Hi David,
I hate to sound like I'm stating the bleeding obvious, but what about just
looking at the authz file with a text editor?
It's not hard to interpret if your usernames are sensible. I've recently spent
a little while making sure the projects are sorted in a sensible order, so
finding particular projects is quite easy (apart from just using the built-in
search functions).
Having said that, we use a home-grown tool (written by a long-gone colleague in
C# and backed by an SQL database for administration items) for some network
administration tasks. Mostly, this is useful as a lazy way of adding or
deleting projects. I still use the text editor for modifying user permissions
(because it's faster and easier).
Regards,
Geoff
From: David Aldrich
Sent: Friday, 27 September 2013 1:08 AM
Hi Mark
Thanks, that's a very helpful suggestion.
Best regards
David
From: Mark Phippard
Sent: 26 September 2013 16:06
On Thu, Sep 26, 2013 at 11:02 AM, David Aldrich wrote:
Hi Mark
Thanks for replying. By auditing, I mean the ability to easily
see who has access to a specified folder. I think we already have the
recording of changes covered. svnauthz_accessof looks interesting, but it
reports whether a specified user has access. I would prefer to ask 'who has
access?' to a specified folder.
OK. I am not aware of any tools commercial or otherwise that provide
the information that way. If you use groups and have a finite number of them,
it seems like it would be a fairly simple script to check each group against
the path using the command line tool and report which ones have access.
--
Thanks
Mark Phippard
http://markphip.blogspot.com/
--
Apologies for the auto-generated legal boilerplate added by our IT department:
- The contents of this email, and any attachments, are strictly private
and confidential.
- It may contain legally privileged or sensitive information and is intended
solely for the individual or entity to which it is addressed.
- Only the intended recipient may review, reproduce, retransmit, disclose,
disseminate or otherwise use or take action in reliance upon the information
contained in this email and any attachments, with the permission of
Australian Arrow Pty. Ltd.
- If you have received this communication in error, please reply to the sender
immediately and promptly delete the email and attachments, together with
any copies, from all computers.
- It is your responsibility to scan this communication and any attached files
for computer viruses and other defects and we recommend that it be
subjected to your virus checking procedures prior to use.
- Australian Arrow Pty. Ltd. does not accept liability for any loss or damage
of any nature, howsoever caused, which may result
directly or indirectly from this communication or any attached files.