Skip to content
This repository has been archived by the owner on Apr 20, 2023. It is now read-only.

Control Repository public/private visibility using a YAML file and CI system

License

Notifications You must be signed in to change notification settings

13rac1/github-repo-visibility-manager

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

5 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Github Repository Visibility Manager

Control Github Repository public/private visibility using a YAML file and your CI (Continuous Integration) system.

Why

Github Enterprise Organizations can restrict members from creating Public repositories or making repositories Public. This project enables Infrastructure/DevOps teams to enable Engineers to make repositories public using git (as the historical record) and a CI system.

Usage

Manual

  1. Set a GITHUB_TOKEN environment variable

  2. Create a repos.yaml containing the following

    organization: ORGANIZATION_NAME
    repos:
      - name: REPOSITORY_NAME
        private: false
  3. Run grvm repos.yaml

CI

//TODO

Why not Terraform

Terraform can maintain the public/private setting of a repository, but it owns the entire repository. The Terraform Github provider is useful in many cases, but overkill in others.