where pip3 command is available. On OSX, intercept-build must be
installed for logging (CodeChecker log). On Windows, logging is not
available.
Installing CodeChecker via the snap package manager
CodeChecker is available on the Snap Store
and can be installed with the following command:
sh
sudo snap install codechecker --classic
Note: Unfortunately, the snap package supports only lower-case command names.
For this reason, you need to use codechecker command instead of CodeChecker
everywhere. For a full list of available commands in the codechecker snap
package, run snap info codechecker.
Linux: Build from source
For a detailed dependency list, and for instructions on how to install newer Clang and Clang-Tidy versions, please see Requirements. The following commands are used to bootstrap CodeChecker on Ubuntu 20.04 LTS:
```sh
Install mandatory dependencies for a development and analysis environment.
NOTE: clang or clang-tidy can be any sufficiently fresh version, and need not
come from package manager!
In case of Cppcheck, the minimal supported version is 1.80.
In case of gcc, the minimal supported version is 13.0.0.
Infer: https://fbinfer.com/docs/getting-started
sudo apt-get install clang clang-tidy cppcheck g++ build-essential curl \ gcc-multilib git python3-dev python3-venv python3-setuptools
In case of venv_dev target and Ubuntu 23 Linux, install an additional library:
sudo apt-get install libpq-dev
Install nodejs dependency for web. In case of Debian/Ubuntu you can use the
following commands. For more information see the official docs:
https://nodejs.org/en/download/package-manager/
curl -sL https://deb.nodesource.com/setup_16.x | sudo -E bash - sudo apt-get install -y nodejs
Check out CodeChecker source code.
git clone https://github.com/Ericsson/CodeChecker.git --depth 1 ~/codechecker cd ~/codechecker
Create a Python virtualenv and set it as your environment.
NOTE: if you want to develop CodeChecker, use the venv_dev target instead
of venv.
make venv source $PWD/venv/bin/activate
[Optional] If you want to use external authentication methods (LDAP / PAM)
follow the instructions in
docs/web/authentication.md#external-authentication-methods
Build and install a CodeChecker package.
make package
For ease of access, add the build directory to PATH.
export PATH="$PWD/build/CodeChecker/bin:$PATH"
cd .. ```
Notes:
- By default, make package will build ldlogger shared objects for
32bit and 64bit too. If you would like to build and package 64 bit only
shared objects and ldlogger binary you can set BUILD_LOGGER_64_BIT_ONLY
environment variable to YES before the package build:
BUILD_LOGGER_64_BIT_ONLY=YES make package.
- By default, the make package will build the UI code if it's not built yet
or the UI code is changed. If you wouldn't like to build the UI code you can
set the BUILD_UI_DIST environment variable to NO before the package build:
BUILD_UI_DIST=NO make package.
- Use make standalone_package instead of make package to avoid
having to manually activate the environment before running CodeChecker.
Minimum Recommended package versions
- In production it is recommended to execute CodeChecker with the minimum Python versions: 3.7.14, 3.8.14, 3.9.14, 3.10.6, 3.11.0, otherwise it may be vulnerable to open-redirect attacks. For more info see https://python-security.readthedocs.io/vuln/http-server-redirection.html (CVE-2021-28861).
Upgrading environment after system or Python upgrade
If you have upgraded your system's Python to a newer version (e.g., from
3.8 to 3.11 – this is the case when upgrading Ubuntu from
20.04 LTS to 22.04 LTS), the installed environment will not work
out-of-the-box. To fix this issue, run the following command to upgrade your
checker_env too:
sh
cd ~/codechecker/venv
python3 -m venv .
Mac OS X
For installation instructions for Mac OS X see Mac OS X Installation Guide documentation.
Docker
To run the CodeChecker server in Docker see the Docker documentation. You can find the CodeChecker web-server container at the Docker Hub.

Visual Studio Code plugin

You can install and use CodeChecker VSCode extension from the Visual Studio Marketplace or from Open VSX.
Main features: - Run CodeChecker analysis from the editor and see the results automatically. - Re-analyze the current file when saved. - Commands and build tasks for running CodeChecker as part of a build system. - Browse through the found reports and show the reproduction steps directly in the code. - Navigate between the reproduction steps.

For more information how to install and use this plugin see the repository of this extension.
