Home Products Ramp up code analysis: introducing on-demand buttons

Ramp up code analysis: introducing on-demand buttons

Author

Date

Category

Weโ€™re excited to give you full control over Codacy code analysis.

Starting today, you can take charge of when Codacy analyzes commits and pull requests.

Once Codacy analyzes a commit, you can now issue a Reanalysis. This is useful as you might want to ignore files or to apply new code analysis patterns to your project.

Example of how you can reanalyse a commit

Pull requests also get this button, so you can reanalyse a pull request under review

Example of how you can reanalyse a pull request under review

You can also analyze commits that Codacy hasnโ€™t yet picked up. This is useful in case you have older commits that Codacy is working his way through but you want to have insights faster:

Example of how you can analyse older commits as well

Donโ€™t hesitate to share your feedback with us!


Edit: We just published an ebook: โ€œThe Ultimate Guide to Code Reviewโ€ based on a survey of 680+ developers. Enjoy!


About Codacy

Codacy is used by thousands of developers to analyze billions of lines of code every day!

Getting started is easy โ€“ and free! Just use your  GitHub, Bitbucket or Google account to sign up.

GET STARTED

LEAVE A REPLY

Please enter your comment!
Please enter your name here

Subscribe to our newsletter

To be updated with all the latest news, offers and special announcements.

Recent posts

How does code quality fit into your CI/CD pipeline?

Continuous Integration and Continuous Deployment (CI/CD) are key for organizations wanting to deliver software at scale. CI/CD allows developers to automate...

How Stim uses Codacy to achieve high-quality code

We spoke with Tobias Sjรถsten, Head of Software Engineering at Stim, about how Codacy helps them guarantee code quality and standardization...

6 things developers should do to ship more secure code

Writing better, more secure source code is fundamental to prevent potential exploits and attacks that could undermine your software applications. However,...

Best practices for security code reviews

In today's interconnected world, where data breaches and cyber threats are increasingly common, one of your top priorities should be to...

April Product Update ๐Ÿš€

Hi there ๐Ÿ‘‹ It's been a whirlwind month, and we have big news to share: