Conan 2.0 Documentationthe task with other approaches, that will be explained later. This is just an introduction to the principles and concepts. The important idea is that now we got 2 versions of matrix in the lockfile, and following guidelines contain a series of recommendations to ensure repeatability, reliability, compliance and, where applicable, control to enable customization. As a summary, it is highly recommended recommendations also apply when consuming packages from external sources in any package manager. 5.1.3 Compliance and security Some industries such as finance, robotics and embedded, have stronger requirements0 码力 | 652 页 | 4.00 MB | 1 年前3
Conan 2.1 Documentationexecutable, test results, coverage data and many other different files needed for traceability, compliance and business purposes. See also: • Metadata files blog post 2.17 Third party backup sources the task with other approaches, that will be explained later. This is just an introduction to the principles and concepts. The important idea is that now we got 2 versions of matrix in the lockfile, and following guidelines contain a series of recommendations to ensure repeatability, reliability, compliance and, where applicable, control to enable customization. As a summary, it is highly recommended0 码力 | 694 页 | 4.13 MB | 1 年前3
Conan 2.3 Documentationexecutable, test results, coverage data and many other different files needed for traceability, compliance and business purposes. See also: • Metadata files blog post 2.17 Third party backup sources the task with other approaches, that will be explained later. This is just an introduction to the principles and concepts. The important idea is that now we got 2 versions of matrix in the lockfile, and following guidelines contain a series of recommendations to ensure repeatability, reliability, compliance and, where applicable, control to enable customization. As a summary, it is highly recommended0 码力 | 748 页 | 4.65 MB | 1 年前3
Conan 2.5 Documentationexecutable, test results, coverage data and many other different files needed for traceability, compliance and business purposes. See also: • Metadata files blog post 2.17 Third party backup sources the task with other approaches, that will be explained later. This is just an introduction to the principles and concepts. The important idea is that now we got 2 versions of matrix in the lockfile, and following guidelines contain a series of recommendations to ensure repeatability, reliability, compliance and, where applicable, control to enable customization. As a summary, it is highly recommended0 码力 | 769 页 | 4.70 MB | 1 年前3
Conan 2.2 Documentationexecutable, test results, coverage data and many other different files needed for traceability, compliance and business purposes. See also: • Metadata files blog post 2.17 Third party backup sources the task with other approaches, that will be explained later. This is just an introduction to the principles and concepts. The important idea is that now we got 2 versions of matrix in the lockfile, and following guidelines contain a series of recommendations to ensure repeatability, reliability, compliance and, where applicable, control to enable customization. As a summary, it is highly recommended0 码力 | 718 页 | 4.46 MB | 1 年前3
Conan 2.4 Documentationexecutable, test results, coverage data and many other different files needed for traceability, compliance and business purposes. See also: • Metadata files blog post 2.17 Third party backup sources the task with other approaches, that will be explained later. This is just an introduction to the principles and concepts. The important idea is that now we got 2 versions of matrix in the lockfile, and following guidelines contain a series of recommendations to ensure repeatability, reliability, compliance and, where applicable, control to enable customization. As a summary, it is highly recommended0 码力 | 769 页 | 4.69 MB | 1 年前3
Conan 2.10 Documentationexecutable, test results, coverage data and many other different files needed for traceability, compliance and business purposes. See also: • Metadata files blog post 2.17 Third party backup sources the task with other approaches, that will be explained later. This is just an introduction to the principles and concepts. The important idea is that now we got 2 versions of matrix in the lockfile, and following guidelines contain a series of recommendations to ensure repeatability, reliability, compliance and, where applicable, control to enable customization. As a summary, it is highly recommended0 码力 | 803 页 | 5.02 MB | 10 月前3
Conan 2.6 Documentationexecutable, test results, coverage data and many other different files needed for traceability, compliance and business purposes. See also: • Metadata files blog post 2.17 Third party backup sources the task with other approaches, that will be explained later. This is just an introduction to the principles and concepts. The important idea is that now we got 2 versions of matrix in the lockfile, and following guidelines contain a series of recommendations to ensure repeatability, reliability, compliance and, where applicable, control to enable customization. As a summary, it is highly recommended0 码力 | 777 页 | 4.91 MB | 10 月前3
Conan 2.9 Documentationexecutable, test results, coverage data and many other different files needed for traceability, compliance and business purposes. See also: • Metadata files blog post 2.17 Third party backup sources the task with other approaches, that will be explained later. This is just an introduction to the principles and concepts. The important idea is that now we got 2 versions of matrix in the lockfile, and following guidelines contain a series of recommendations to ensure repeatability, reliability, compliance and, where applicable, control to enable customization. As a summary, it is highly recommended0 码力 | 795 页 | 4.99 MB | 10 月前3
Conan 2.7 Documentationexecutable, test results, coverage data and many other different files needed for traceability, compliance and business purposes. See also: • Metadata files blog post 2.17 Third party backup sources the task with other approaches, that will be explained later. This is just an introduction to the principles and concepts. The important idea is that now we got 2 versions of matrix in the lockfile, and following guidelines contain a series of recommendations to ensure repeatability, reliability, compliance and, where applicable, control to enable customization. As a summary, it is highly recommended0 码力 | 779 页 | 4.93 MB | 10 月前3
共 43 条
- 1
- 2
- 3
- 4
- 5













