Script to check a GitHub org for commits without a DCO signoff that should have one.
Project description
Script to check a GitHub org for commits without a DCO signoff that should have one.
Loads config file ( defaults to dco_org_check.yaml, or specify at the command line after -c ) for credentials
Config file options ( set argument is the default if not specified )
# GitHub access token ( required )
token:
# Github org name ( required )
org:
# name of csvfile
csvfile: dco_issues.csv
# directory where previous commit signoffs are in the repo
dco_signoffs_directory: dco-signoffs
# set to 1 if you want to have the script create the previous commits signoff files
create_prior_commits_file: 1
# directory where to store the prior commits files
create_prior_commits_dir: dco-signoffs
# list of repos to ignore when scanning
ignore_repos:
- repo1
- repo2
- ...
# list of repos to only look at when scanning
only_repos:
- repo1
- repo2
- ...
SPDX-License-Identifier: Apache-2.0
Project details
Release history Release notifications | RSS feed
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distributions
No source distribution files available for this release.See tutorial on generating distribution archives.
Built Distribution
Close
Hashes for dco_org_check-0.1-py3-none-any.whl
Algorithm | Hash digest | |
---|---|---|
SHA256 | ab6425b60c9a942d8e8fb04315813569331aa01f63148d39205b134e032c375c |
|
MD5 | c3d27059f30cb641af1e24d50a4e8e13 |
|
BLAKE2b-256 | 53b30c145a83f41706645d9d8ce81cf1a64dac90b4de609d0a6da40bc609e750 |