You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
fortSphere is a CLI tool designed to help you manage and fortify your digital sphere by applying various policies to your GitHub organization(s) and repositories.
29
-
30
-
## Demo
31
-
32
-
### Scenario: While the Setup is fine using `restrictRepoCreationGitHub`
33
-
34
-
**GitHub UI (before)**
35
-

36
-
37
-
**fortSphere run and logs**
38
-

9
+
**fortSphere** is a community-driven, open-source CLI tool crafted with love by maintainers for maintainers. It empowers you to secure and streamline your GitHub organizations and repositories, ensuring you’re always in control. Built with a secure-by-default philosophy, fortSphere guarantees that:
10
+
-**Your Tokens and Data Stay Local:** All operations are performed locally—your sensitive information never leaves your machine.
11
+
-**No Blind Trust Required:** As an open-source project, you don’t need to trust others—just the transparent and collaborative efforts of its contributors.
39
12
40
13
---
41
14
42
-
### Scenario: When the setup requires changes using `restrictRepoCreationGitHub`
43
-
44
-
**GitHub UI (before)**
45
-

46
-
47
-
**fortSphere run and logs**
48
-

To run this application, you need a GitHub token with `admin:write` permissions.
118
-
119
-
#### Injecting the Token
120
-
121
-
- Use an environment variable named `GITHUB_TOKEN` to supply the token.
122
-
- Alternatively, you can use a `.env` file and load it with the command`node --env-file=.env fortsphere.js policy --apply <policy> --github-org <githubOrg>` when doing local development
123
-
- While using docker images you can use `docker run --rm -e GITHUB_TOKEN=mytoken ghcr.io/openpathfinder/fortsphere:latest policy --apply <policy> --github-org <githubOrg>`
124
-
125
-
## Policies
126
-
127
-
fortSphere includes the following policies:
128
-
129
-
- **restrictRepoCreationGitHub**: This policy is designed to prevent members of a GitHub organization from creating new repositories. This includes public and private repositories. This policy will set the following values for the organization(`members_allowed_repository_creation_type=none`, `members_can_create_public_repositories=false`, `members_can_create_private_repositories=false`) at the organization level.
130
-
131
-
## Contributing
132
-
133
-
Contributions are welcome! Please read the contributing guidelines first.
15
+
## Key Features:
16
+
17
+
-**Centralized Policy Management:** Apply security and operational policies across all your GitHub organizations with one command.
18
+
-**Real-Time Checks and Updates:** Detect non-compliant configurations and resolve them automatically.
19
+
-**Customizable Policies:** Choose from a suite of predefined policies or create your own.
0 commit comments