Search Options

Results per page
Sort
Preferred Languages
Advance

Results 1 - 10 of 26 for scanning (0.06 sec)

  1. .github/workflows/codeql.yml

            # If you are analyzing a compiled language, you can modify the 'build-mode' for that language to customize how
            # your codebase is analyzed, see https://docs.github.com/en/code-security/code-scanning/creating-an-advanced-setup-for-code-scanning/codeql-code-scanning-for-compiled-languages
        steps:
    Registered: Thu Oct 31 13:40:30 UTC 2024
    - Last Modified: Wed Aug 14 23:51:19 UTC 2024
    - 4.4K bytes
    - Viewed (0)
  2. .github/workflows/scorecards-analysis.yml

            with:
              name: SARIF file
              path: results.sarif
              retention-days: 5
    
          # Upload the results to GitHub's code scanning dashboard (optional).
          # Commenting out will disable upload of results to your repo's Code Scanning dashboard
          - name: "Upload to code-scanning"
            uses: github/codeql-action/upload-sarif@662472033e021d55d94146f66f6058822b0b39fd # v3.27.0
            with:
    Registered: Tue Nov 05 12:39:12 UTC 2024
    - Last Modified: Fri Nov 01 08:40:10 UTC 2024
    - 2.6K bytes
    - Viewed (0)
  3. .github/workflows/codeql-analysis.yml

            language: ['java']
            # Learn more...
            # https://docs.github.com/en/github/finding-security-vulnerabilities-and-errors-in-your-code/configuring-code-scanning#overriding-automatic-language-detection
    
        steps:
        - name: Checkout repository
          uses: actions/checkout@v2
          with:
            # We must fetch at least the immediate parents so that if this is
    Registered: Thu Oct 31 02:32:13 UTC 2024
    - Last Modified: Fri Oct 02 13:24:14 UTC 2020
    - 2.5K bytes
    - Viewed (0)
  4. src/bufio/example_test.go

    	for scanner.Scan() {
    		fmt.Println(len(scanner.Bytes()) == 6)
    	}
    	if err := scanner.Err(); err != nil {
    		fmt.Fprintln(os.Stderr, "shouldn't see an error scanning a string")
    	}
    	// Output:
    	// true
    }
    
    // Use a Scanner to implement a simple word-count utility by scanning the
    // input as a sequence of space-delimited tokens.
    func ExampleScanner_words() {
    	// An artificial input source.
    Registered: Tue Nov 05 11:13:11 UTC 2024
    - Last Modified: Fri Nov 01 21:52:12 UTC 2024
    - 5.5K bytes
    - Viewed (0)
  5. .github/workflows/scorecard.yml

            with:
              name: SARIF file
              path: results.sarif
              retention-days: 5
    
          # Upload the results to GitHub's code scanning dashboard.
          - name: "Upload to code-scanning"
            uses: github/codeql-action/upload-sarif@662472033e021d55d94146f66f6058822b0b39fd # v3.27.0
            with:
    Registered: Fri Nov 01 12:43:10 UTC 2024
    - Last Modified: Tue Oct 29 18:53:45 UTC 2024
    - 2.9K bytes
    - Viewed (0)
  6. .github/workflows/codeql-analysis.yml

    name: "Code scanning - action"
    
    on:
      push:
        branches: [ main, master, release ]
      schedule:
        - cron: '0 5 * * *'
    
    permissions: {}
    
    jobs:
      CodeQL-Build:
        permissions:
          actions: read  # for github/codeql-action/init to get workflow details
          contents: read  # for actions/checkout to fetch code
          security-events: write  # for github/codeql-action/analyze to upload SARIF results
        runs-on: ubuntu-latest
    
    Registered: Wed Nov 06 11:36:14 UTC 2024
    - Last Modified: Fri Oct 11 18:32:33 UTC 2024
    - 4K bytes
    - Viewed (0)
  7. .github/workflows/codeql-analysis.yml

            language: ['java']
            # Learn more...
            # https://docs.github.com/en/github/finding-security-vulnerabilities-and-errors-in-your-code/configuring-code-scanning#overriding-automatic-language-detection
    
        steps:
        - name: Checkout repository
          uses: actions/checkout@v2
          with:
            # We must fetch at least the immediate parents so that if this is
    Registered: Sun Nov 03 00:10:13 UTC 2024
    - Last Modified: Fri Oct 02 13:22:07 UTC 2020
    - 2.5K bytes
    - Viewed (0)
  8. .github/workflows/codeql-analysis.yml

            language: ['java', 'javascript']
            # Learn more...
            # https://docs.github.com/en/github/finding-security-vulnerabilities-and-errors-in-your-code/configuring-code-scanning#overriding-automatic-language-detection
    
        steps:
        - name: Checkout repository
          uses: actions/checkout@v2
          with:
            # We must fetch at least the immediate parents so that if this is
    Registered: Fri Nov 08 09:08:12 UTC 2024
    - Last Modified: Sat Dec 23 10:29:00 UTC 2023
    - 2.9K bytes
    - Viewed (0)
  9. .github/workflows/codeql-analysis.init.gradle

     * See the License for the specific language governing permissions and
     * limitations under the License.
     */
    
    allprojects {
        tasks.withType(JavaCompile).configureEach {
            outputs.doNotCacheIf("CodeQL scanning", { true })
        }
    Registered: Wed Nov 06 11:36:14 UTC 2024
    - Last Modified: Sat Oct 10 05:36:54 UTC 2020
    - 745 bytes
    - Viewed (0)
  10. .mailmap

    # Generate CONTRIBUTORS.md: contributors.sh
    
    # Tip for finding duplicates (besides scanning the output of CONTRIBUTORS.md for name
    # duplicates that aren't also email duplicates): scan the output of:
    #   git log --format='%aE - %aN' | sort -uf
    #
    # For explanation on this file format: man git-shortlog
    
    Anand Babu (AB) Periasamy <******@****.***> Anand Babu (AB) Periasamy <******@****.***>
    Anand Babu (AB) Periasamy <******@****.***> <******@****.***>
    Registered: Sun Nov 03 19:28:11 UTC 2024
    - Last Modified: Tue Apr 09 18:39:42 UTC 2019
    - 835 bytes
    - Viewed (0)
Back to top