Script to check a GitHub org for commits without a DCO signoff that should have one.
Project description
DCO org check
Script to check a GitHub org for commits without a DCO signoff that should have one.
Loads config file ( defaults to dco_org_check.yaml, or specify at the command line after -c ) for credentials
Config file options ( set argument is the default if not specified )
# GitHub access token ( required )
token:
# Github org name ( required )
org:
# name of csvfile
csvfile: dco_issues.csv
# list of directory names where previous commit signoffs are in the repo
dco_signoffs_directories:
- dco-signoffs
# set to 1 if you want to have the script create the previous commits signoff files
create_prior_commits_file: 1
# directory where to store the prior commits files
create_prior_commits_dir: dco-signoffs
# list of repos to ignore when scanning
ignore_repos:
- repo1
- repo2
- ...
# list of repos to only look at when scanning
only_repos:
- repo1
- repo2
- ...
Useful tools to make doing DCO signoffs easier
There are a number of great tools out there to manage DCO signoffs for developers to make it much easier to do signoffs.
- DCO command line tool, which let's you do a single signoff for an entire repo ( https://github.com/coderanger/dco )
- GitHub UI integrations for adding the signoff automatically ( https://github.com/scottrigby/dco-gh-ui )
SPDX-License-Identifier: Apache-2.0
Project details
Release history Release notifications | RSS feed
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
dco-org-check-0.2.tar.gz
(3.6 kB
view hashes)
Built Distribution
Close
Hashes for dco_org_check-0.2-py3-none-any.whl
Algorithm | Hash digest | |
---|---|---|
SHA256 | ee525c0705756bf243ae456ecb9af7344db3c9afa00d619ba12f11efd0111f62 |
|
MD5 | 7152f2c244cfcb41fff2a426ffedd456 |
|
BLAKE2b-256 | f39e522fa800eb736c2559d8c12fb518e36f2a4353fe676b27062dbdf4ba67fa |