- Sort Score
- Result 10 results
- Languages All
Results 1 - 10 of 108 for scanning (0.12 sec)
-
.github/workflows/codeql.yml
# If you are analyzing a compiled language, you can modify the 'build-mode' for that language to customize how # your codebase is analyzed, see https://docs.github.com/en/code-security/code-scanning/creating-an-advanced-setup-for-code-scanning/codeql-code-scanning-for-compiled-languages steps:
Registered: Thu Oct 31 13:40:30 UTC 2024 - Last Modified: Wed Aug 14 23:51:19 UTC 2024 - 4.4K bytes - Viewed (0) -
.github/workflows/scorecards-analysis.yml
with: name: SARIF file path: results.sarif retention-days: 5 # Upload the results to GitHub's code scanning dashboard (optional). # Commenting out will disable upload of results to your repo's Code Scanning dashboard - name: "Upload to code-scanning" uses: github/codeql-action/upload-sarif@662472033e021d55d94146f66f6058822b0b39fd # v3.27.0 with:
Registered: Tue Nov 05 12:39:12 UTC 2024 - Last Modified: Fri Nov 01 08:40:10 UTC 2024 - 2.6K bytes - Viewed (0) -
src/bufio/scan.go
// // Scanning stops if the function returns an error, in which case some of // the input may be discarded. If that error is [ErrFinalToken], scanning // stops with no error. A non-nil token delivered with [ErrFinalToken] // will be the last token, and a nil token with [ErrFinalToken] // immediately stops the scanning. // // Otherwise, the [Scanner] advances the input. If the token is not nil,
Registered: Tue Nov 05 11:13:11 UTC 2024 - Last Modified: Mon Oct 23 09:06:30 UTC 2023 - 14.2K bytes - Viewed (0) -
.github/workflows/codeql-analysis.yml
language: ['java'] # Learn more... # https://docs.github.com/en/github/finding-security-vulnerabilities-and-errors-in-your-code/configuring-code-scanning#overriding-automatic-language-detection steps: - name: Checkout repository uses: actions/checkout@v2 with: # We must fetch at least the immediate parents so that if this is
Registered: Thu Oct 31 02:32:13 UTC 2024 - Last Modified: Fri Oct 02 13:24:14 UTC 2020 - 2.5K bytes - Viewed (0) -
src/bufio/example_test.go
for scanner.Scan() { fmt.Println(len(scanner.Bytes()) == 6) } if err := scanner.Err(); err != nil { fmt.Fprintln(os.Stderr, "shouldn't see an error scanning a string") } // Output: // true } // Use a Scanner to implement a simple word-count utility by scanning the // input as a sequence of space-delimited tokens. func ExampleScanner_words() { // An artificial input source.
Registered: Tue Nov 05 11:13:11 UTC 2024 - Last Modified: Fri Nov 01 21:52:12 UTC 2024 - 5.5K bytes - Viewed (0) -
.github/workflows/scorecard.yml
with: name: SARIF file path: results.sarif retention-days: 5 # Upload the results to GitHub's code scanning dashboard. - name: "Upload to code-scanning" uses: github/codeql-action/upload-sarif@662472033e021d55d94146f66f6058822b0b39fd # v3.27.0 with:
Registered: Fri Nov 01 12:43:10 UTC 2024 - Last Modified: Tue Oct 29 18:53:45 UTC 2024 - 2.9K bytes - Viewed (0) -
cmd/erasure.go
di.UsedSpace = info.Used di.AvailableSpace = info.Free di.UUID = info.ID di.Major = info.Major di.Minor = info.Minor di.RootDisk = info.RootDisk di.Healing = info.Healing di.Scanning = info.Scanning di.State = diskErrToDriveState(err) di.FreeInodes = info.FreeInodes di.UsedInodes = info.UsedInodes if hi := disks[index].Healing(); hi != nil { hd := hi.toHealingDisk()
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Fri Oct 04 22:23:33 UTC 2024 - 16.1K bytes - Viewed (0) -
.github/workflows/codeql-analysis.yml
name: "Code scanning - action" on: push: branches: [ main, master, release ] schedule: - cron: '0 5 * * *' permissions: {} jobs: CodeQL-Build: permissions: actions: read # for github/codeql-action/init to get workflow details contents: read # for actions/checkout to fetch code security-events: write # for github/codeql-action/analyze to upload SARIF results runs-on: ubuntu-latest
Registered: Wed Nov 06 11:36:14 UTC 2024 - Last Modified: Fri Oct 11 18:32:33 UTC 2024 - 4K bytes - Viewed (0) -
.github/workflows/codeql-analysis.yml
language: ['java'] # Learn more... # https://docs.github.com/en/github/finding-security-vulnerabilities-and-errors-in-your-code/configuring-code-scanning#overriding-automatic-language-detection steps: - name: Checkout repository uses: actions/checkout@v2 with: # We must fetch at least the immediate parents so that if this is
Registered: Sun Nov 03 00:10:13 UTC 2024 - Last Modified: Fri Oct 02 13:22:07 UTC 2020 - 2.5K bytes - Viewed (0) -
.github/workflows/codeql-analysis.yml
language: ['java', 'javascript'] # Learn more... # https://docs.github.com/en/github/finding-security-vulnerabilities-and-errors-in-your-code/configuring-code-scanning#overriding-automatic-language-detection steps: - name: Checkout repository uses: actions/checkout@v2 with: # We must fetch at least the immediate parents so that if this is
Registered: Fri Nov 08 09:08:12 UTC 2024 - Last Modified: Sat Dec 23 10:29:00 UTC 2023 - 2.9K bytes - Viewed (0)