/third_party/node/deps/npm/tap-snapshots/test/lib/utils/ |
D | reify-output.js.test.cjs | 18 …t.js TAP packages changed message > {"added":0,"removed":0,"changed":0,"audited":0,"json":false} … 23 …t.js TAP packages changed message > {"added":0,"removed":0,"changed":0,"audited":0,"json":true} 1… 28 "audited": 0, 33 …t.js TAP packages changed message > {"added":0,"removed":0,"changed":0,"audited":1,"json":false} … 35 up to date, audited 1 package in {TIME} 40 …t.js TAP packages changed message > {"added":0,"removed":0,"changed":0,"audited":1,"json":true} 1… 45 "audited": 1, 55 …t.js TAP packages changed message > {"added":0,"removed":0,"changed":0,"audited":2,"json":false} … 57 up to date, audited 2 packages in {TIME} 62 …t.js TAP packages changed message > {"added":0,"removed":0,"changed":0,"audited":2,"json":false} … [all …]
|
/third_party/node/deps/npm/lib/utils/ |
D | reify-output.js | 39 audited: auditReport && !auditReport.error ? actualTree.inventory.size : 0, property 127 const packagesChangedMessage = (npm, { added, removed, changed, audited }) => { field 131 if (audited) { 144 if (added && !audited && !changed) { 155 if (!audited && (added || removed)) { 161 if (audited) { 165 if (audited) { 166 msg.push(`audited ${audited} package${audited === 1 ? '' : 's'}`)
|
/third_party/node/deps/npm/tap-snapshots/test/lib/commands/ |
D | audit.js.test.cjs | 39 added 1 package, and audited 2 packages in xxx 45 audited 1 package in xxx 131 audited 2 packages in xxx 138 audited 1 package in xxx 145 audited 1 package in xxx 153 audited 1 package in xxx 164 audited 1 package in xxx 172 audited 1 package in xxx 179 audited 1 package in xxx 186 audited 1 package in xxx [all …]
|
/third_party/node/deps/npm/test/lib/utils/ |
D | reify-output.js | 279 const testCase = async (t, added, removed, changed, audited, json, command) => { argument 282 inventory: { size: audited, has: () => true }, 285 auditReport: audited ? { 319 audited, property 328 for (const audited of [0, 1, 2]) { 330 cases.push([added, removed, changed, audited, json, 'install'])
|
/third_party/node/deps/npm/test/lib/commands/ |
D | audit.js | 946 t.match(joinedOutput(), /audited 1 package/) 979 t.match(joinedOutput(), /audited 1 package/) 995 t.match(joinedOutput(), /audited 1 package/) 1101 t.match(joinedOutput(), /audited 3 packages/) 1118 t.match(joinedOutput(), /audited 1 package/) 1150 t.match(joinedOutput(), /audited 2 packages/) 1168 t.match(joinedOutput(), /audited 2 packages/) 1353 t.match(joinedOutput(), /audited 1 package/) 1458 t.match(joinedOutput(), /audited 1 package/) 1580 t.match(joinedOutput(), /audited 1 package/) [all …]
|
/third_party/selinux/libselinux/src/ |
D | avc.c | 696 access_vector_t denied, audited; in avc_audit() local 700 audited = denied & avd->auditdeny; in avc_audit() 702 audited = denied = requested; in avc_audit() 704 audited = requested & avd->auditallow; in avc_audit() 705 if (!audited) in avc_audit() 715 avc_dump_av(tclass, audited); in avc_audit()
|
/third_party/glib/ |
D | SECURITY.md | 53 * Code is audited to find any potential similar problems.
|
/third_party/node/ |
D | SECURITY.md | 36 versions is determined. Code is audited to find any potential similar
|
/third_party/python/Doc/library/ |
D | types.rst | 155 Note that the audited arguments may not match the names or positions
|
/third_party/cef/patch/ |
D | patch.cfg | 501 # libxml access is now limited to targets audited by the Security Team.
|
/third_party/python/Doc/whatsnew/ |
D | 2.3.rst | 833 code was ever audited and therefore it's all been ripped out in 2.3. You should
|
/third_party/libbpf/.github/actions/build-selftests/ |
D | vmlinux.h | 51645 u32 audited; member 51759 u32 audited; member
|