Search Options

Results per page
Sort
Preferred Languages
Advance

Results 51 - 57 of 57 for Investigate (0.21 sec)

  1. src/cmd/vendor/golang.org/x/telemetry/internal/crashmonitor/monitor.go

    	// Parse the stack out of the crash report
    	// and record a telemetry count for it.
    	name, err := telemetryCounterName(data)
    	if err != nil {
    		// Keep count of how often this happens
    		// so that we can investigate if necessary.
    		incrementCounter("crash/malformed")
    
    		// Something went wrong.
    		// Save the crash securely in the file system.
    		f, err := os.CreateTemp(os.TempDir(), "*.crash")
    		if err != nil {
    			log.Fatal(err)
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Mon Mar 04 17:57:25 UTC 2024
    - 7.6K bytes
    - Viewed (0)
  2. src/cmd/vendor/golang.org/x/tools/go/analysis/passes/structtag/structtag.go

    	}
    
    	// Check for use of json or xml tags with unexported fields.
    
    	// Embedded struct. Nothing to do for now, but that
    	// may change, depending on what happens with issue 7363.
    	// TODO(adonovan): investigate, now that that issue is fixed.
    	if field.Anonymous() {
    		return
    	}
    
    	if field.Exported() {
    		return
    	}
    
    	for _, enc := range [...]string{"json", "xml"} {
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Tue May 09 01:28:01 UTC 2023
    - 8.8K bytes
    - Viewed (0)
  3. docs/en/docs/tutorial/security/first-steps.md

    !!! info
        If you are a very strict "Pythonista" you might dislike the style of the parameter name `tokenUrl` instead of `token_url`.
    
        That's because it is using the same name as in the OpenAPI spec. So that if you need to investigate more about any of these security schemes you can just copy and paste it to find more information about it.
    
    The `oauth2_scheme` variable is an instance of `OAuth2PasswordBearer`, but it is also a "callable".
    
    Registered: Mon Jun 17 08:32:26 UTC 2024
    - Last Modified: Mon Jun 03 01:48:20 UTC 2024
    - 9.1K bytes
    - Viewed (0)
  4. src/cmd/go/testdata/script/mod_vendor_auto.txt

    # An explicit -mod=vendor should force use of the vendor directory.
    env GOFLAGS=-mod=vendor
    
    # Pass -e to permit an error: tools.go imports a main package
    # "example.com/printversion".
    # TODO(#59186): investigate why it didn't fail without -e.
    go list -f {{.Dir}} -tags tools -e all
    stdout '^'$WORK'[/\\]auto$'
    stdout '^'$WORK'[/\\]auto[/\\]vendor[/\\]example.com[/\\]printversion$'
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Tue May 07 15:21:14 UTC 2024
    - 9.7K bytes
    - Viewed (0)
  5. proguard/cache.pro

    # Striped64 uses this
    -dontwarn sun.misc.Unsafe
    
    # Striped64 appears to make some assumptions about object layout that
    # really might not be safe. This should be investigated.
    -keepclassmembers class com.google.common.cache.Striped64 {
      *** base;
      *** busy;
    }
    -keepclassmembers class com.google.common.cache.Striped64$Cell {
      <fields>;
    Registered: Wed Jun 12 16:38:11 UTC 2024
    - Last Modified: Tue May 09 00:29:01 UTC 2023
    - 341 bytes
    - Viewed (0)
  6. proguard/hash.pro

    # LittleEndianByteArray uses this
    -dontwarn sun.misc.Unsafe
    
    # Striped64 appears to make some assumptions about object layout that
    # really might not be safe. This should be investigated.
    -keepclassmembers class com.google.common.hash.Striped64 {
      *** base;
      *** busy;
    }
    -keepclassmembers class com.google.common.hash.Striped64$Cell {
      <fields>;
    Registered: Wed Jun 12 16:38:11 UTC 2024
    - Last Modified: Tue May 09 00:29:01 UTC 2023
    - 351 bytes
    - Viewed (0)
  7. VULNERABILITY_REPORT.md

       a well-established vulnerability identifier, e.g. CVE number, can be
       used instead.
    
    Based on the description mentioned above, a MinIO engineer or security team
    member investigates:
    
    - Whether the reported vulnerability exists.
    - The conditions that are required such that the vulnerability can be exploited.
    - The steps required to fix the vulnerability.
    
    Registered: Sun Jun 16 00:44:34 UTC 2024
    - Last Modified: Sat Feb 12 00:51:25 UTC 2022
    - 1.5K bytes
    - Viewed (0)
Back to top