Skip to content

Handle the absence of write:org access gracefully #8

@ruuda

Description

@ruuda

Currently to scan a GitHub organization, we need write access to the organization:

* "admin:org", which when checked implies both "read:org" and "write:org".
This application does not modify the organization, but some organization-wide
settings, such as the default repository permission, can only be read with
the full "admin:org" permission, and not with "read:org".

Unfortunately the GitHub API works this way, so to check the default repository permissions, we need admin:org on the token. However, if we have a token that doesn’t have admin:org, we could handle that gracefully and just not verify the organization-wide settings, and still verify everything else.

I would feel much more comfortable running this on an automated schedule with an access token that only grants read-only access.

Metadata

Metadata

Assignees

No one assigned

    Labels

    bootcampGood for newcomers

    Type

    No type
    No fields configured for issues without a type.

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions