0.2.8 • Published 1 month ago

@soos-io/soos-scm-audit v0.2.8

Weekly downloads
-
License
MIT
Repository
github
Last release
1 month ago

SOOS

The SOOS SCM Audit script should be used to determine the number of contributing developers in your organization.

SOOS Badge Status

Dependency Vulnerabilities Out Of Date Dependencies

Requirements

Installation

run npm install --prefix ./soos @soos-io/soos-scm-audit

Configure and Run the Script

NOTE: you can find values for the --apiKey and --clientId at app.soos.io.

For GitHub

  1. Generate a GitHub Public Access Token (PAT) for your organization and ensure that it has the full repo permission set. image

  2. Plug in the values for --apiKey, --clientId, --secret, and --organizationName and run the script.

  3. Run node ./soos/node_modules/@soos-io/soos-scm-audit/bin/index.js --apiKey=<API_KEY> --clientId=<CLIENT_ID> --scmType=GitHub --secret=<GITHUB_PAT> --organizationName="<GITHUB_ORG_NAME>"

For Bitbucket Cloud

  1. Generate an App Password for your organization and ensure that it has the Read Repositories permission set. image
  1. Plug in the values for --apiKey, --clientId, --secret, and --workspace, and --username and run the script.

  2. Run node ./soos/node_modules/@soos-io/soos-scm-audit/bin/index.js --apiKey=<API_KEY> --clientId=<CLIENT_ID> --scmType=BitbucketCloud --secret=<APP_PASSWORD> --workspace="<BITBUCKET_WORKSPACE>" --username="<BITBUCKET_USERNAME>"

Parameters

General ParametersDefaultDescription
--apiKeySOOS API Key - get yours from SOOS Integration.
--clientIdSOOS Client ID - get yours from SOOS Integration.
--logLevelMinimum level to show logs: DEBUG, INFO, WARN, FAIL, ERROR.
--resultsFormatResults format: TXT or JSON
--scmTypeScm Type to use for the audit. Options: GitHub, BitBucketCloud
BitBucket Cloud ParametersDefaultDescription
--usernameUsername where the App password was generated for BitBucketCloud.
--secretSecret to use for API calls. It should be a App Password
--workspaceWorkspace name to run audit for BitBucketCloud.
GitHub ParametersDefaultDescription
--organizationNameOrganization name to run audit for GitHub.
--secretSecret to use for API calls. It should be a classic GPAT that has access to all repositories for the organization
0.2.1-pre.2

4 months ago

0.2.0-pre.1

4 months ago

0.2.1-pre.1

4 months ago

0.2.1-pre.4

4 months ago

0.2.1-pre.3

4 months ago

0.2.0-pre.4

4 months ago

0.2.0-pre.3

4 months ago

0.2.0-pre.2

4 months ago

0.2.7-pre.1

2 months ago

0.2.1

4 months ago

0.1.1

5 months ago

0.2.7

2 months ago

0.2.6

2 months ago

0.2.8

1 month ago

0.2.3

3 months ago

0.1.4

4 months ago

0.2.2

3 months ago

0.1.3

5 months ago

0.2.5

2 months ago

0.2.4

2 months ago

0.0.7

1 year ago

0.0.7-pre.1

1 year ago

0.0.5-pre.1

1 year ago

0.0.4

1 year ago

0.0.3

1 year ago

0.0.2

1 year ago

0.0.1

1 year ago