cdjg35 / reposaur

Audit your GitHub data using custom policies written in Rego

Geek Repo:Geek Repo

Github PK Tool:Github PK Tool

Reposaur

Go Reference Go Report Card Tests

Audit your GitHub data using custom policies written in Rego.

Reposaur allows users and organizations to execute policies against GitHub data to generate reports, perform auditing and more. The end-goal is to make it easy to perform such tasks in an automated way, enabling people to focus their time in solving any issues instead of looking for them (see the examples).

⚠️ While version v1.0.0 is not released, consider the API to be unstable. The CLI and its output will most probably not change much, except for the fact that it might get a test command before the first stable release.

Features

  • Write custom policies using Rego policy language (see more)
  • Simple, composable and easy-to-use CLI (see more)
  • Extendable using the Go SDK
  • Output reports in JSON and SARIF formats
  • Use in GitHub Actions (see more)
  • Policies unit testing (possible with opa test if not using built-in functions) (see reposaur#1)
  • Deploy as a GitHub App (possible but no official guide yet) (see reposaur#2)

Installation

Using Script

$ curl -o- https://raw.githubusercontent.com/reposaur/reposaur/main/install.sh | bash

Using Go

$ go install github.com/reposaur/reposaur

Guides

Usage

$ reposaur --help
Executes a set of Rego policies against the data provided

Usage:
  reposaur [flags]

Flags:
  -f, --format string      report output format (one of 'json' and 'sarif') (default "sarif")
  -h, --help               help for reposaur
  -n, --namespace string   use this namespace
  -p, --policy strings     set the path to a policy or directory of policies (default [./policy])

Examples

The following examples assume we're running Reposaur in a directory with the following policies inside ./policy directory. If you're looking for more examples of policies check the reposaur/policy repository.

./policy/repository.go

package repository

# METADATA
# title: Repository description is empty
# description: >
#   It's important that repositoryies have a short but
#   meaningful description. A description helps other people
#   finding the repository more easily and understanding what
#   the repository is all about.
warn_description_empty {
	input.description == null
}

./policy/pull_request.go

package pull_request

# METADATA
# title: Pull Request title is malformed
# description: Pull Request titles must follow [Conventional Commits](https://www.conventionalcommits.org) guidelines.
warn_title_malformed {
	not regex.match("(?i)^(\\w+)(\\(.*\\))?:.*", input.title)
}

./policy/organization.go

package organization

# METADATA
# title: Organization has 2FA requirement disabled
# description: Organization doesn't require members to have 2FA enabled
warn_two_factor_requirement_disabled {
	input.two_factor_requirement_enabled == false
}

Executing the policies against a single repository

$ gh api /repos/reposaur/reposaur | reposaur
# { ... }

Executing the policies against every repository in an organization

$ gh api /orgs/reposaur/repos --paginate | jq -s add | reposaur
# [{ ... }, ...]

Executing the policies against an organization

$ gh api /orgs/reposaur | reposaur
# { ... }

Uploading a SARIF report to GitHub

$ report=$(gh api /repos/reposaur/reposaur | reposaur | gzip | base64)

$ gh api /repos/reposaur/reposaur/code-scanning/sarifs \
    -f sarif="$report" \
    -f commit_sha="..." \
    -f ref="..."

Uploading a SARIF report for multiple repositories

$ gh api /orgs/reposaur/repos --paginate \
  | reposaur \
  | jq -r '.[] | @base64' \
  | {
    while read r; do
      _r() {
        echo ${r} | base64 -d | jq -r ${1}
      }

      owner=$(_r '.runs[0].properties.owner')
      repo=$(_r '.runs[0].properties.repo')
      branch=$(_r '.runs[0].properties.default_branch')
      commit_sha=$(gh api "/repos/$owner/$repo/branches/$branch" | jq -r '.commit.sha')

      gh api /repos/reposaur/reposaur/code-scanning/sarifs \
        -f sarif="$(_r '.' | gzip | base64)" \
        -f commit_sha="$commit_sha" \
        -f ref="refs/heads/$branch"
    done
  }

Policies

Policies are written in Rego. There are some particularities that Reposaur takes into consideration, detailed below.

Namespaces

Reposaur can execute multiple policies against different kinds of data. To distinguish which policies should be executed against a particular set of data we use namespaces.

A namespace is defined using the package keyword:

# This policy has the "repository" namespace
package repository

By default, the CLI attempts to detect the namespace based on the data. If it's failing to detect a valid namespace, you can specify it manually using the --namespace <NAMESPACE> flag.

Rules

Reposaur will only query the rules that have the following prefixes (aka "kinds"):

violation_, fail_, error_

Cause the CLI to exit with code 1, the results in the SARIF report will have the error level.

warn_

Cause the CLI to exit with code 0, the results in the SARIF report will have the warning level.

note_, info_

Cause the CLI to exit with code 0, the results in the SARIF report will have the note level.

Skipping rules

Rules can be skipped by defining a skip rule. For example, if have a rule that says repositories should be internal but don't want to apply it to public repositories, only private ones, we could write the following policy:

package repository

skip[rules] {
	input.visibility == "public"
	rules := ["visibility_not_internal"]
}

violation_visibility_not_internal {
	input.visibility != "internal"
}

Skipping by default

When we have more cases we want to skip than the ones we care about, we can also write a default skip rule. For example, if we want to skip every repository except the ones that have some naming characteristics, we could write the following policy:

package repository

# skips this rule by default
default skip = {"rules": ["not_that_awesome"]}

# same as returning an empty rules list, which
# means every rule will be executed if matched
skip {
	endswith(input.name, "-awesome")
}

violation_not_that_awesome {
	not contains(input.topics, "awesome")
}

Metadata

Your rules can be enhanced with additional information that will be added in the final report, independently of the output format. The example below includes all possible metadata fields:

# METADATA
# title: Forking is enabled
# description: >
#   The repository has forking enabled, which means any member of the organization could
#   fork it to their own account and change it's visibility to be _public_.
#
#   ### Fix
#
#   1. Go to the repository's settings
#
#   3. Uncheck the "Allow forking" option
# custom:
#   tags: [security]
#   security-severity: 9
violation_forking_enabled {
	input.allow_forking
}

The above rule would be represented in the SARIF report as follows:

{
  "id": "repository/violation/forking_enabled",
  "name": "Forking is enabled",
  "shortDescription": {
    "text": "Forking is enabled"
  },
  "fullDescription": {
    "text": "The repository has forking enabled, which means any member of the organization could fork it to their own account and change it's visibility to be _public_.\n### Fix\n1. Go to the repository's settings\n3. Uncheck the \"Allow forking\" option\n",
    "markdown": "The repository has forking enabled, which means any member of the organization could fork it to their own account and change it's visibility to be _public_.\n### Fix\n1. Go to the repository's settings\n3. Uncheck the \"Allow forking\" option\n"
  },
  "help": {
    "markdown": "The repository has forking enabled, which means any member of the organization could fork it to their own account and change it's visibility to be _public_.\n### Fix\n1. Go to the repository's settings\n3. Uncheck the \"Allow forking\" option\n"
  },
  "properties": {
    "security-severity": "9",
    "tags": [
      "security"
    ]
  }
}

Built-in Functions

github.request

Does an HTTP request against the GitHub REST API. Usage is similar to the Octokit.js library, for example:

resp := github.request("GET /repos/{owner}/{repo}/branches/{branch}/protection", {
	"owner": input.owner.login,
	"repo": input.name,
	"branch": input.default_branch,
})

The response will include the following properties:

  • body - The HTTP Response body
  • statusCode - The HTTP Response status code

Forbidden errors are treated in a special manner and will cause policy execution to halt. Usually these errors happen when authentication is required, a token is invalid or doesn't have sufficient permissions or rate limit has been exceeded.

github.graphql

Does an HTTP request against the GitHub GraphQL API. For example:

resp := github.graphql(
	`
		query($owner: String!, $name: String!) {
			repository(owner: $owner, name: $name) { 
				name
			}
		}
	`,
	{
		"owner": input.owner.login,
		"name": input.name,
	},
)

The response will include the following properties:

  • body - The HTTP Response body
  • statusCode - The HTTP Response status code

Forbidden errors are treated in a special manner and will cause policy execution to halt. Usually these errors happen when authentication is required, a token is invalid or doesn't have sufficient permissions or rate limit has been exceeded.

Use in GitHub Actions

steps:
  - name: Setup Reposaur
    uses: reposaur/reposaur@main

  - run: reposaur --help

Contributing

We appreciate every contribution, thanks for considering it!

License

This project is released under the MIT License.

About

Audit your GitHub data using custom policies written in Rego

License:MIT License


Languages

Language:Go 98.5%Language:Shell 1.5%