Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Mvp kotlin #4

Open
wants to merge 21 commits into
base: master
Choose a base branch
from
Open

Mvp kotlin #4

wants to merge 21 commits into from

Conversation

daolq-2712
Copy link
Owner

Related Tickets

WHAT

Evidence (Screenshot or Video)

Review Checklist

Category View Point Description Expected Reviewer Answer Self review Reviewer2 (name)
Conventions Does the code follow Sun* coding style and coding conventions? https://github.com/framgia/coding-standards/blob/master/eng/android/coding_convention_android_kotlin.md YES
  • yes
  • yes
  • Redmine Does the ticket follow Sun* Redmine working process? https://github.com/framgia/Training-Guideline/blob/master/WorkingProcess/redmine/redmine.md YES
  • yes
  • yes
  • Documentation Is there any incomplete code? If so, should it be removed or flagged with a suitable marker like ‘TODO’? YES
  • yes
  • yes
  • Notes (Optional)

    (Impacted Areas in Application(List features, api, models or services that this PR will affect))

    (Other notes)

    @daolq-2712 daolq-2712 marked this pull request as ready for review May 8, 2023 08:58
    @gitguardian
    Copy link

    gitguardian bot commented May 8, 2023

    ⚠️ GitGuardian has uncovered 1 secret following the scan of your pull request.

    Please consider investigating the findings and remediating the incidents. Failure to do so may lead to compromising the associated services or software components.

    🔎 Detected hardcoded secret in your pull request
    GitGuardian id Secret Commit Filename
    4266195 Generic High Entropy Secret 767a2fa gradle.properties View secret
    🛠 Guidelines to remediate hardcoded secrets
    1. Understand the implications of revoking this secret by investigating where it is used in your code.
    2. Replace and store your secret safely. Learn here the best practices.
    3. Revoke and rotate this secret.
    4. If possible, rewrite git history. Rewriting git history is not a trivial act. You might completely break other contributing developers' workflow and you risk accidentally deleting legitimate data.

    To avoid such incidents in the future consider


    🦉 GitGuardian detects secrets in your source code to help developers and security teams secure the modern development process. You are seeing this because you or someone else with access to this repository has authorized GitGuardian to scan your pull request.

    Our GitHub checks need improvements? Share your feedbacks!

    Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
    Labels
    None yet
    Projects
    None yet
    Development

    Successfully merging this pull request may close these issues.

    2 participants