Search Options

Results per page
Sort
Preferred Languages
Advance

Results 1 - 10 of 73 for scanning (0.06 sec)

  1. .github/workflows/codeql.yml

            # If you are analyzing a compiled language, you can modify the 'build-mode' for that language to customize how
            # your codebase is analyzed, see https://docs.github.com/en/code-security/code-scanning/creating-an-advanced-setup-for-code-scanning/codeql-code-scanning-for-compiled-languages
        steps:
    Registered: Thu Oct 31 13:40:30 UTC 2024
    - Last Modified: Wed Aug 14 23:51:19 UTC 2024
    - 4.4K bytes
    - Viewed (0)
  2. .github/workflows/scorecards-analysis.yml

            with:
              name: SARIF file
              path: results.sarif
              retention-days: 5
    
          # Upload the results to GitHub's code scanning dashboard (optional).
          # Commenting out will disable upload of results to your repo's Code Scanning dashboard
          - name: "Upload to code-scanning"
            uses: github/codeql-action/upload-sarif@662472033e021d55d94146f66f6058822b0b39fd # v3.27.0
            with:
    Registered: Tue Nov 05 12:39:12 UTC 2024
    - Last Modified: Fri Nov 01 08:40:10 UTC 2024
    - 2.6K bytes
    - Viewed (0)
  3. src/bufio/example_test.go

    	for scanner.Scan() {
    		fmt.Println(len(scanner.Bytes()) == 6)
    	}
    	if err := scanner.Err(); err != nil {
    		fmt.Fprintln(os.Stderr, "shouldn't see an error scanning a string")
    	}
    	// Output:
    	// true
    }
    
    // Use a Scanner to implement a simple word-count utility by scanning the
    // input as a sequence of space-delimited tokens.
    func ExampleScanner_words() {
    	// An artificial input source.
    Registered: Tue Nov 05 11:13:11 UTC 2024
    - Last Modified: Fri Nov 01 21:52:12 UTC 2024
    - 5.5K bytes
    - Viewed (0)
  4. .github/workflows/scorecard.yml

            with:
              name: SARIF file
              path: results.sarif
              retention-days: 5
    
          # Upload the results to GitHub's code scanning dashboard.
          - name: "Upload to code-scanning"
            uses: github/codeql-action/upload-sarif@662472033e021d55d94146f66f6058822b0b39fd # v3.27.0
            with:
    Registered: Fri Nov 01 12:43:10 UTC 2024
    - Last Modified: Tue Oct 29 18:53:45 UTC 2024
    - 2.9K bytes
    - Viewed (0)
  5. cmd/erasure.go

    			di.UsedSpace = info.Used
    			di.AvailableSpace = info.Free
    			di.UUID = info.ID
    			di.Major = info.Major
    			di.Minor = info.Minor
    			di.RootDisk = info.RootDisk
    			di.Healing = info.Healing
    			di.Scanning = info.Scanning
    			di.State = diskErrToDriveState(err)
    			di.FreeInodes = info.FreeInodes
    			di.UsedInodes = info.UsedInodes
    			if hi := disks[index].Healing(); hi != nil {
    				hd := hi.toHealingDisk()
    Registered: Sun Nov 03 19:28:11 UTC 2024
    - Last Modified: Fri Oct 04 22:23:33 UTC 2024
    - 16.1K bytes
    - Viewed (0)
  6. .github/workflows/codeql-analysis.yml

    name: "Code scanning - action"
    
    on:
      push:
        branches: [ main, master, release ]
      schedule:
        - cron: '0 5 * * *'
    
    permissions: {}
    
    jobs:
      CodeQL-Build:
        permissions:
          actions: read  # for github/codeql-action/init to get workflow details
          contents: read  # for actions/checkout to fetch code
          security-events: write  # for github/codeql-action/analyze to upload SARIF results
        runs-on: ubuntu-latest
    
    Registered: Wed Nov 06 11:36:14 UTC 2024
    - Last Modified: Fri Oct 11 18:32:33 UTC 2024
    - 4K bytes
    - Viewed (0)
  7. .github/workflows/codeql-analysis.yml

            language: ['java', 'javascript']
            # Learn more...
            # https://docs.github.com/en/github/finding-security-vulnerabilities-and-errors-in-your-code/configuring-code-scanning#overriding-automatic-language-detection
    
        steps:
        - name: Checkout repository
          uses: actions/checkout@v2
          with:
            # We must fetch at least the immediate parents so that if this is
    Registered: Fri Nov 08 09:08:12 UTC 2024
    - Last Modified: Sat Dec 23 10:29:00 UTC 2023
    - 2.9K bytes
    - Viewed (0)
  8. buildscripts/heal-manual.go

    		Remove:    true,                  // remove content that has lost quorum and not recoverable
    		ScanMode:  madmin.HealNormalScan, // by default do not do 'deep' scanning
    	}
    
    	start, _, err := madmClnt.Heal(context.Background(), "healing-rewrite-bucket", "", opts, "", false, false)
    	if err != nil {
    		log.Fatalln(err)
    	}
    	fmt.Println("Healstart sequence ===")
    Registered: Sun Nov 03 19:28:11 UTC 2024
    - Last Modified: Tue Feb 27 09:47:58 UTC 2024
    - 2.3K bytes
    - Viewed (0)
  9. docs/config/README.md

    heal                  manage object healing frequency and bitrot verification checks
    scanner               manage namespace scanning for usage calculation, lifecycle, healing and more
    ```
    
    > NOTE: if you set any of the following sub-system configuration using ENVs, dynamic behavior is not supported.
    
    ### Usage scanner
    
    Registered: Sun Nov 03 19:28:11 UTC 2024
    - Last Modified: Fri Aug 16 08:43:49 UTC 2024
    - 17.9K bytes
    - Viewed (1)
  10. internal/config/heal/heal.go

    		bitrotCycle time.Duration
    	}
    }
    
    // BitrotScanCycle returns the configured cycle for the scanner healing
    // -1 for not enabled
    //
    //	0 for contiunous bitrot scanning
    //
    // >0 interval duration between cycles
    func (opts Config) BitrotScanCycle() (d time.Duration) {
    	configMutex.RLock()
    	defer configMutex.RUnlock()
    	return opts.cache.bitrotCycle
    }
    
    Registered: Sun Nov 03 19:28:11 UTC 2024
    - Last Modified: Fri May 24 23:05:23 UTC 2024
    - 4.9K bytes
    - Viewed (0)
Back to top