Wykres commitów

22 Commity (42b3a109629237d3a11aefbb34ab78fce9a7cc7e)

Autor SHA1 Wiadomość Data
nightwalker-87 0d16dbac9a CodeQL Workflow Maintenance
- Removed incompatible workflow
- Updated existing workflow
2023-11-22 01:13:44 +01:00
Brian abf354a155 Add CodeQL Workflow for Code Security Analysis
Add CodeQL Workflow for Code Security Analysis

This pull request introduces a CodeQL workflow to enhance the security analysis of our repository. CodeQL is a powerful static analysis tool that helps identify and mitigate security vulnerabilities in our codebase. By integrating this workflow into our GitHub Actions, we can proactively identify and address potential issues before they become security threats.

We added a new CodeQL workflow file (.github/workflows/codeql.yml) that
- Runs on every pull request (functionality to run on every push to main branches is included as a comment for convenience).
- Runs daily.
- Excludes queries with a high false positive rate or low-severity findings.
- Does not display results for git submodules, focusing only on our own codebase.

Testing:
To validate the functionality of this workflow, we have run several test scans on the codebase and reviewed the results. The workflow successfully compiles the project, identifies issues, and provides actionable insights while reducing noise by excluding certain queries and third-party code.

Deployment:
Once this pull request is merged, the CodeQL workflow will be active and automatically run on every push and pull request to the main branch. To view the results of these code scans, please follow these steps:
1. Under the repository name, click on the Security tab.
2. In the left sidebar, click Code scanning alerts.

Additional Information:
- You can further customize the workflow to adapt to your specific needs by modifying the workflow file.
- For more information on CodeQL and how to interpret its results, refer to the GitHub documentation and the CodeQL documentation (https://codeql.github.com/ and https://codeql.github.com/docs/).

Signed-off-by: Brian <bayuan@purdue.edu>
2023-10-29 15:28:16 -04:00
Brian b9a0a49a54 Add CodeQL Workflow for Code Security Analysis
Add CodeQL Workflow for Code Security Analysis

This pull request introduces a CodeQL workflow to enhance the security analysis of our repository. CodeQL is a powerful static analysis tool that helps identify and mitigate security vulnerabilities in our codebase. By integrating this workflow into our GitHub Actions, we can proactively identify and address potential issues before they become security threats.

We added a new CodeQL workflow file (.github/workflows/codeql.yml) that
- Runs on every pull request (functionality to run on every push to main branches is included as a comment for convenience).
- Runs daily.
- Excludes queries with a high false positive rate or low-severity findings.
- Does not display results for git submodules, focusing only on our own codebase.

Testing:
To validate the functionality of this workflow, we have run several test scans on the codebase and reviewed the results. The workflow successfully compiles the project, identifies issues, and provides actionable insights while reducing noise by excluding certain queries and third-party code.

Deployment:
Once this pull request is merged, the CodeQL workflow will be active and automatically run on every push and pull request to the main branch. To view the results of these code scans, please follow these steps:
1. Under the repository name, click on the Security tab.
2. In the left sidebar, click Code scanning alerts.

Additional Information:
- You can further customize the workflow to adapt to your specific needs by modifying the workflow file.
- For more information on CodeQL and how to interpret its results, refer to the GitHub documentation and the CodeQL documentation (https://codeql.github.com/ and https://codeql.github.com/docs/).

Signed-off-by: Brian <bayuan@purdue.edu>
2023-10-20 01:02:15 -04:00
Brian ed8fa62d09 Add CodeQL Workflow for Code Security Analysis
Add CodeQL Workflow for Code Security Analysis

This pull request introduces a CodeQL workflow to enhance the security analysis of our repository. CodeQL is a powerful static analysis tool that helps identify and mitigate security vulnerabilities in our codebase. By integrating this workflow into our GitHub Actions, we can proactively identify and address potential issues before they become security threats.

We added a new CodeQL workflow file (.github/workflows/codeql.yml) that
- Runs on every pull request (functionality to run on every push to main branches is included as a comment for convenience).
- Runs daily.
- Excludes queries with a high false positive rate or low-severity findings.
- Does not display results for git submodules, focusing only on our own codebase.

Testing:
To validate the functionality of this workflow, we have run several test scans on the codebase and reviewed the results. The workflow successfully compiles the project, identifies issues, and provides actionable insights while reducing noise by excluding certain queries and third-party code.

Deployment:
Once this pull request is merged, the CodeQL workflow will be active and automatically run on every push and pull request to the main branch. To view the results of these code scans, please follow these steps:
1. Under the repository name, click on the Security tab.
2. In the left sidebar, click Code scanning alerts.

Additional Information:
- You can further customize the workflow to adapt to your specific needs by modifying the workflow file.
- For more information on CodeQL and how to interpret its results, refer to the GitHub documentation and the CodeQL documentation (https://codeql.github.com/ and https://codeql.github.com/docs/).

