Search Options

Results per page
Sort
Preferred Languages
Advance

Results 1 - 10 of 108 for scanning (0.1 sec)

  1. .github/workflows/codeql.yml

            # If you are analyzing a compiled language, you can modify the 'build-mode' for that language to customize how
            # your codebase is analyzed, see https://docs.github.com/en/code-security/code-scanning/creating-an-advanced-setup-for-code-scanning/codeql-code-scanning-for-compiled-languages
        steps:
    Registered: Thu Oct 31 13:40:30 UTC 2024
    - Last Modified: Wed Aug 14 23:51:19 UTC 2024
    - 4.4K bytes
    - Viewed (0)
  2. .github/workflows/scorecards-analysis.yml

            with:
              name: SARIF file
              path: results.sarif
              retention-days: 5
    
          # Upload the results to GitHub's code scanning dashboard (optional).
          # Commenting out will disable upload of results to your repo's Code Scanning dashboard
          - name: "Upload to code-scanning"
            uses: github/codeql-action/upload-sarif@662472033e021d55d94146f66f6058822b0b39fd # v3.27.0
            with:
    Registered: Tue Nov 05 12:39:12 UTC 2024
    - Last Modified: Fri Nov 01 08:40:10 UTC 2024
    - 2.6K bytes
    - Viewed (0)
  3. src/bufio/scan.go

    //
    // Scanning stops if the function returns an error, in which case some of
    // the input may be discarded. If that error is [ErrFinalToken], scanning
    // stops with no error. A non-nil token delivered with [ErrFinalToken]
    // will be the last token, and a nil token with [ErrFinalToken]
    // immediately stops the scanning.
    //
    // Otherwise, the [Scanner] advances the input. If the token is not nil,
    Registered: Tue Nov 05 11:13:11 UTC 2024
    - Last Modified: Mon Oct 23 09:06:30 UTC 2023
    - 14.2K bytes
    - Viewed (0)
  4. .github/workflows/codeql-analysis.yml

            language: ['java']
            # Learn more...
            # https://docs.github.com/en/github/finding-security-vulnerabilities-and-errors-in-your-code/configuring-code-scanning#overriding-automatic-language-detection
    
        steps:
        - name: Checkout repository
          uses: actions/checkout@v2
          with:
            # We must fetch at least the immediate parents so that if this is
    Registered: Thu Oct 31 02:32:13 UTC 2024
    - Last Modified: Fri Oct 02 13:24:14 UTC 2020
    - 2.5K bytes
    - Viewed (0)
  5. src/bufio/example_test.go

    	for scanner.Scan() {
    		fmt.Println(len(scanner.Bytes()) == 6)
    	}
    	if err := scanner.Err(); err != nil {
    		fmt.Fprintln(os.Stderr, "shouldn't see an error scanning a string")
    	}
    	// Output:
    	// true
    }
    
    // Use a Scanner to implement a simple word-count utility by scanning the
    // input as a sequence of space-delimited tokens.
    func ExampleScanner_words() {
    	// An artificial input source.
    Registered: Tue Nov 05 11:13:11 UTC 2024
    - Last Modified: Fri Nov 01 21:52:12 UTC 2024
    - 5.5K bytes
    - Viewed (0)
  6. .github/workflows/scorecard.yml

            with:
              name: SARIF file
              path: results.sarif
              retention-days: 5
    
          # Upload the results to GitHub's code scanning dashboard.
          - name: "Upload to code-scanning"
            uses: github/codeql-action/upload-sarif@662472033e021d55d94146f66f6058822b0b39fd # v3.27.0
            with:
    Registered: Fri Nov 01 12:43:10 UTC 2024
    - Last Modified: Tue Oct 29 18:53:45 UTC 2024
    - 2.9K bytes
    - Viewed (0)
  7. cmd/erasure.go

    			di.UsedSpace = info.Used
    			di.AvailableSpace = info.Free
    			di.UUID = info.ID
    			di.Major = info.Major
    			di.Minor = info.Minor
    			di.RootDisk = info.RootDisk
    			di.Healing = info.Healing
    			di.Scanning = info.Scanning
    			di.State = diskErrToDriveState(err)
    			di.FreeInodes = info.FreeInodes
    			di.UsedInodes = info.UsedInodes
    			if hi := disks[index].Healing(); hi != nil {
    				hd := hi.toHealingDisk()
    Registered: Sun Nov 03 19:28:11 UTC 2024
    - Last Modified: Fri Oct 04 22:23:33 UTC 2024
    - 16.1K bytes
    - Viewed (0)
  8. .github/workflows/codeql-analysis.yml

    name: "Code scanning - action"
    
    on:
      push:
        branches: [ main, master, release ]
      schedule:
        - cron: '0 5 * * *'
    
    permissions: {}
    
    jobs:
      CodeQL-Build:
        permissions:
          actions: read  # for github/codeql-action/init to get workflow details
          contents: read  # for actions/checkout to fetch code
          security-events: write  # for github/codeql-action/analyze to upload SARIF results
        runs-on: ubuntu-latest
    
    Registered: Wed Nov 06 11:36:14 UTC 2024
    - Last Modified: Fri Oct 11 18:32:33 UTC 2024
    - 4K bytes
    - Viewed (0)
  9. .github/workflows/codeql-analysis.yml

            language: ['java']
            # Learn more...
            # https://docs.github.com/en/github/finding-security-vulnerabilities-and-errors-in-your-code/configuring-code-scanning#overriding-automatic-language-detection
    
        steps:
        - name: Checkout repository
          uses: actions/checkout@v2
          with:
            # We must fetch at least the immediate parents so that if this is
    Registered: Sun Nov 03 00:10:13 UTC 2024
    - Last Modified: Fri Oct 02 13:22:07 UTC 2020
    - 2.5K bytes
    - Viewed (0)
  10. .github/workflows/codeql-analysis.yml

            language: ['java', 'javascript']
            # Learn more...
            # https://docs.github.com/en/github/finding-security-vulnerabilities-and-errors-in-your-code/configuring-code-scanning#overriding-automatic-language-detection
    
        steps:
        - name: Checkout repository
          uses: actions/checkout@v2
          with:
            # We must fetch at least the immediate parents so that if this is
    Registered: Fri Nov 08 09:08:12 UTC 2024
    - Last Modified: Sat Dec 23 10:29:00 UTC 2023
    - 2.9K bytes
    - Viewed (0)
Back to top