See introductory video for GSoC here: https://www.aboutcode.org/news/2022-03-30-aboutcode-for-gsoc2022.html and https://github.com/nexB/aboutcode/wiki/GSOC-2023 - Weekly meeting on Monday's at 16:00 UTC on Jitsi. See details and URL at https://github.com/nexB/aboutcode/wiki/MeetingMinutes - Interested in contributing? See https://aboutcode.readthedocs.io/en/latest/contributing.html - If you need support specifically for ScanCode ask in https://gitter.im/aboutcode-org/scancode
AyanSinhaMahapatra on app-archives-all-python
Build app archives for all pyth… (compare)
AyanSinhaMahapatra on app-archives-all-python
Build app archives for all pyth… (compare)
@OmkarPh
My screenshot is a panel from the soos.io webapp. soos.io determines whether or not a project has a vulnerabilty by checking the packages and dependencies listed in a project's manifest file. In my screenshot, on the left side, there is a nested list of packages from a manifest, and under each package are the dependencies for that package.
On the right side, is the vulnerability details for the package. In our case, I think showing the package or dependency information in detail would be alright.
The wiki page took too long to render. Please edit this wiki page’s content so it renders faster.
sometimes. Should we make this a year-wise page instead?
@lf32 I could not reproduce you ScanCode TK Apple M1 installation issue. Can you try again and if this happens again, please create an issue
I've already tried doing unzip tar -> ./scancode --help thrice :/
nexB/scancode-toolkit#3061
is there someone else who has m1 mac
AdditionalLicenseLocationProvider
or something and having the path providers for additional licenses subclass that. What are your thoughts?--summary
feature: it seems to be a summary for the root, not faceted by package
licenses_reference[].text_urls
and text licenses_reference[].text
--report
argument