Signed-off-by: Brian <bayuan@purdue.edu>
2023-10-18 16:49:46 -04:00
Brian df7c7d2172 Add CodeQL Workflow for Code Security Analysis
Add CodeQL Workflow for Code Security Analysis

This pull request introduces a CodeQL workflow to enhance the security analysis of our repository. CodeQL is a powerful static analysis tool that helps identify and mitigate security vulnerabilities in our codebase. By integrating this workflow into our GitHub Actions, we can proactively identify and address potential issues before they become security threats.

We added a new CodeQL workflow file (.github/workflows/codeql.yml) that
- Runs on every push and pull request to the main branch.
- Excludes queries with a high false positive rate or low-severity findings.
- Does not display results for third-party code, focusing only on our own codebase.

Testing:
To validate the functionality of this workflow, we have run several test scans on the codebase and reviewed the results. The workflow successfully compiles the project, identifies issues, and provides actionable insights while reducing noise by excluding certain queries and third-party code.

Deployment:
Once this pull request is merged, the CodeQL workflow will be active and automatically run on every push and pull request to the main branch. To view the results of these code scans, please follow these steps:
1. Under the repository name, click on the Security tab.
2. In the left sidebar, click Code scanning alerts.

Additional Information:
- You can further customize the workflow to adapt to your specific needs by modifying the workflow file.
- For more information on CodeQL and how to interpret its results, refer to the GitHub documentation and the CodeQL documentation.

Signed-off-by: Brian <bayuan@purdue.edu>
2023-10-11 19:55:50 -04:00
nightwalker-87 5946076723 General maintenance
- Updated pkg-version requirements
- Updated version_support.md
- Removed Ubuntu 18.04 from GH workflow
2023-04-04 23:54:56 +02:00
nightwalker-87 2a8a36efba Updated GitHub Actions C/C++ CI workflow 2023-01-02 12:21:18 +01:00
nightwalker-87 2087711c23 General Project Update
- Updated CHANGELOG.md
- Updated README.md
- Removed support for macOS (Closes #1269)
2022-10-23 20:22:16 +02:00
nightwalker-87 c8fc6561fe Bugfixes
- Corrected paths for chip-id files (Closes #1180)
- Fixed 32-bit build (Closes #985) (Closes #1175)
- Patch for GitHub Actions Workflow (Ubuntu)
2021-08-29 15:08:54 +02:00
nightwalker-87 2e6c909c3e General Project Update
- Removed GitHub-CI VE for Ubuntu 16.04 (deprecated)
- Minor fixes for some comments
2021-05-30 23:51:12 +02:00
nightwalker-87 eeaef981a5 Re-enabled GitHub Actions CI for Ubuntu 16.04 2021-04-25 19:58:09 +02:00
nightwalker-87 c115ab2e0f General Project Update
- Formatting fixes
- Commented CI build setting for Ubuntu 16.04
- Updated CHANGELOG.md
2021-04-24 14:16:29 +02:00
nightwalker-87 5ce54824a5 Updated CI & MinGW64 cross build configuration
- Moved config for macOS 10.14 to GitHub Actions
   (Note: preparation only, yet inactive)
- Removed macOS 10.14 builds from Travis CI
- Removed Linux build config from Travis CI
- Split 32- & 64-bit cross builds to separate jobs
- Minor fixes for MinGW64 cross build config
2021-04-05 21:55:54 +02:00
nightwalker-87 e0f7552fc1 Updated CI build configuration
- Ensure clean build system for all build targets
- Rearranged & renamed build jobs
- Completed set of 32-bit & 64-bit builds
- Updated notifications for MinGW cross build
- Added macOS 10.14 build environment for Travis CI
2021-04-03 14:53:16 +02:00
nightwalker-87 0496ecff48 Updated config for GitHub code scanning alerts 2021-04-02 16:43:54 +02:00
nightwalker-87 face74262f Updated config for GitHub code scanning alerts 2021-03-28 00:30:33 +01:00
nightwalker-87 a5a4a687c4 Updated config for GitHub Actions CI workflow 2021-03-27 21:01:31 +01:00
nightwalker-87 878df31761 Updated CI config & issue templates
- Initial support for GitHub CI workflows
- Cleanup for Travis CI config
- Minor fixes for issue templates
2021-03-27 17:46:22 +01:00
nightwalker-87 b716b302cf
Merge pull request #1111 from stlink-org/git_feature_test
Create codeql-analysis.yml
2021-03-21 15:52:42 +01:00
nightwalker-87 812bc6ed4f
Create c-cpp.yml
Added Github Action - Make Workflow

Build and test a C/C++ project using Make.
2021-03-21 14:58:45 +01:00
nightwalker-87 ab6094a615
Create cmake.yml
Added Github Action - CMake Workflow

Build and test a CMake based project.
2021-03-21 14:26:10 +01:00
nightwalker-87 7c7ce95404
Create codeql-analysis.yml
Setup for code scanning alerts
2021-03-21 14:17:35 +01:00