GitHub.com Unpermitted Sized Repositories
What it does
This Policy Template gets all the repositories under GitHub.com Organization(s) and creates an incident if any are smaller than the minimum repo size and older than the minimium repo age set by the policy.
- GitHub.com Organizations to check - Example:
- Minimum Repo Age in days - Example:
- Minimum Repo Size in bytes - Example:
- Email address to send escalation emails to - Example:
The following policy actions are taken on any resources found to be out of compliance.
- Send an email report
This policy requires permissions to access GitHub.com API as the Owner of the Organization(s). Before applying this policy, create a GitHub.com Personal Access Token under the user with Owner role -- adding the
repo scopes at minimum, and save the token in the project on Cloud Management as credential named
GITHUB_ORG_ADMIN_ACCESS_TOKEN. If you are using other Governance Policies for GitHub.com, you may need to include additional roles to sate the need of all policies which use the same credential. Optionally, you can generate a token with full permission and avoid any issues.
This policy requires permissions to access RightScale resources (credentials). Before applying this policy add the following roles to the user applying the policy. For more information on modifying roles visit the Governance Docs
- Cloud Management - credential_viewer or admin
- Cloud Management - observer
This Policy Template does not launch any instances, and so does not incur any cloud costs.