Skip to content
This repository was archived by the owner on Oct 17, 2023. It is now read-only.

Update ci.yml #4

Open
wants to merge 2 commits into
base: main
Choose a base branch
from
Open

Update ci.yml #4

wants to merge 2 commits into from

Conversation

matiasozdy
Copy link
Contributor

Removing GH secret

Removing GH secret
@matiasozdy matiasozdy requested a review from a team October 14, 2023 08:46
@matiasozdy
Copy link
Contributor Author

badger all

@jenkins-tf
Copy link
Collaborator

Badges for kube-node-cloudwatch

accessibility_tools

  • Current level: not applicable
  • Description: assess if package.json includes the desired accessibility tools

ci_standard_checks

  • Current level: 1/1
  • Description: assess the presence of the ci standard checks workflow

codeowners

  • Current level: 1/1
  • Description: assess the ownership of a repository

dependency_overseer

  • Current level: not applicable
  • Description: Assess if a repository is up-to-date with the version of @Typeform dependencies

error_codes

  • Current level: not applicable
  • Description: Evaluates the usage of the 499/599 error codes standard in a repository

event_dispatcher

  • Current level: not applicable
  • Description: assesses the usage of Event Dispatcher to publish events

frontend_canary_deployments

  • Current level: not applicable
  • Description: assess the presence of a canary config file

gha_env_vars

  • Current level: 1/1
  • Description: Assess if the repository's Github Actions is using secrets as environment variables

go_lint

  • Current level: not applicable
  • Description: assesses the usage of the common Go Lint workflow

go_service

  • Current level: not applicable
  • Description: assesses the usage of the Common Go Service Starter

incident_handling_playbook

  • Current level: not applicable
  • Description: Assess if a repository has the Incident Handling playbook file

logging

  • Current level: not applicable
  • Description: assess the presence of the ci standard checks workflow

prettier

  • Current level: not applicable
  • Description: This Badge is not applicable to this repository because it is not written in Typescript or Javascript

typescript

  • Current level: not applicable
  • Description: assesses Typescript setup in a repository

ml_model_promoter

  • Current level: not applicable
  • Description: assess if requirements.txt includes the desired ml-model-promoter package

required_typescript

  • Current level: not applicable
  • Description: assesses Required Typescript setup in a repository

repository_categories

  • Current level: 4/4
  • Description: Evaluate the presence of type and use topics in a repository

jira_linked

  • Current level: not applicable
  • Description: Evaluates the presence of Jira issue keys in the PRs of a repository

default_branch

  • Current level: 1/1
  • Description: Evaluate the default_branch of a repository is main

event_metadata

  • Current level: not applicable
  • Description: Assesses if a service is adding the proper metadata section in its generated events

flagger

  • Current level: not applicable
  • Description: assesses the usage of Flagger for deployments

secure_dependencies

  • Current level: 2/2
  • Description: assess the repository's dependencies from a security point of view

secure_container_images

  • Current level: 0/2
  • Description: assess the repository's container image from a security point of view
Level-up recommendations

You are in this level because the repo has a container image and is not added to Snyk.

Recommendations:

  • Add the container image to your Snyk organization +More info
  • The vulnerable container image has a fix available, a Snyk Priority Score of 700 or more, and it was identified by Snyk more than 20 days ago +More info

internal_repo_visibility

  • Current level: 1/1
  • Description: assesses that a repository visibility is internal

branch_protection

  • Current level: 0/1
  • Description: assess the repository's branch protection rules
Level-up recommendations

You are in this level because the repo has a non compliant branch protection rules.

Recommendations:


tracing

  • Current level: not applicable
  • Description: Assesses if a service has tracing enabled in Datadog

iam_auth

  • Current level: not applicable
  • Description: assesses if application uses IAM auth instead of a password

Do you have any feedback on the Badger app? Please fill out this typeform

@matiasozdy
Copy link
Contributor Author

badger all

@jenkins-tf
Copy link
Collaborator

Badges for kube-node-cloudwatch

accessibility_tools

  • Current level: not applicable
  • Description: assess if package.json includes the desired accessibility tools

ci_standard_checks

  • Current level: 1/1
  • Description: assess the presence of the ci standard checks workflow

codeowners

  • Current level: 1/1
  • Description: assess the ownership of a repository

dependency_overseer

  • Current level: not applicable
  • Description: Assess if a repository is up-to-date with the version of @Typeform dependencies

error_codes

  • Current level: not applicable
  • Description: Evaluates the usage of the 499/599 error codes standard in a repository

event_dispatcher

  • Current level: not applicable
  • Description: assesses the usage of Event Dispatcher to publish events

frontend_canary_deployments

  • Current level: not applicable
  • Description: assess the presence of a canary config file

gha_env_vars

  • Current level: 1/1
  • Description: Assess if the repository's Github Actions is using secrets as environment variables

go_lint

  • Current level: not applicable
  • Description: assesses the usage of the common Go Lint workflow

go_service

  • Current level: not applicable
  • Description: assesses the usage of the Common Go Service Starter

incident_handling_playbook

  • Current level: not applicable
  • Description: Assess if a repository has the Incident Handling playbook file

logging

  • Current level: not applicable
  • Description: assess the presence of the ci standard checks workflow

prettier

  • Current level: not applicable
  • Description: This Badge is not applicable to this repository because it is not written in Typescript or Javascript

typescript

  • Current level: not applicable
  • Description: assesses Typescript setup in a repository

ml_model_promoter

  • Current level: not applicable
  • Description: assess if requirements.txt includes the desired ml-model-promoter package

required_typescript

  • Current level: not applicable
  • Description: assesses Required Typescript setup in a repository

repository_categories

  • Current level: 4/4
  • Description: Evaluate the presence of type and use topics in a repository

jira_linked

  • Current level: not applicable
  • Description: Evaluates the presence of Jira issue keys in the PRs of a repository

default_branch

  • Current level: 1/1
  • Description: Evaluate the default_branch of a repository is main

event_metadata

  • Current level: not applicable
  • Description: Assesses if a service is adding the proper metadata section in its generated events

flagger

  • Current level: not applicable
  • Description: assesses the usage of Flagger for deployments

secure_dependencies

  • Current level: 2/2
  • Description: assess the repository's dependencies from a security point of view

secure_container_images

  • Current level: 0/2
  • Description: assess the repository's container image from a security point of view
Level-up recommendations

You are in this level because the repo has a container image and is not added to Snyk.

Recommendations:

  • Add the container image to your Snyk organization +More info
  • The vulnerable container image has a fix available, a Snyk Priority Score of 700 or more, and it was identified by Snyk more than 20 days ago +More info

internal_repo_visibility

  • Current level: 1/1
  • Description: assesses that a repository visibility is internal

branch_protection

  • Current level: 0/1
  • Description: assess the repository's branch protection rules
Level-up recommendations

You are in this level because the repo has a non compliant branch protection rules.

Recommendations:


tracing

  • Current level: not applicable
  • Description: Assesses if a service has tracing enabled in Datadog

iam_auth

  • Current level: not applicable
  • Description: assesses if application uses IAM auth instead of a password

Do you have any feedback on the Badger app? Please fill out this typeform

Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants