Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Revert "feat: oidc implementation" #183

Merged
merged 1 commit into from
Dec 10, 2024

Conversation

shafin-deriv
Copy link
Contributor

Reverts #176

Copy link

vercel bot commented Dec 10, 2024

The latest updates on your projects. Learn more about Vercel for Git ↗︎

Name Status Preview Updated (UTC)
deriv-api-docs ✅ Ready (Inspect) Visit Preview Dec 10, 2024 8:38am

@shafin-deriv shafin-deriv merged commit b3930fc into master Dec 10, 2024
3 of 4 checks passed
@shafin-deriv shafin-deriv deleted the revert-176-thisyahlen/implement-oidc-logic branch December 10, 2024 08:35
Copy link

Dependency Review

The following issues were found:
  • ✅ 0 vulnerable package(s)
  • ✅ 0 package(s) with incompatible licenses
  • ✅ 0 package(s) with invalid SPDX license definitions
  • ⚠️ 3 package(s) with unknown licenses.
See the Details below.

License Issues

package-lock.json

PackageVersionLicenseIssue Type
@deriv-com/auth-client1.0.29NullUnknown License
@deriv-com/utils0.0.37NullUnknown License

package.json

PackageVersionLicenseIssue Type
@deriv-com/auth-client^1.0.29NullUnknown License

OpenSSF Scorecard

PackageVersionScoreDetails
npm/@deriv-com/auth-client 1.0.29 UnknownUnknown
npm/@deriv-com/utils 0.0.37 UnknownUnknown
npm/@rollup/rollup-linux-x64-gnu 4.24.0 🟢 6
Details
CheckScoreReason
Maintained🟢 1030 commit(s) and 15 issue activity found in the last 90 days -- score normalized to 10
Code-Review⚠️ 2Found 7/24 approved changesets -- score normalized to 2
Security-Policy🟢 10security policy file detected
CII-Best-Practices⚠️ 0no effort to earn an OpenSSF best practices badge detected
Dangerous-Workflow🟢 10no dangerous workflow patterns detected
Token-Permissions⚠️ 0detected GitHub workflow tokens with excessive permissions
Packaging⚠️ -1packaging workflow not detected
License🟢 9license file detected
Signed-Releases⚠️ -1no releases found
Branch-Protection🟢 8branch protection is not maximal on development and all release branches
Pinned-Dependencies⚠️ 2dependency not pinned by hash detected -- score normalized to 2
Binary-Artifacts🟢 10no binaries found in the repo
Fuzzing⚠️ 0project is not fuzzed
SAST⚠️ 0SAST tool is not run on all commits -- score normalized to 0
Vulnerabilities🟢 100 existing vulnerabilities detected
npm/@deriv-com/auth-client 1.3.1 UnknownUnknown
npm/@deriv-com/utils 0.0.42 UnknownUnknown
npm/@rollup/rollup-linux-x64-gnu 4.28.0 🟢 6
Details
CheckScoreReason
Maintained🟢 1030 commit(s) and 15 issue activity found in the last 90 days -- score normalized to 10
Code-Review⚠️ 2Found 7/24 approved changesets -- score normalized to 2
Security-Policy🟢 10security policy file detected
CII-Best-Practices⚠️ 0no effort to earn an OpenSSF best practices badge detected
Dangerous-Workflow🟢 10no dangerous workflow patterns detected
Token-Permissions⚠️ 0detected GitHub workflow tokens with excessive permissions
Packaging⚠️ -1packaging workflow not detected
License🟢 9license file detected
Signed-Releases⚠️ -1no releases found
Branch-Protection🟢 8branch protection is not maximal on development and all release branches
Pinned-Dependencies⚠️ 2dependency not pinned by hash detected -- score normalized to 2
Binary-Artifacts🟢 10no binaries found in the repo
Fuzzing⚠️ 0project is not fuzzed
SAST⚠️ 0SAST tool is not run on all commits -- score normalized to 0
Vulnerabilities🟢 100 existing vulnerabilities detected
npm/@deriv-com/auth-client ^1.0.29 UnknownUnknown
npm/@deriv-com/auth-client ^1.3.1 UnknownUnknown

Scanned Manifest Files

package-lock.json
package.json
  • @deriv-com/auth-client@^1.0.29
  • @deriv-com/auth-client@^1.3.1

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

1 participant