GitHub Actions CI

CodeChecker can be executed via a reusable GitHub action for your project! You need only specify the build command, as if you would run the analysis locally.
For more information, check out the CodeChecker Static Analysis action on the GitHub Actions Marketplace.
Analyze your first project
Setting up the environment in your Terminal
These steps must always be taken in a new command prompt you wish to execute analysis in.
```sh source ~/codechecker/venv/bin/activate
Path of CodeChecker package
NOTE: SKIP this line if you want to always specify CodeChecker's full path.
export PATH=~/codechecker/build/CodeChecker/bin:$PATH
Path of the built LLVM/Clang
NOTE: SKIP this line if clang is available in your PATH as an installed Linux package.
export PATH=~/
Execute analysis
Analyze your project with the check command:
CodeChecker check -b "cd ~/your-project && make clean && make" -o ./results
check will print an overview of the issues found in your project by the
analyzers. The reports will be stored in the ./results directory in plist
XML format.
Export the reports as static HTML files
You can visualize the results as static HTML by executing
CodeChecker parse -e html ./results -o ./reports_html
An index page will be generated with a list of all repors in
./reports_html/index.html
Optionally store the results in Web server & view the results
If you have hundreds of results, you may want to store them on the web server with a database backend.
Start a CodeChecker web and storage server in another terminal or as a
background process. By default, it will listen on localhost:8001.
The SQLite database containing the reports will be placed in your workspace
directory (~/.codechecker by default), which can be provided via the -w
flag.
CodeChecker server
Store your analysis reports onto the server to be able to use the Web Viewer.
CodeChecker store ./results -n my-project
Open the CodeChecker Web Viewer in your browser, and you should be greeted with a web application showing you the analysis results.
Developer documentations
Conference papers, presentations
- An overview about the CodeChecker infrastructure was given at PLDI 2020.
Márton, Gábor and Krupp, Dániel:
Tool Talk: CodeChecker - A high-level overview about the infrastructure is available amongst the
2015 Euro LLVM Conference presentations.
Krupp, Dániel and Orbán, György and Horváth, Gábor and Babati, Bence:
Industrial Experiences with the Clang Static Analysis Toolset
Owner
- Name: Ericsson
- Login: Ericsson
- Kind: organization
- Email: opensource@ericsson.com
- Website: http://www.ericsson.com
- Repositories: 119
- Profile: https://github.com/Ericsson
Home for Ericsson's Open Source software
GitHub Events
Total
- Fork event: 53
- Create event: 48
- Commit comment event: 1
- Release event: 12
- Issues event: 92
- Watch event: 201
- Delete event: 36
- Member event: 2
- Issue comment event: 188
- Push event: 162
- Pull request review comment event: 260
- Pull request review event: 419
- Pull request event: 324
Last Year
- Fork event: 53
- Create event: 48
- Commit comment event: 1
- Release event: 12
- Issues event: 92
- Watch event: 201
- Delete event: 36
- Member event: 2
- Issue comment event: 188
- Push event: 162
- Pull request review comment event: 260
- Pull request review event: 419
- Pull request event: 324
Committers
Last synced: 9 months ago
Top Committers
| Name | Commits | |
|---|---|---|
| Márton Csordás | c****2@g****m | 1,479 |
| Gyorgy Orban | g****n@e****m | 613 |
| bruntib | b****b@g****m | 444 |
| Whisperity | w****y@g****m | 234 |
| Daniel Krupp | d****p@e****m | 131 |
| Kristóf Umann | d****s@g****m | 118 |
| vodorok | g****s@e****m | 76 |
| Boldizsar Toth | b****h@e****m | 72 |
| Gabor Horvath | x****n@g****m | 56 |
| Sylvestre Ledru | s****e@d****g | 53 |
| Alex Gábor Ispánovics | g****s@e****m | 52 |
| Gabor Horvath | g****h@e****m | 46 |
| Endre Fülöp | e****p@s****m | 40 |
| Jay Rajput | j****t@g****m | 37 |
| Tibor Cservák | t****7@g****m | 32 |
| dependabot[bot] | 4****] | 29 |
| Gabor Marton | g****n@e****m | 29 |
| Brunner Tibor | b****b@c****u | 24 |
| Samat Tamerlan | v****p@i****u | 19 |
| Nora Zinaeddin | n****n@s****e | 18 |
| Balazs Benics | b****s@s****e | 18 |
| Maksud Baghirov | x****t@i****u | 15 |
| Gyorgy Orban | o****y@g****m | 13 |
| Endre Fülöp | e****p@s****e | 13 |
| Dimitrios Apostolou | j****s@q****o | 12 |
| ebagfey | f****v@e****m | 11 |
| Zinovy Nis | z****s@y****u | 11 |
| Valerii Filatov | v****f@y****u | 11 |
| Discookie | m****7@f****u | 10 |
| zomen2 | 3****2 | 10 |
| and 105 more... | ||
Committer Domains (Top 20 + Academic)
Issues and Pull Requests
Last synced: 6 months ago
All Time
- Total issues: 288
- Total pull requests: 715
- Average time to close issues: 10 months
- Average time to close pull requests: about 1 month
- Total issue authors: 117
- Total pull request authors: 72
- Average comments per issue: 1.54
- Average comments per pull request: 0.68
- Merged pull requests: 476
- Bot issues: 1
- Bot pull requests: 70
Past Year
- Issues: 81
- Pull requests: 335
- Average time to close issues: about 2 months
- Average time to close pull requests: 14 days
- Issue authors: 50
- Pull request authors: 35
- Average comments per issue: 0.6
- Average comments per pull request: 0.39
- Merged pull requests: 191
- Bot issues: 1
- Bot pull requests: 31
Top Authors
Issue Authors
- whisperity (41)
- dkrupp (38)
- vodorok (20)
- csordasmarton (8)
- gamesh411 (7)
- Szelethus (6)
- RobertoFioravanti (5)
- pdgendt (5)
- bruntib (5)
- geeksmith (5)
- Discookie (4)
- jimis (4)
- amai2012 (4)
- gyorb (3)
- dilyanpalauzov (3)
Pull Request Authors
- bruntib (186)
- dependabot[bot] (79)
- Szelethus (72)
- vodorok (55)
- dkrupp (54)
- cservakt (53)
- whisperity (47)
- noraz31 (44)
- gamesh411 (41)
- gulyasgergely902 (38)
- Discookie (18)
- feyruzb (18)
- irishrover (10)
- csordasmarton (8)
- jstevens176 (8)
Top Labels
Issue Labels
Pull Request Labels
Packages
- Total packages: 8
-
Total downloads:
- pypi 26,853 last-month
- npm 274 last-month
- Total docker downloads: 153
-
Total dependent packages: 2
(may contain duplicates) -
Total dependent repositories: 12
(may contain duplicates) - Total versions: 417
- Total maintainers: 4
- Total advisories: 6
pypi.org: codechecker
CodeChecker is an analyzer tooling, defect database and viewer extension
- Homepage: https://github.com/Ericsson/CodeChecker
- Documentation: http://codechecker.readthedocs.io
- License: Apache-2.0 WITH LLVM-exception
-
Latest release: 6.26.1
published 7 months ago
Rankings
Maintainers (3)
Advisories (6)
- CodeChecker has a Path traversal in `CodeChecker server` in the endpoint of `CodeChecker store`
- CodeChecker open redirect when URL contains multiple slashes after the product name
- codechecker vulnerable to authentication bypass when using specifically crafted URLs
- Cross-Site Request Forgery in CodeChecker API
- codechecker authentication method confusion vulnerability allows logging in as the built-in root user from an external service
- Cross-site Scripting in Ericsson CodeChecker
proxy.golang.org: github.com/ericsson/codechecker
- Homepage: https://github.com/ericsson/codechecker
- Documentation: https://pkg.go.dev/github.com/ericsson/codechecker#section-documentation
- License: Apache-2.0
-
Latest release: v6.26.1+incompatible
published 8 months ago
Rankings
proxy.golang.org: github.com/Ericsson/codechecker
- Homepage: https://github.com/Ericsson/codechecker
- Documentation: https://pkg.go.dev/github.com/Ericsson/codechecker#section-documentation
- License: Apache-2.0
-
Latest release: v6.26.1+incompatible
published 8 months ago
Rankings
npmjs.org: codechecker-api
Generated node.js compatible API stubs for CodeChecker server.
- Homepage: https://github.com/Ericsson/codechecker
- License: SEE LICENSE IN LICENSE
-
Latest release: 6.39.0
published about 5 years ago
Rankings
Maintainers (4)
pypi.org: codechecker-api
Generated Python compatible API stubs for CodeChecker.
- Homepage: https://github.com/Ericsson/codechecker
- Documentation: https://codechecker-api.readthedocs.io/
- License: apache-2.0
-
Latest release: 6.39.0
published about 5 years ago
Rankings
Maintainers (3)
pypi.org: codechecker-api-shared
Shared API stub types package for the CodeChecker API.
- Homepage: https://github.com/Ericsson/codechecker
- Documentation: https://codechecker-api-shared.readthedocs.io/
- License: apache-2.0
-
Latest release: 6.39.0
published about 5 years ago
Rankings
Maintainers (3)
npmjs.org: codechecker-api-js
Generated jQuery compatible API stubs for CodeChecker server.
- Homepage: https://github.com/Ericsson/codechecker
- License: SEE LICENSE IN LICENSE
-
Latest release: 6.39.0
published about 5 years ago
Rankings
Maintainers (4)
conda-forge.org: codechecker
- Homepage: https://github.com/Ericsson/CodeChecker
- License: Apache-2.0 WITH LLVM-exception
-
Latest release: 6.18.1
published about 4 years ago
Rankings
Dependencies
- actions/checkout v3 composite
- actions/setup-python v4 composite
- actions/checkout v2 composite
- docker/build-push-action v2 composite
- docker/login-action v1 composite
- docker/setup-buildx-action v1 composite
- actions/checkout v2 composite
- actions/download-artifact master composite
- actions/setup-node v1 composite
- actions/setup-python v4 composite
- actions/upload-artifact master composite
- pypa/gh-action-pypi-publish release/v1 composite
- actions/checkout v2 composite
- snapcore/action-build v1 composite
- snapcore/action-publish v1 composite
- abhinavsingh/setup-bazel v3 composite
- actions/checkout v2 composite
- actions/setup-node v1 composite
- actions/setup-python v4 composite
- postgres * docker
- python 3.9.7-slim-buster build
- codechecker/codechecker-web latest
- postgres 12.2-alpine
- codechecker/codechecker-web latest
- postgres 12.2-alpine
- codechecker/codechecker-web latest
- codechecker/codechecker-web latest
- nginx 1.17.10-alpine
- postgres 12.2-alpine
- thrift 0.13.0-hotfix.1
- 1066 dependencies
- @babel/cli ^7.16.8 development
- @babel/core ^7.16.7 development
- @babel/preset-env ^7.16.8 development
- @types/jest ^27.4.0 development
- @vue/test-utils ^1.3.0 development
- @vue/vue2-jest ^28.0.0 development
- babel-core ^7.0.0-bridge.0 development
- babel-eslint ^10.1.0 development
- babel-jest ^28.1.1 development
- babel-loader ^8.2.3 development
- buffer ^6.0.3 development
- copy-webpack-plugin ^10.2.0 development
- core-js ^3.20.3 development
- cross-env ^7.0.3 development
- css-loader ^6.5.1 development
- deepmerge ^4.2.2 development
- eslint ^8.7.0 development
- eslint-plugin-vue ^8.3.0 development
- eslint-webpack-plugin ^3.1.1 development
- file-loader ^6.2.0 development
- geckodriver ^3.0.1 development
- html-webpack-plugin ^5.5.0 development
- http-server ^14.1.0 development
- jest ^28.1.1 development
- nightwatch ^1.7.13 development
- raw-loader ^4.0.2 development
- regenerator-runtime ^0.13.9 development
- rimraf ^3.0.2 development
- sass ~1.32.13 development
- sass-loader ^12.4.0 development
- selenium-server ^3.141.59 development
- start-server-and-test ^1.14.0 development
- util ^0.12.4 development
- vue-loader ^15.9.8 development
- vue-style-loader ^4.1.3 development
- vue-template-compiler ^2.6.14 development
- vuetify-loader ^1.7.3 development
- webpack ^5.76.0 development
- webpack-cli ^4.9.1 development
- webpack-dev-server ^4.7.3 development
- webpack-merge ^5.8.0 development
- @mdi/font ^6.5.95
- chart.js ^2.9.4
- chartjs-plugin-datalabels ^0.7.0
- codechecker-api file:../../api/js/codechecker-api-node/dist/codechecker-api-6.53.0.tgz
- codemirror ^5.65.0
- date-fns ^2.28.0
- js-cookie ^3.0.1
- jsplumb ^2.15.6
- lodash ^4.17.21
- marked ^4.0.10
- splitpanes ^2.3.8
- vue ^2.6.14
- vue-chartjs ^3.5.1
- vue-router ^3.5.3
- vuetify ^2.6.10
- vuex ^3.6.2
- PyYAML ==6.0.1
- lxml ==4.9.2
- mypy_extensions ==0.4.3
- portalocker ==2.2.1
- psutil ==5.8.0
- PyYAML ==6.0.1 development
- coverage ==5.5.0 development
- lxml ==4.9.2 development
- mkdocs ==1.2.3 development
- mypy_extensions ==0.4.3 development
- portalocker ==2.2.1 development
- psutil ==5.8.0 development
- pycodestyle ==2.7.0 development
- pylint ==2.8.2 development
- pytest ==7.3.1 development
- PyYAML ==6.0.1
- lxml ==4.9.2
- mypy_extensions ==0.4.3
- portalocker ==2.2.1
- psutil ==5.8.0
- scan-build ==2.0.19
- pycodestyle ==2.4.0 development
- pylint ==2.8.2 development
- pytest ==7.3.1 development
- pycodestyle ==2.4.0 development
- pylint ==2.8.2 development
- pytest ==7.3.1 development
- pycodestyle ==2.4.0 development
- pylint ==2.8.2 development
- pytest ==7.3.1 development
- PyYAML ==6.0.1 development
- coverage ==5.5.0 development
- mypy ==0.812 development
- mypy_extensions ==0.4.3 development
- portalocker ==2.2.1 development
- mkdocs ==1.2.3
- mypy ==0.812 development
- mypy_extensions ==0.4.3 development
- pycodestyle ==2.7.0 development
- pylint ==2.8.2 development
- pytest ==7.3.1 development
- mypy ==0.812 development
- mypy_extensions ==0.4.3 development
- portalocker ==2.2.1 development
- pycodestyle ==2.7.0 development
- pylint ==2.8.2 development
- pytest ==7.3.1 development
- mypy ==0.812 development
- mypy_extensions ==0.4.3 development
- pycodestyle ==2.7.0 development
- pylint ==2.8.2 development
- pytest ==7.3.1 development
- thrift ==0.13.0
- PyYAML ==6.0.1
- alembic ==1.5.5
- gitpython ==3.1.34
- lxml ==4.9.2
- mypy_extensions ==0.4.3
- portalocker ==2.2.1
- psutil ==5.8.0
- sqlalchemy ==1.3.23
- thrift ==0.13.0
- python-ldap ==3.4.0
- python-pam ==1.8.4
- alembic ==1.5.5
- lxml ==4.9.2
- pg8000 ==1.15.2
- portalocker ==2.2.1
- psutil ==5.8.0
- sqlalchemy ==1.3.23
- alembic ==1.5.5
- lxml ==4.9.2
- portalocker ==2.2.1
- psutil ==5.8.0
- psycopg2-binary ==2.8.6
- sqlalchemy ==1.3.23
- alembic ==1.5.5 development
- coverage ==5.5.0 development
- cryptography ==41.0.4 development
- gitpython ==3.1.34 development
- lxml ==4.9.2 development
- mkdocs ==1.2.3 development
- mypy_extensions ==0.4.3 development
- pg8000 ==1.15.2 development
- portalocker ==2.2.1 development
- psutil ==5.8.0 development
- psycopg2-binary ==2.8.6 development
- pycodestyle ==2.7.0 development
- pylint ==2.8.2 development
- pytest ==7.3.1 development
- sqlalchemy ==1.3.23 development
- thrift ==0.13.0 development
- twine * development
- alembic ==1.5.5
- lxml ==4.9.2
- mypy_extensions ==0.4.3
- portalocker ==2.2.1
- psutil ==5.8.0
- sqlalchemy ==1.3.23
- thrift ==0.13.0