Skip to content

Commit 8941be2

Browse files
Merge pull request #7 from fulll/rename-orga
rename orga to fulll
2 parents 1ecab04 + 63b10cb commit 8941be2

File tree

2 files changed

+7
-7
lines changed

2 files changed

+7
-7
lines changed

composer.json

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
{
2-
"name": "inextensodigital/command-bus-bundle",
2+
"name": "fulll/command-bus-bundle",
33
"type": "symfony-bundle",
44
"description": "rezzza/command-bus integration to Symfony",
55
"keywords": ["command", "bus", "bundle"],
@@ -12,7 +12,7 @@
1212
"require": {
1313
"php": ">=5.5.0",
1414
"symfony/event-dispatcher": "~2.5|~3.0|~4.0",
15-
"inextensodigital/command-bus": "^3.4"
15+
"fulll/command-bus": "^3.4"
1616
},
1717
"autoload": {
1818
"psr-4": { "Rezzza\\CommandBusBundle\\": "" }

security.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,16 +1,16 @@
11
## Security
22

3-
We take the security of our software products and components seriously, which includes all source code repositories managed through our [In Extenso Digital's GitHub organization](https://github.com/inextensodigital).
3+
We take the security of our software products and components seriously, which includes all source code repositories managed through our [Fulll's GitHub organization](https://github.com/fulll).
44

5-
If you believe you have found a security vulnerability in any In Extenso Digital's repository that meets Wikipedia's definition of a security vulnerability ([English version](https://en.wikipedia.org/wiki/Vulnerability_(computing)), [French version](https://fr.wikipedia.org/wiki/Vuln%C3%A9rabilit%C3%A9_(informatique))), please report it to us as described below.
5+
If you believe you have found a security vulnerability in any Fulll's repository that meets Wikipedia's definition of a security vulnerability ([English version](https://en.wikipedia.org/wiki/Vulnerability_(computing)), [French version](https://fr.wikipedia.org/wiki/Vuln%C3%A9rabilit%C3%A9_(informatique))), please report it to us as described below.
66

77
## Reporting security vulnerability Issues
88

99
:warning: **Please do not report security vulnerabilities through public GitHub issues.**
1010

11-
Instead, **please report them by email** to [rssi@inextenso.digital](mailto:rssi@inextenso.digital).
11+
Instead, **please report them by email** to [rssi@fulll.fr](mailto:rssi@fulll.fr).
1212

13-
You should receive a response as soon as possible. If for some reason you do not, please follow up via email to our [Administrator Team](mailto:admin@inextenso.digital) to ensure we received your original message.
13+
You should receive a response as soon as possible. If for some reason you do not, please follow up via email to our [Administrator Team](mailto:admin@fulll.fr) to ensure we received your original message.
1414

1515
For private repositories, you can also send an email or directly use the dedicated issue template for security vulnerability.
1616

@@ -31,4 +31,4 @@ We prefer all communications to be in English, but if you are not comfortable, F
3131

3232
## Policy
3333

34-
In Extenso Digital follows the principle of [Microsoft's Coordinated Vulnerability Disclosure](https://www.microsoft.com/en-us/msrc/cvd).
34+
Fulll follows the principle of [Microsoft's Coordinated Vulnerability Disclosure](https://www.microsoft.com/en-us/msrc/cvd).

0 commit comments

Comments
 (0)