Security News
Opengrep Emerges as Open Source Alternative Amid Semgrep Licensing Controversy
Opengrep forks Semgrep to preserve open source SAST in response to controversial licensing changes.
github.com/glesys/glesys-go/v7
This is the official client library for interacting with the GleSYS API.
go get github.com/glesys/glesys-go
To use the glesys-go library you need a GleSYS Cloud account and a valid API key. You can sign up for an account at https://glesys.com/signup. After signing up visit https://cloud.glesys.com to create an API key for your Project.
client := glesys.NewClient("CL12345", "your-api-key", "my-application/0.0.1")
// Create a Server
server, err := client.Servers.Create(context.Background(), glesys.CreateServerParams{Password: "..."}.WithDefaults())
// List all Servers
servers, err := client.Servers.List(context.Background())
To be able to monitor usage and help track down issues, we encourage you to
provide a user agent string identifying your application or library. Recommended
syntax is my-library/version
or www.example.com
.
glesys-go uses Go's context library to handle
timeouts and deadlines. All functions making HTTP requests requires a context
argument.
Full documentation is available at https://godoc.org/github.com/glesys/glesys-go.
Please use the formatting provided by gofmt.
The contents of this repository are distributed under the MIT license, see LICENSE.
FAQs
Unknown package
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Security News
Opengrep forks Semgrep to preserve open source SAST in response to controversial licensing changes.
Security News
Critics call the Node.js EOL CVE a misuse of the system, sparking debate over CVE standards and the growing noise in vulnerability databases.
Security News
cURL and Go security teams are publicly rejecting CVSS as flawed for assessing vulnerabilities and are calling for more accurate, context-aware approaches.