turbot / steampipe-mod-github-compliance

Run individual controls or full compliance benchmarks for across all of your GitHub resources using Powerpipe and Steampipe.
https://hub.powerpipe.io/mods/turbot/github_compliance
Apache License 2.0
8 stars 1 forks source link

provide a way to scope the repos checked #9

Closed judell closed 1 year ago

judell commented 2 years ago

If you have many repos (perhaps across multiple orgs), this mod becomes unwieldy and likely to hit API limits. The same is true for github-sherlock. Both would benefit from a variable that holds a pattern to regex-match against the repo full_name, e.g. repo_pattern="steampipe-(mod|plugin)"

judell commented 2 years ago

One approach to that: https://github.com/turbot/steampipe-mod-github-compliance/compare/use-repo-pattern?expand=1

A limitation: The list of trusted_repo_admins is the same for repos in all orgs, but should really vary on a per-org basis. For example I'd want to trust robertknight for hypothesis/h but not for turbot/steampipe.

judell commented 2 years ago

See also: https://github.com/turbot/steampipe-mod-github-compliance/issues/10

github-actions[bot] commented 1 year ago

'This issue is stale because it has been open 60 days with no activity. Remove stale label or comment or this will be closed in 30 days.'

github-actions[bot] commented 1 year ago

'This issue was closed because it has been stalled for 90 days with no activity.'