Wykres commitów

40 Commity (develop)

Autor SHA1 Wiadomość Data
nightwalker-87 0d16dbac9a CodeQL Workflow Maintenance
- Removed incompatible workflow
- Updated existing workflow
2023-11-22 01:13:44 +01:00
Brian abf354a155 Add CodeQL Workflow for Code Security Analysis
Add CodeQL Workflow for Code Security Analysis

This pull request introduces a CodeQL workflow to enhance the security analysis of our repository. CodeQL is a powerful static analysis tool that helps identify and mitigate security vulnerabilities in our codebase. By integrating this workflow into our GitHub Actions, we can proactively identify and address potential issues before they become security threats.

We added a new CodeQL workflow file (.github/workflows/codeql.yml) that
- Runs on every pull request (functionality to run on every push to main branches is included as a comment for convenience).
- Runs daily.
- Excludes queries with a high false positive rate or low-severity findings.
- Does not display results for git submodules, focusing only on our own codebase.

Testing:
To validate the functionality of this workflow, we have run several test scans on the codebase and reviewed the results. The workflow successfully compiles the project, identifies issues, and provides actionable insights while reducing noise by excluding certain queries and third-party code.

Deployment:
Once this pull request is merged, the CodeQL workflow will be active and automatically run on every push and pull request to the main branch. To view the results of these code scans, please follow these steps:
1. Under the repository name, click on the Security tab.
2. In the left sidebar, click Code scanning alerts.

Additional Information:
- You can further customize the workflow to adapt to your specific needs by modifying the workflow file.
- For more information on CodeQL and how to interpret its results, refer to the GitHub documentation and the CodeQL documentation (https://codeql.github.com/ and https://codeql.github.com/docs/).

Signed-off-by: Brian <bayuan@purdue.edu>
2023-10-29 15:28:16 -04:00
Brian b9a0a49a54 Add CodeQL Workflow for Code Security Analysis
Add CodeQL Workflow for Code Security Analysis

This pull request introduces a CodeQL workflow to enhance the security analysis of our repository. CodeQL is a powerful static analysis tool that helps identify and mitigate security vulnerabilities in our codebase. By integrating this workflow into our GitHub Actions, we can proactively identify and address potential issues before they become security threats.

We added a new CodeQL workflow file (.github/workflows/codeql.yml) that
- Runs on every pull request (functionality to run on every push to main branches is included as a comment for convenience).
- Runs daily.
- Excludes queries with a high false positive rate or low-severity findings.
- Does not display results for git submodules, focusing only on our own codebase.

Testing:
To validate the functionality of this workflow, we have run several test scans on the codebase and reviewed the results. The workflow successfully compiles the project, identifies issues, and provides actionable insights while reducing noise by excluding certain queries and third-party code.

Deployment:
Once this pull request is merged, the CodeQL workflow will be active and automatically run on every push and pull request to the main branch. To view the results of these code scans, please follow these steps:
1. Under the repository name, click on the Security tab.
2. In the left sidebar, click Code scanning alerts.

Additional Information:
- You can further customize the workflow to adapt to your specific needs by modifying the workflow file.
- For more information on CodeQL and how to interpret its results, refer to the GitHub documentation and the CodeQL documentation (https://codeql.github.com/ and https://codeql.github.com/docs/).

Signed-off-by: Brian <bayuan@purdue.edu>
2023-10-20 01:02:15 -04:00
Brian ed8fa62d09 Add CodeQL Workflow for Code Security Analysis
Add CodeQL Workflow for Code Security Analysis

This pull request introduces a CodeQL workflow to enhance the security analysis of our repository. CodeQL is a powerful static analysis tool that helps identify and mitigate security vulnerabilities in our codebase. By integrating this workflow into our GitHub Actions, we can proactively identify and address potential issues before they become security threats.

We added a new CodeQL workflow file (.github/workflows/codeql.yml) that
- Runs on every pull request (functionality to run on every push to main branches is included as a comment for convenience).
- Runs daily.
- Excludes queries with a high false positive rate or low-severity findings.
- Does not display results for git submodules, focusing only on our own codebase.

Testing:
To validate the functionality of this workflow, we have run several test scans on the codebase and reviewed the results. The workflow successfully compiles the project, identifies issues, and provides actionable insights while reducing noise by excluding certain queries and third-party code.

Deployment:
Once this pull request is merged, the CodeQL workflow will be active and automatically run on every push and pull request to the main branch. To view the results of these code scans, please follow these steps:
1. Under the repository name, click on the Security tab.
2. In the left sidebar, click Code scanning alerts.

Additional Information:
- You can further customize the workflow to adapt to your specific needs by modifying the workflow file.
- For more information on CodeQL and how to interpret its results, refer to the GitHub documentation and the CodeQL documentation (https://codeql.github.com/ and https://codeql.github.com/docs/).

Signed-off-by: Brian <bayuan@purdue.edu>
2023-10-18 16:49:46 -04:00
Brian df7c7d2172 Add CodeQL Workflow for Code Security Analysis
Add CodeQL Workflow for Code Security Analysis

This pull request introduces a CodeQL workflow to enhance the security analysis of our repository. CodeQL is a powerful static analysis tool that helps identify and mitigate security vulnerabilities in our codebase. By integrating this workflow into our GitHub Actions, we can proactively identify and address potential issues before they become security threats.

We added a new CodeQL workflow file (.github/workflows/codeql.yml) that
- Runs on every push and pull request to the main branch.
- Excludes queries with a high false positive rate or low-severity findings.
- Does not display results for third-party code, focusing only on our own codebase.

Testing:
To validate the functionality of this workflow, we have run several test scans on the codebase and reviewed the results. The workflow successfully compiles the project, identifies issues, and provides actionable insights while reducing noise by excluding certain queries and third-party code.

Deployment:
Once this pull request is merged, the CodeQL workflow will be active and automatically run on every push and pull request to the main branch. To view the results of these code scans, please follow these steps:
1. Under the repository name, click on the Security tab.
2. In the left sidebar, click Code scanning alerts.

Additional Information:
- You can further customize the workflow to adapt to your specific needs by modifying the workflow file.
- For more information on CodeQL and how to interpret its results, refer to the GitHub documentation and the CodeQL documentation.

Signed-off-by: Brian <bayuan@purdue.edu>
2023-10-11 19:55:50 -04:00
nightwalker-87 5946076723 General maintenance
- Updated pkg-version requirements
- Updated version_support.md
- Removed Ubuntu 18.04 from GH workflow
2023-04-04 23:54:56 +02:00
nightwalker-87 2a8a36efba Updated GitHub Actions C/C++ CI workflow 2023-01-02 12:21:18 +01:00
nightwalker-87 f025d756b7 Minor corrections regarding os support 2023-01-01 13:20:02 +01:00
nightwalker-87 2087711c23 General Project Update
- Updated CHANGELOG.md
- Updated README.md
- Removed support for macOS (Closes #1269)
2022-10-23 20:22:16 +02:00
nightwalker-87 c8fc6561fe Bugfixes
- Corrected paths for chip-id files (Closes #1180)
- Fixed 32-bit build (Closes #985) (Closes #1175)
- Patch for GitHub Actions Workflow (Ubuntu)
2021-08-29 15:08:54 +02:00
nightwalker-87 2e6c909c3e General Project Update
- Removed GitHub-CI VE for Ubuntu 16.04 (deprecated)
- Minor fixes for some comments
2021-05-30 23:51:12 +02:00
nightwalker-87 eeaef981a5 Re-enabled GitHub Actions CI for Ubuntu 16.04 2021-04-25 19:58:09 +02:00
nightwalker-87 80c31a15a4 General Project Update
- Updated issue templates
- Updated CONTRIBUTING.md (Closes #906)
- Updated changelogs for deb and rpm packages
- Updated CHANGELOG.md
2021-04-25 01:43:12 +02:00
nightwalker-87 c115ab2e0f General Project Update
- Formatting fixes
- Commented CI build setting for Ubuntu 16.04
- Updated CHANGELOG.md
2021-04-24 14:16:29 +02:00
nightwalker-87 5ce54824a5 Updated CI & MinGW64 cross build configuration
- Moved config for macOS 10.14 to GitHub Actions
   (Note: preparation only, yet inactive)
- Removed macOS 10.14 builds from Travis CI
- Removed Linux build config from Travis CI
- Split 32- & 64-bit cross builds to separate jobs
- Minor fixes for MinGW64 cross build config
2021-04-05 21:55:54 +02:00
nightwalker-87 e0f7552fc1 Updated CI build configuration
- Ensure clean build system for all build targets
- Rearranged & renamed build jobs
- Completed set of 32-bit & 64-bit builds
- Updated notifications for MinGW cross build
- Added macOS 10.14 build environment for Travis CI
2021-04-03 14:53:16 +02:00
nightwalker-87 0496ecff48 Updated config for GitHub code scanning alerts 2021-04-02 16:43:54 +02:00
nightwalker-87 face74262f Updated config for GitHub code scanning alerts 2021-03-28 00:30:33 +01:00
nightwalker-87 a5a4a687c4 Updated config for GitHub Actions CI workflow 2021-03-27 21:01:31 +01:00
nightwalker-87 878df31761 Updated CI config & issue templates
- Initial support for GitHub CI workflows
- Cleanup for Travis CI config
- Minor fixes for issue templates
2021-03-27 17:46:22 +01:00
nightwalker-87 b716b302cf
Merge pull request #1111 from stlink-org/git_feature_test
Create codeql-analysis.yml
2021-03-21 15:52:42 +01:00
nightwalker-87 812bc6ed4f
Create c-cpp.yml
Added Github Action - Make Workflow

Build and test a C/C++ project using Make.
2021-03-21 14:58:45 +01:00
nightwalker-87 ab6094a615
Create cmake.yml
Added Github Action - CMake Workflow

Build and test a CMake based project.
2021-03-21 14:26:10 +01:00
nightwalker-87 7c7ce95404
Create codeql-analysis.yml
Setup for code scanning alerts
2021-03-21 14:17:35 +01:00
2a17 93c59cc5c2 spelling mistake 'feature request' changed to 'bug report' in bug report template 2021-03-11 23:49:51 +00:00
nightwalker-87 86e6dd0029
Merge branch 'master' into develop 2021-03-11 16:34:50 +01:00
nightwalker-87 d0416149e0 General Project Update
- Updated ISSUE_TEMPLATES
- Updated .gitignore
2021-03-06 17:36:26 +01:00
nightwalker-87 6f36574777 Updated ISSUE_TEMPLATES
(Closes #1014)
2020-08-15 21:38:36 +02:00
nightwalker-87 baab8ca2f9 Updated ISSUE_TEMPLATES
(Closes #1014)
2020-08-15 21:31:52 +02:00
nightwalker-87 8f42f54438
Deleted duplicated issue template 2020-06-04 12:50:02 +02:00
nightwalker-87 4c1f5b9575 Update issue templates
Added reference to #906 in bug report template
2020-05-13 12:38:43 +02:00
nightwalker-87 ed6fd3ad7a
Merge pull request #908 from chenguokai/master
Fixed int length issues on 32-bit platforms.
2020-04-06 13:40:52 +02:00
nightwalker-87 d3c11fbef6 General Project Update
- [doc] Updated list of supported devices
- [doc] verify udev-rules (Closes #764)
- Removed old issue-templates.
- Updated BSD-3 license file.
2020-04-02 20:55:27 +02:00
nightwalker-87 cda2215327 Update issue templates 2020-04-02 15:53:21 +02:00
nightwalker-87 4416a24b5d General project update:
- Updated README & CHANGELOG.
- Updated issue templates.
- Fixes in travis.yml
2020-02-19 21:20:10 +01:00
Nightwalker-87 f45b8791f1 Update issue templates 2020-02-19 11:53:37 +01:00
Jerry Jacobs 09b8775328 .github/ISSUE_TEMPLATE.md: Correct typos. Fixes #503 2016-10-22 09:50:12 +02:00
Jerry Jacobs e83e1197af Update ISSUE_TEMPLATE.md 2016-05-13 12:16:16 +02:00
Jerry Jacobs e653ca6cdf ISSUE_TEMPLATE.md, fix typo 2016-05-03 21:09:21 +02:00
Jerry Jacobs a9cfb5619c Add github ISSUE_TEMPLATE.md 2016-05-03 21:08:19 +02:00