Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Add new policy for checking insecure_ssl on github_organization_webhook #350

Merged
merged 1 commit into from
Oct 10, 2020

Conversation

HorizonNet
Copy link
Contributor

Add a new policy to the GitHub provider to check if insecure_ssl was
set to true on the github_organization_webhook resource.

Resolves #339

Add a new policy to the GitHub provider to check if insecure_ssl was
set to true on the github_organization_webhook resource.

Resolves #339
@sonarcloud
Copy link

sonarcloud bot commented Oct 10, 2020

Kudos, SonarCloud Quality Gate passed!

Bug A 0 Bugs
Vulnerability A 0 Vulnerabilities (and Security Hotspot 0 Security Hotspots to review)
Code Smell A 0 Code Smells

No Coverage information No Coverage information
2.0% 2.0% Duplication

@codecov
Copy link

codecov bot commented Oct 10, 2020

Codecov Report

Merging #350 into master will not change coverage.
The diff coverage is n/a.

Impacted file tree graph

@@           Coverage Diff           @@
##           master     #350   +/-   ##
=======================================
  Coverage   63.78%   63.78%           
=======================================
  Files          66       66           
  Lines        1378     1378           
=======================================
  Hits          879      879           
  Misses        419      419           
  Partials       80       80           

@cesar-rodriguez
Copy link
Contributor

Thanks!

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

Add policy for checking insecure_ssl configuration for github_organization_webhook in GitHub provider
2 participants