v0.4.3
-----BEGIN PGP SIGNATURE-----
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=ko5o
-----END PGP SIGNATURE-----
Bump version to v0.4.3

Signed-off-by: Jess Frazelle <acidburn@microsoft.com>
2 files changed
tree: 8f7838568d5d6366b124491f9cceed0ec7cffd49
  1. .gitignore
  2. .travis.yml
  3. Dockerfile
  4. Gopkg.lock
  5. Gopkg.toml
  6. LICENSE
  7. Makefile
  8. README.md
  9. VERSION.txt
  10. main.go
  11. vendor/
  12. version/
README.md

audit

Travis CI

For checking what collaborators, hooks, deploy keys, and protected branches you have added on all your GitHub repositories. This also scans all an organization's repos you have permission to view. Because nobody has enough RAM in their brain to remember this stuff for 100+ repos.

Check out genuinetools/pepper for setting all your GitHub repo's master branches to be protected. Pepper even has settings for organizations and a dry-run flag for the paranoid.

Installation

Binaries

Via Go

$ go get github.com/genuinetools/audit

Usage

$ audit -h
                 _ _ _
  __ _ _   _  __| (_) |_
 / _` | | | |/ _` | | __|
| (_| | |_| | (_| | | |_
 \__,_|\__,_|\__,_|_|\__|

 Auditing what collaborators, hooks, and deploy keys you have added on all your GitHub repositories.
 Version: v0.4.3
 Build: a55701b

  -d    run in debug mode
  -owner
        only audit repos the token owner owns
  -repo string
        specific repo to test (e.g. 'genuinetools/audit')
  -token string
        GitHub API token (or env var GITHUB_TOKEN)
  -v    print version and exit (shorthand)
  -version
        print version and exit
$ audit --token 12345
genuinetools/apk-file ->
        Hooks (1):
                travis - active:true (https://api.github.com/repos/genuinetools/apk-file/hooks/8426605)
        Protected Branches (1): master
--

genuinetools/apparmor-docs ->
        Keys (1):
                jenkins - ro:false (https://api.github.com/repos/genuinetools/apparmor-docs/keys/18549738)
        Unprotected Branches (1): master
--

genuinetools/bane ->
        Hooks (1):
                travis - active:true (https://api.github.com/repos/genuinetools/bane/hooks/6178025)
        Protected Branches (1): master
--

genuinetools/battery ->
        Hooks (1):
                travis - active:true (https://api.github.com/repos/genuinetools/battery/hooks/8388640)
        Protected Branches (1): master
        Unprotected Branches (1): WIP
--

genuinetools/irssi ->
	Collaborators (3): tianon, genuinetools, docker-library-bot
	Hooks (1):
		docker - active:true (https://api.github.com/repos/genuinetools/irssi/hooks/3918042)
	Protected Branches (1): master
--