Uploaded image for project: 'OpenShift Pipelines'
  1. OpenShift Pipelines
  2. SRVKP-7333

Reevaluate plans Pipelines-as-Code Permissions for GitHub App

XMLWordPrintable

      User Story:

      As a DevOps Engineer,

      I want to verify if the Pipelines-as-Code (PaC) can operate without the "plans" permission on the GitHub app,

      So that we can minimize the broad access rights associated with the "plans" permission and enhance security.

      Acceptance Criteria:

      1. Documentation Review:
      • Review the GitHub documentation on permissions required for GitHub apps, focusing on the "plans" permission.
      • Understand the scope and implications of the "plans" permission.
      1. Permission Analysis:
      • Identify the specific actions and operations that the "plans" permission enables.
      • Determine which of these actions are necessary for the functioning of Pipelines-as-Code.
      1. Testing Without "Plans" Permission:
      • Configure the GitHub app to run Pipelines-as-Code without the "plans" permission.
      • Monitor the pipeline execution to identify any failures or limitations caused by the lack of "plans" permission.
      1. Document Findings:
      • Document the results of the tests, including any issues encountered and their impact on the pipeline.
      • Provide recommendations on whether the "plans" permission can be safely removed or if alternative permissions can be used.
      1. Security Review:
      • Assess the security benefits of removing the "plans" permission.
      • Ensure that the removal of the permission does not introduce new security risks or operational challenges.
      1. Stakeholder Approval:
      • Present the findings and recommendations to relevant stakeholders for approval.
      • Implement the changes based on the approved recommendations.
      1. E2E Test on GitHub:
      • Create an end-to-end (E2E) test on GitHub to validate the policy action.
      • Compare the results with the existing tests on GitLab to ensure consistency.
      • Document any discrepancies and address them to maintain uniform testing standards across both platforms.

      By completing this user story, we aim to enhance the security posture of our GitHub app by limiting unnecessary permissions while ensuring that Pipelines-as-Code continues to function effectively.

              cboudjna@redhat.com Chmouel Boudjnah
              cboudjna@redhat.com Chmouel Boudjnah
              Votes:
              0 Vote for this issue
              Watchers:
              2 Start watching this issue

                Created:
                Updated:
                Resolved: