Conan 2.10 Documentationavoid 1.2.3-Beta to be a different version than 1.2.3-beta which can be problematic, even a security risk. The ordering of versions when necessary (for example to decide which is the latest version in a completely separated the authentication and credentials from the recipe functionality, without any risk to leaking credentials. Note: Best practices • Do not use an authentication mechanism that encodes (boolean) keys. It can override CMakeToolchain defined variables, for which users are at their own risk. E.g. [conf] tools.cmake.cmaketoolchain:extra_variables={'MY_CMAKE_VAR': 'MyValue'} Resulting in:0 码力 | 803 页 | 5.02 MB | 10 月前3
Conan 2.5 Documentationavoid 1.2.3-Beta to be a different version than 1.2.3-beta which can be problematic, even a security risk. The ordering of versions when necessary (for example to decide which is the latest version in a completely separated the authentication and credentials from the recipe functionality, without any risk to leaking credentials. Note: Best practices • Do not use an authentication mechanism that encodes (boolean) keys. It can override CMakeToolchain defined variables, for which users are at their own risk. E.g. [conf] tools.cmake.cmaketoolchain:extra_variables={'MY_CMAKE_VAR': 'MyValue'} Resulting in:0 码力 | 769 页 | 4.70 MB | 1 年前3
Conan 2.4 Documentationavoid 1.2.3-Beta to be a different version than 1.2.3-beta which can be problematic, even a security risk. The ordering of versions when necessary (for example to decide which is the latest version in a completely separated the authentication and credentials from the recipe functionality, without any risk to leaking credentials. Note: Best practices • Do not use an authentication mechanism that encodes to variable name). Potential override of CMakeToolchain defined variables, users are at their own risk. E.g. [conf] tools.cmake.cmaketoolchain:extra_variables={'MY_CMAKE_VAR': 'MyValue'} Resulting in:0 码力 | 769 页 | 4.69 MB | 1 年前3
Conan 2.6 Documentationavoid 1.2.3-Beta to be a different version than 1.2.3-beta which can be problematic, even a security risk. The ordering of versions when necessary (for example to decide which is the latest version in a completely separated the authentication and credentials from the recipe functionality, without any risk to leaking credentials. Note: Best practices • Do not use an authentication mechanism that encodes (boolean) keys. It can override CMakeToolchain defined variables, for which users are at their own risk. E.g. [conf] tools.cmake.cmaketoolchain:extra_variables={'MY_CMAKE_VAR': 'MyValue'} Resulting in:0 码力 | 777 页 | 4.91 MB | 10 月前3
Conan 2.9 Documentationavoid 1.2.3-Beta to be a different version than 1.2.3-beta which can be problematic, even a security risk. The ordering of versions when necessary (for example to decide which is the latest version in a completely separated the authentication and credentials from the recipe functionality, without any risk to leaking credentials. Note: Best practices • Do not use an authentication mechanism that encodes (boolean) keys. It can override CMakeToolchain defined variables, for which users are at their own risk. E.g. [conf] tools.cmake.cmaketoolchain:extra_variables={'MY_CMAKE_VAR': 'MyValue'} Resulting in:0 码力 | 795 页 | 4.99 MB | 10 月前3
Conan 2.7 Documentationavoid 1.2.3-Beta to be a different version than 1.2.3-beta which can be problematic, even a security risk. The ordering of versions when necessary (for example to decide which is the latest version in a completely separated the authentication and credentials from the recipe functionality, without any risk to leaking credentials. Note: Best practices • Do not use an authentication mechanism that encodes (boolean) keys. It can override CMakeToolchain defined variables, for which users are at their own risk. E.g. [conf] tools.cmake.cmaketoolchain:extra_variables={'MY_CMAKE_VAR': 'MyValue'} Resulting in:0 码力 | 779 页 | 4.93 MB | 10 月前3
Conan 2.8 Documentationavoid 1.2.3-Beta to be a different version than 1.2.3-beta which can be problematic, even a security risk. The ordering of versions when necessary (for example to decide which is the latest version in a completely separated the authentication and credentials from the recipe functionality, without any risk to leaking credentials. Note: Best practices • Do not use an authentication mechanism that encodes (boolean) keys. It can override CMakeToolchain defined variables, for which users are at their own risk. E.g. [conf] tools.cmake.cmaketoolchain:extra_variables={'MY_CMAKE_VAR': 'MyValue'} Resulting in:0 码力 | 785 页 | 4.95 MB | 10 月前3
Conan 2.1 Documentationavoid 1.2.3-Beta to be a different version than 1.2.3-beta which can be problematic, even a security risk. The ordering of versions when necessary (for example to decide which is the latest version in a completely separated the authentication and credentials from the recipe functionality, without any risk to leaking credentials. Note: Best practices 7.3. Conan recipe tools examples 221 Conan Documentation conf_info) • tools.files.download:verify: Setting tools.files.download:verify=False constitutes a security risk if enabled, as it disables certificate validation. Do not use it unless you understand the implications0 码力 | 694 页 | 4.13 MB | 1 年前3
Conan 2.3 Documentationavoid 1.2.3-Beta to be a different version than 1.2.3-beta which can be problematic, even a security risk. The ordering of versions when necessary (for example to decide which is the latest version in a completely separated the authentication and credentials from the recipe functionality, without any risk to leaking credentials. Note: Best practices • Do not use an authentication mechanism that encodes conf_info) • tools.files.download:verify: Setting tools.files.download:verify=False constitutes a security risk if enabled, as it disables certificate validation. Do not use it unless you understand the implications0 码力 | 748 页 | 4.65 MB | 1 年前3
Conan 2.2 Documentationavoid 1.2.3-Beta to be a different version than 1.2.3-beta which can be problematic, even a security risk. The ordering of versions when necessary (for example to decide which is the latest version in a completely separated the authentication and credentials from the recipe functionality, without any risk to leaking credentials. Note: Best practices 7.3. Conan recipe tools examples 231 Conan Documentation conf_info) • tools.files.download:verify: Setting tools.files.download:verify=False constitutes a security risk if enabled, as it disables certificate validation. Do not use it unless you understand the implications0 码力 | 718 页 | 4.46 MB | 1 年前3
共 39 条
- 1
- 2
- 3
- 4













