Settings

Theme

Show HN: GitHub Org Audit Tool

github.com

57 points by benfrancom 3 years ago · 23 comments · 1 min read

Reader

This is a tool for auditing github organizations including their repos, users, and teams. It is useful for compliance, security and auditing.

megamorf 3 years ago

Unfortunately, it leaves a lot to be desired. I've actually had to do a fair bit of GH access reporting myself recently and I can recommend the GraphQL API as it allows you to properly list direct and indirect permissions on repositories (org + team + direct collaborator) that are alot harder to do with the REST API due to its inconsistent permissions model.

  • LukeShu 3 years ago

    IME, the problem with the GraphQL API is that it does a poor job of indicating where permissions came from, and you have to fall back to bad heuristics.

    For example, if team="company" has "READ", and team="company/dev" has "WRITE", and Bob is in team="company/dev" but not team="company", then Bob will have both "READ" and "WRITE" because of his membership in team="company/dev"; the API will give no indication that the "READ" indirectly came from team="company".

    Also, the permissions that the PAT needs in order for GraphQL to even list those things is excessive.

    Anyway, here's my audit script for such things: https://github.com/datawire/collaborators

    • megamorf 3 years ago

      That's actually incorrect. Check out this query: https://gist.github.com/megamorf/9c105ac9cc13a93b5449a7b683d...

      I have added two output examples. One for when you only want to find users that have been directly assigned to a repo (DIRECT) and one that shows how their roles and team memberships decide what permissions they have on a repo.

    • sigio 3 years ago

      Having write already implies that you have read, it't not something related to being in a team with read, it's just that write always gives you read. The permission levels are pull(read), triage(read+issues/pr's), push(read+write), maintain, and admin

      • LukeShu 3 years ago

        > Having write already implies that you have read

        Yes, but if it's just being implied then it won't list "READ" separately in the "permissionSources", it will just list "WRITE".

  • pquerna 3 years ago

    i've also been working on a similar tool -- working towards open sourcing it too. would you be interested in taking a look? paul.quenra at conductorone com

    • kataklasm 3 years ago

      I believe you might have a typo in your mail? Just making sure you're not missing out on something useful :)

      • pquerna 3 years ago

        thank you -- can't edit it anymore, but paul.querna (spelled my own name wrong)

  • benfrancomOP 3 years ago

    Nice, do you have anything you can share?

candiddevmike 3 years ago

Why audit when you can declare all of this in Terraform? https://registry.terraform.io/providers/integrations/github/...

  • gtirloni 3 years ago

    Terraform doesn't know what it doesn't know. It only cares about stuff you defined in code and ignores all the rest. You can't use it for auditing purposes, except in its narrow scope.

  • coenhyde 3 years ago

    As much a fan of Terraform I am. If you didn't started defining your repos in Terraform from day 0, importing hundreds of repos, members, permission sets would be quite a lot more work than running this audit tool.

  • nikolay 3 years ago

    I use that provider - it's one of the buggiest Terraform providers ever!

maartenh 3 years ago

Awesome! I built something like this for $JOB-1 too. Unfortunately didn't get to open source this before I left.

I built in an a mechanism for policy checks too, e.g. to check that only an allowed list of repositories was public, and that permissions were only assigned through teams.

atonse 3 years ago

How about using steampipe for this?

serge1978 3 years ago

This is super helpful!

Keyboard Shortcuts

j
Next item
k
Previous item
o / Enter
Open selected item
?
Show this help
Esc
Close modal / clear selection